Assigned to InterTrust, the first of today's applications discloses software self-defense techniques. No assignee given, the second application discloses ways of protecting digital content.
20070234070, "Software self-defense systems and methods," assigned to InterTrust.
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
20070233601, "Systems and methods for protecting digital content," no assignee given.
Systems and methods for using digital rights management (DRM) information to protect digital content. The DRM information does not refer to or use any characteristic(s) of the device on which it resides. Nor does the DRM information require a connection to a license server from the user device on which the content is used. Using the DRM allows the owner to make sure that her digital content is always protected despite the type or location of the device that contains the digital content, including whether the device containing the digital content can connect to a license server. The DRM can be therefore used to easily manage the use of the digital content, including access, transfer, distribution, and copying of the digital content.