Baldy III, 1984 - Google Patents
Computer Copyright Law: An Emerging Form of Protection for Object Code Software after Apple v. FranklinBaldy III, 1984
View PDF- Document ID
- 8871077696659164233
- Author
- Baldy III A
- Publication year
- Publication venue
- Computer/LJ
External Links
Snippet
The computer industry's phenomenal expansion in recent years has intensified the need for effective protection of software property rights.'A vast disparity exists between development costs required to produce marketable software and the cost to misappropriate or" pirate" a …
- 230000018109 developmental process 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu | The copyright divide | |
Menell | Envisioning Copyright Law's Digital Future | |
Postigo | The digital rights movement: The role of technology in subverting digital copyright | |
Cohen | Reverse engineering and the rise of electronic vigilantism: intellectual property implications of lock-out programs | |
Yu | Anticircumvention and Anti-anticircumvention | |
Nimmer | Riff on Fair Use in the Digital Millennium Copyright Act | |
Miller | Copyright protection for computer programs, databases, and computer-generated works: Is anything new since CONTU | |
Conley et al. | A Unifying Theory for the Litigation of Computer Software Copyright Cases | |
May | Digital rights management: The problem of expanding ownership rights | |
Baldy III | Computer Copyright Law: An Emerging Form of Protection for Object Code Software after Apple v. Franklin | |
Root III | Protecting computer software in the 80s: practical guidelines for evolving needs | |
Heins | " The Progress of Science and Useful Arts": Why Copyright Today Threatens Intellectual Freedom | |
Graves III | Private Rights, Public Uses, and the Future of the Copyright Clause | |
Węgrzak | Intellectual Property Law in Japan. Contemporary trends and challenges | |
Kretschmer | Trends in global copyright | |
Erlinger Jr | An Analog Solution in a Digital World: Providing Federal Copyright Protection for Pre-1972 Sound Recordings | |
Davis | The Test of Primary Cloning: A New Approach to the Written Description Requirement in Biotechnological Patents | |
Fishman | Your Sound or Mine: The Digital Sampling Dilemma | |
Pal | Fundamental Principal of Copyright | |
Borovick | AI and Design | |
Katzenbach | The international protection of technology: A challenge for international law making | |
Thomas | Digital technologies and emerging copyright scenario | |
Sims | Copyright and contract | |
Mowrey | The Rise and Fall of Record Piracy | |
Drazewski | Copyright as a constraint on creating technological value |