ATE536580T1 - Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten - Google Patents
Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdatenInfo
- Publication number
- ATE536580T1 ATE536580T1 AT01974503T AT01974503T ATE536580T1 AT E536580 T1 ATE536580 T1 AT E536580T1 AT 01974503 T AT01974503 T AT 01974503T AT 01974503 T AT01974503 T AT 01974503T AT E536580 T1 ATE536580 T1 AT E536580T1
- Authority
- AT
- Austria
- Prior art keywords
- controlling access
- content data
- secured content
- access
- operating system
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1064—Restricting content processing at operating system level
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
- G06F21/126—Interacting with the operating system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Selective Calling Equipment (AREA)
- Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
- Hardware Redundancy (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB0024919.3A GB0024919D0 (en) | 2000-10-11 | 2000-10-11 | Method of further securing an operating system |
| PCT/GB2001/004544 WO2002031632A2 (en) | 2000-10-11 | 2001-10-11 | A method for controlling access to protected content |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE536580T1 true ATE536580T1 (de) | 2011-12-15 |
Family
ID=9901090
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT01974503T ATE536580T1 (de) | 2000-10-11 | 2001-10-11 | Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7761706B2 (de) |
| EP (1) | EP1386206B1 (de) |
| AT (1) | ATE536580T1 (de) |
| AU (1) | AU2001294017A1 (de) |
| GB (1) | GB0024919D0 (de) |
| WO (1) | WO2002031632A2 (de) |
Families Citing this family (62)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7529929B2 (en) * | 2002-05-30 | 2009-05-05 | Nokia Corporation | System and method for dynamically enforcing digital rights management rules |
| AU2003253106A1 (en) | 2002-07-04 | 2004-01-23 | Gyne Ideas Ltd | Medical implant |
| US7383586B2 (en) * | 2003-01-17 | 2008-06-03 | Microsoft Corporation | File system operation and digital rights management (DRM) |
| US7100047B2 (en) * | 2003-01-23 | 2006-08-29 | Verdasys, Inc. | Adaptive transparent encryption |
| US7814021B2 (en) * | 2003-01-23 | 2010-10-12 | Verdasys, Inc. | Managed distribution of digital assets |
| US7472272B2 (en) * | 2003-01-23 | 2008-12-30 | Verdasys, Inc. | Digital asset usage accountability via event journaling |
| US8136155B2 (en) * | 2003-04-01 | 2012-03-13 | Check Point Software Technologies, Inc. | Security system with methodology for interprocess communication control |
| US7478408B2 (en) * | 2003-04-04 | 2009-01-13 | Sesma Systems, Inc. | System and method for accessing objects in a platform dependent environment from a platform independent environment |
| US7490332B2 (en) * | 2003-04-04 | 2009-02-10 | Sesma Systems, Inc. | System and method for accessing ActiveX objects in a platform dependent environment from objects in a platform independent environment |
| JP5242915B2 (ja) * | 2003-06-05 | 2013-07-24 | インタートラスト テクノロジーズ コーポレイション | ピア・ツー・ピアサービス編成ための相互運用システム及び方法 |
| US7712140B2 (en) * | 2003-08-04 | 2010-05-04 | Lsi Corporation | 3-prong security/reliability/real-time distributed architecture of information handling system |
| US7434048B1 (en) * | 2003-09-09 | 2008-10-07 | Adobe Systems Incorporated | Controlling access to electronic documents |
| JP2005157059A (ja) * | 2003-11-27 | 2005-06-16 | Seiko Epson Corp | 照明装置及びプロジェクタ |
| ATE436047T1 (de) * | 2003-12-30 | 2009-07-15 | Wibu Systems Ag | Verfahren zum steuern eines datenverarbeitungsgeräts |
