Every Thursday, the US Patent and Trademark Office
publishes pending patent applications. Publication has no bearing on
whether a patent will eventually be issued based on the application.
Still, issued patents and published applications are often indicators
of what people have been thinking about and the kinds of things that
individuals or companies believe may be useful to them in the future. Assigned to InterTrust, the first of today's applications addresses various methods for software self-defense. The second application discloses ways of converting of conditional access protected content to DRM protected content. No assignee is stated.
20050183072, "Software self-defense systems and methods," assigned to InterTrust.
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
20050182931, "Conditional access to digital rights management conversion," no assignee stated.
The present invention provides for an interface between two seemingly incompatible and different content protection systems. Accordingly, protected content may be transferred between the respective security kernels of a conditional access (CA) and digital rights management (DRM) systems, while maintaining security of the content and any associated protection information. The transfer and consumption of protected content and the associated content protection information may be achieved by temporarily or permanently binding the respective security kernels of the CA and DRM systems, transcribing content protection information, and potentially transcribing the content.