发明名称 Data protection systems and methods
摘要 Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software.
申请公布号 US9594923(B2) 申请公布日期 2017.03.14
申请号 US201514807437 申请日期 2015.07.23
申请人 Intertrust Technologies Corporation 发明人 MacKay Michael K.;Sibert W. Olin;Landsman Richard A.;Swenson Eric J.;Hunt William
分类号 G06F12/14;G06F21/62;G06F21/10;G06F21/55;G06F21/57;G06F21/16;G06F17/30;G06K19/00;G11C7/00;G06F11/30;H04L9/32 主分类号 G06F12/14
代理机构 Finnegan, Henderson, Farabow, Garrett & Dunner, LLP 代理人 Finnegan, Henderson, Farabow, Garrett & Dunner, LLP
主权项 1. A computer-implemented method for protecting electronic content from unauthorized use performed by a computer system comprising a processor and a non-transitory computer-readable storage medium storing executable instructions that cause the processor to perform the method, the method comprising: receiving a request to process electronic content using a software module executing on the computer system; accessing a control policy associated with the electronic content; determining that the software module exhibits one or more predefined behaviors specified in the control policy, wherein determining that the software module exhibits one or more predefined behaviors comprises detecting an attempt by the software module to access one or more system interfaces that are not included in a list of predefined legitimate system interfaces; and implementing at least one action to protect the electronic content from unauthorized use based on the determination, wherein the at least one action comprises modifying at least a portion of the electronic content before it is processed by the software module.
地址 Sunnyvale CA US