| US20050262568A1 (en) * | 2004-05-18 | 2005-11-24 | Hansen Mark D | System and method for managing access to protected content by untrusted applications |
| US7502481B2 (en) | 2004-08-31 | 2009-03-10 | Microsoft Corporation | Microphone with ultrasound/audible mixing chamber to secure audio path |
| US7739720B2 (en) * | 2004-10-14 | 2010-06-15 | Microsoft Corporation | Method and system for merging security policies |
| US8776206B1 (en) * | 2004-10-18 | 2014-07-08 | Gtb Technologies, Inc. | Method, a system, and an apparatus for content security in computer networks |
| US7784103B2 (en) * | 2004-10-19 | 2010-08-24 | Rovi Solutions Corporation | Method and apparatus for storing copy protection information separately from protected content |
| US7907727B2 (en) * | 2004-10-19 | 2011-03-15 | Rovi Solutions Corporation | System and method for allowing copying or distribution of a copy protected signal |
| US7373446B2 (en) * | 2004-11-05 | 2008-05-13 | Microsoft Corporation | Method and system for dynamically patching an operating system's interrupt mechanism |
| US7984513B1 (en) * | 2005-02-09 | 2011-07-19 | Liquid Machines, Inc. | Method and system for using a rules engine for enforcing access and usage policies in rights-aware applications |
| US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
| US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
| US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
| US20070204078A1 (en) * | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
| US8572372B2 (en) * | 2005-10-18 | 2013-10-29 | Telecom Italia S.P.A. | Method for selectively enabling access to file systems of mobile terminals |
| EP2128780A3 (de) * | 2005-10-18 | 2010-04-07 | Intertrust Technologies Corporation | Digitales Rechteverwaltungsantriebssystem und Verfahren |
| US9274974B1 (en) | 2005-10-21 | 2016-03-01 | Vmware, Inc. | Isolating data within a computer system using private shadow mappings |
| US8214296B2 (en) * | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
| US10528705B2 (en) * | 2006-05-09 | 2020-01-07 | Apple Inc. | Determining validity of subscription to use digital content |
| US9971776B1 (en) * | 2006-06-29 | 2018-05-15 | Veritas Technologies Llc | Method and apparatus for extending functionality of an operating system |
| US9218464B2 (en) * | 2006-10-20 | 2015-12-22 | Adobe Systems Incorporated | Interception of controlled functions |
| US20100031342A1 (en) * | 2007-04-12 | 2010-02-04 | Honeywell International, Inc | Method and system for providing secure video data transmission and processing |
| KR20080103225A (ko) * | 2007-05-23 | 2008-11-27 | 삼성전자주식회사 | 컨텐츠의 암호화 전송 방법 및 복호화 방법과 그 장치 |
| WO2009028873A2 (en) * | 2007-08-29 | 2009-03-05 | Cdnetworks Co., Ltd. | Protection against unauthorized copying of digital media content |
| US9740637B2 (en) | 2007-10-30 | 2017-08-22 | Vmware, Inc. | Cryptographic multi-shadowing with integrity verification |
| US8261265B2 (en) * | 2007-10-30 | 2012-09-04 | Vmware, Inc. | Transparent VMM-assisted user-mode execution control transfer |
| US8117243B2 (en) * | 2008-02-21 | 2012-02-14 | Oracle America, Inc. | Dynamic transactional instantiation of system configuration using a virtual file system layer |
| US8769675B2 (en) * | 2008-05-13 | 2014-07-01 | Apple Inc. | Clock roll forward detection |
| US8245308B2 (en) * | 2008-06-04 | 2012-08-14 | Microsoft Corporation | Using trusted third parties to perform DRM operations |
| US8484616B1 (en) * | 2009-06-23 | 2013-07-09 | Emc Corporation | Universal module model |
