A technique for imparting substantial break-once-run-everywhere (BORE) resistance to passive and active software objects, and for controlling access and use of resulting protected objects by a client computer (400). Specifically, a relatively large number, n, of identical watermarks (1720) are embedded throughout a software object (1700), through use of n different secret watermark keys to form a protected object, with each key defining a pointer to a location in the protected object at which a corresponding watermark appears.

 
Web www.patentalert.com

< Conference session key distribution method in an ID-based cryptographic system

< Method for establishing a communication between two devices

> Encryption/decryption management method in computer system having storage hierarchy

> Key distribution

~ 00605