[go: up one dir, main page]

Baldy III, 1984 - Google Patents

Computer Copyright Law: An Emerging Form of Protection for Object Code Software after Apple v. Franklin

Baldy III, 1984

View PDF
Document ID
8871077696659164233
Author
Baldy III A
Publication year
Publication venue
Computer/LJ

External Links

Snippet

The computer industry's phenomenal expansion in recent years has intensified the need for effective protection of software property rights.'A vast disparity exists between development costs required to produce marketable software and the cost to misappropriate or" pirate" a …
Continue reading at repository.law.uic.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
Yu The copyright divide
Menell Envisioning Copyright Law's Digital Future
Postigo The digital rights movement: The role of technology in subverting digital copyright
Cohen Reverse engineering and the rise of electronic vigilantism: intellectual property implications of lock-out programs
Yu Anticircumvention and Anti-anticircumvention
Nimmer Riff on Fair Use in the Digital Millennium Copyright Act
Miller Copyright protection for computer programs, databases, and computer-generated works: Is anything new since CONTU
Conley et al. A Unifying Theory for the Litigation of Computer Software Copyright Cases
May Digital rights management: The problem of expanding ownership rights
Baldy III Computer Copyright Law: An Emerging Form of Protection for Object Code Software after Apple v. Franklin
Root III Protecting computer software in the 80s: practical guidelines for evolving needs
Heins " The Progress of Science and Useful Arts": Why Copyright Today Threatens Intellectual Freedom
Graves III Private Rights, Public Uses, and the Future of the Copyright Clause
Węgrzak Intellectual Property Law in Japan. Contemporary trends and challenges
Kretschmer Trends in global copyright
Erlinger Jr An Analog Solution in a Digital World: Providing Federal Copyright Protection for Pre-1972 Sound Recordings
Davis The Test of Primary Cloning: A New Approach to the Written Description Requirement in Biotechnological Patents
Fishman Your Sound or Mine: The Digital Sampling Dilemma
Pal Fundamental Principal of Copyright
Borovick AI and Design
Katzenbach The international protection of technology: A challenge for international law making
Thomas Digital technologies and emerging copyright scenario
Sims Copyright and contract
Mowrey The Rise and Fall of Record Piracy
Drazewski Copyright as a constraint on creating technological value