| US20100333079A1 (en) * | 2009-06-30 | 2010-12-30 | Computer Associates Think, Inc. | Binary Code Modification System and Method for Implementing Identity and Access Management or Governance Policies |
| US20100333065A1 (en) * | 2009-06-30 | 2010-12-30 | Computer Assoicates Think, Inc. | Binary code modification system and method for implementing a web service interface |
| US20110213971A1 (en) * | 2010-03-01 | 2011-09-01 | Nokia Corporation | Method and apparatus for providing rights management at file system level |
| US8365192B2 (en) | 2011-01-14 | 2013-01-29 | Apple Inc. | Methods for managing authority designation of graphical user interfaces |
| US8473961B2 (en) | 2011-01-14 | 2013-06-25 | Apple Inc. | Methods to generate security profile for restricting resources used by a program based on entitlements of the program |
| KR20120050742A (ko) * | 2010-11-11 | 2012-05-21 | 삼성에스디에스 주식회사 | 커널 네이티브 에이피아이의 후킹 처리를 통한 디지털 저작권 관리 장치 및 방법 |
| CA2832752A1 (en) | 2011-04-11 | 2012-10-18 | Intertrust Technologies Corporation | Information security systems and methods |
| US9213827B2 (en) * | 2012-09-27 | 2015-12-15 | Intel Corporation | Security data aggregation and business intelligence for web applications |
| US9560026B1 (en) * | 2013-01-22 | 2017-01-31 | Amazon Technologies, Inc. | Secure computer operations |
| US9377940B2 (en) * | 2013-02-28 | 2016-06-28 | Facebook, Inc. | Predictive pre-decoding of encoded media item |
| US20140258720A1 (en) * | 2013-03-11 | 2014-09-11 | Barracuda Networks, Inc. | Systems and methods for transparent per-file encryption and decryption via metadata identification |
| US10102384B2 (en) * | 2013-05-30 | 2018-10-16 | Jscrambler S.A. | Digital content execution control mechanism |
| EP3005209B1 (de) * | 2013-05-30 | 2021-02-17 | JScrambler S.A. | Webanwendungsschutz |
| CN103778382A (zh) * | 2014-01-16 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | 加密文件的访问方法及通信终端 |
| US11134063B2 (en) * | 2014-03-12 | 2021-09-28 | Akamai Technologies, Inc. | Preserving special characters in an encoded identifier |
| IN2014CH01484A (de) | 2014-03-20 | 2015-09-25 | Infosys Ltd | |
| WO2016026532A1 (en) * | 2014-08-21 | 2016-02-25 | Irdeto B.V. | User authentication using a randomized keypad over a drm secured video path |
| US9940486B2 (en) * | 2015-02-23 | 2018-04-10 | Cisco Technology, Inc. | Detection of hardware tampering |
| US10572675B2 (en) | 2016-11-02 | 2020-02-25 | Cisco Technology, Inc. | Protecting and monitoring internal bus transactions |
| CN114647821B (zh) * | 2022-02-10 | 2025-03-14 | 北京奇艺世纪科技有限公司 | 一种录屏检测方法、装置、设备及存储介质 |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5027273A (en) * | 1985-04-10 | 1991-06-25 | Microsoft Corporation | Method and operating system for executing programs in a multi-mode microprocessor |
| JPH07230380A (ja) * | 1994-02-15 | 1995-08-29 | Internatl Business Mach Corp <Ibm> | 適用業務プログラムの利用管理方法およびシステム |
| CN101398871B (zh) * | 1995-02-13 | 2011-05-18 | 英特特拉斯特技术公司 | 用于安全交易管理和电子权利保护的系统和方法 |
| US5671417A (en) * | 1995-08-11 | 1997-09-23 | International Business Machines Corporation | Method and system for inserting floating code hooks into multiple versions of code |
| US5899987A (en) * | 1995-10-03 | 1999-05-04 | Memco Software Ltd. | Apparatus for and method of providing user exits on an operating system platform |
| US6868495B1 (en) * | 1996-09-12 | 2005-03-15 | Open Security Solutions, Llc | One-time pad Encryption key Distribution |
| US6141698A (en) * | 1997-01-29 | 2000-10-31 | Network Commerce Inc. | Method and system for injecting new code into existing application code |
| US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
| US6282657B1 (en) * | 1997-09-16 | 2001-08-28 | Safenet, Inc. | Kernel mode protection |
| WO1999039261A1 (en) * | 1997-10-09 | 1999-08-05 | The Learning Company | Windows api trapping system |
| US7213247B1 (en) * | 2000-01-10 | 2007-05-01 | Wind River Systems, Inc. | Protection domains for a computer operating system |
-
2000
- 2000-10-11 GB GBGB0024919.3A patent/GB0024919D0/en not_active Ceased
-
2001
- 2001-10-11 AU AU2001294017A patent/AU2001294017A1/en not_active Abandoned
- 2001-10-11 EP EP01974503A patent/EP1386206B1/de not_active Expired - Lifetime
- 2001-10-11 AT AT01974503T patent/ATE536580T1/de active
- 2001-10-11 US US10/398,566 patent/US7761706B2/en not_active Expired - Lifetime
- 2001-10-11 WO PCT/GB2001/004544 patent/WO2002031632A2/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| GB0024919D0 (en) | 2000-11-22 |
| WO2002031632A3 (en) | 2003-11-20 |
| US20040054894A1 (en) | 2004-03-18 |
| US7761706B2 (en) | 2010-07-20 |
| EP1386206A2 (de) | 2004-02-04 |
| AU2001294017A1 (en) | 2002-04-22 |
| WO2002031632A2 (en) | 2002-04-18 |
| EP1386206B1 (de) | 2011-12-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE536580T1 (de) | Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten | |
| GB2386456A (en) | Computer system with operating system on a ram-disk | |
| TW200513866A (en) | Access method | |
| BRPI0511223A8 (pt) | "sistema hospedeiro" | |
| TW200745854A (en) | Self prefetching L2 cache mechanism for data lines | |
| DE10249427B4 (de) | Verfahren zum Definieren des Sicherheitszustands eines Computersystems | |
| TW200634548A (en) | System and method for selectively installing an operating system to be remotely booted within a storage area network | |
| EE200400053A (et) | Meetod ja süsteem andmete töötlemiseks elektroonilises seadmes, elektrooniline seade ja töötlusplokk | |
| DE602006020288D1 (de) | Sicheres endgerät, routine und verfahren zum schützen eines geheimen schlüssels | |
| DE502005004396D1 (de) | Vorrichtung für sicheren Fernzugriff | |
| ATE517376T1 (de) | Verfahren zur zugriffskontrolle auf eine automatisierungsanlage | |
| IL157542A0 (en) | System and method for restoring computer systems damaged by a malicious computer program | |
| PT1336937E (pt) | Sistema de controlo de acesso, processo de controlo de acesso e dispositivos adequados aos mesmos | |
| WO2005022414A3 (en) | Method and apparatus for protecting private information within a database | |
| ATE528729T1 (de) | Verfahren und system zur vermittlung plattformunabhängiger fernsteurervorrichtung und zur überwachung der einrichtungszugriffskontrolle | |
| HRP20060151A2 (en) | The method of safe certification service | |
| BR0014534A (pt) | Método baseado em computador e sistema para controlar um processo industrial | |
| ATE533101T1 (de) | Bedienvorrichtung | |
| WO2002023801A3 (de) | Verfahren zur steuerung des zugriffs | |
| ATE507536T1 (de) | Verfahren und vorrichtung zum verbessern des schutzes der mit rechnern präsentierten informationen | |
| WO2001052061A3 (en) | Method and apparatus for using an assist processor to pre-fetch data values for a primary processor | |
| GB2437888A (en) | System for restricted cache access during data transfers and method thereof | |
| DE602005011295D1 (de) | Verfahren und vorrichtung zum schützen von systemdaten auf einer computerfestplatte | |
| FR2906960B1 (fr) | Procede de mise a disposition cloisonnee d'un service electronique. | |
| ATE271419T1 (de) | Katalysator und verfahren zur dehydrierung von kohlenwasserstoffe |