$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Digital data authentication method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04L-009/30
출원번호 US-0621697 (2000-07-21)
우선권정보 JP-9-148061 (1997-06-05); JP-9-348860 (1997-12-18)
발명자 / 주소
  • Hiroshi Yoshiura JP
  • Kazuo Takaragi JP
  • Ryoichi Sasaki JP
  • Seiichi Susaki JP
  • Hisashi Toyoshima JP
  • Tsukasa Saito JP
출원인 / 주소
  • Hitachi, Ltd. JP
대리인 / 주소
    Antonelli, Terry, Stout & Kraus, LLP
인용정보 피인용 횟수 : 120  인용 특허 : 9

초록

This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser system cre

대표청구항

1. A validity check system comprising:an information browser device which displays digital data; and an information publisher device which stores said digital data in a state that said digital data can be displayed in said information browser device, wherein said information publisher device compris

이 특허에 인용된 특허 (9)

  1. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  2. Braudaway Gordon W. (Yorktown Heights NY) Magerlein Karen A. (Ossining NY) Mintzer Frederick C. (Shrub Oak NY), Color correct digital watermarking of images.
  3. Yoshiura Hiroshi,JPX ; Takaragi Kazuo,JPX ; Sasaki Ryoichi,JPX ; Susaki Seiichi,JPX ; Toyoshima Hisashi,JPX ; Saito Tsukasa,JPX, Digital data authentication method.
  4. Vynne Thorbjorn,DKX ; Jordan Frederic,CHX, Embedding a digital signature in a video sequence.
  5. Bender Walter ; Morimoto Norishige,JPX ; Gruhl Daniel, Method and apparatus for logo hiding in images.
  6. Romney Gordon ; Zubeldia Pedro (Kepa), Method and apparatus for witnessed authentication of electronic documents.
  7. Squilla John R. ; Moghadam Omid A. ; Rabbani Majid, Photograhic system with selected area image authentication.
  8. Eckhard Koch DE; Jian Zhao, Procedure for marking binary coded data sets.
  9. Braudaway Gordon Wesley ; Mintzer Frederick Cole, Protecting images with an image watermark.

이 특허를 인용한 특허 (120)

  1. Pasternak, Michael, Accessing and processing monitoring data resulting from customized monitoring of system activities.
  2. Davis, Bruce L.; Rhoads, Geoffrey B.; Conwell, William Y., Associating metadata with media signals, and searching for media signals using metadata.
  3. Ahuja, Ratinder Paul Singh; Deninger, William; de la Iglesia, Erik; Lowe, Rick, Attributes of captured objects in a capture system.
  4. Ahuja, Ratinder Paul Singh; Deninger, William; de la Iglesia, Erik; Lowe, Rick, Attributes of captured objects in a capture system.
  5. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  6. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  7. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  8. Davis,Bruce L.; Rhoads,Geoffrey B.; Conwell,William Y., Authenticating metadata and embedding metadata in watermarks of media signals.
  9. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  10. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  11. Hubbard, Edward A., Capability based distributed processing.
  12. Gaitonde, Jitendra B., Configuration management for a capture/registration system.
  13. Ahuja, Ratinder Paul Singh; Coleman, Shaun; de la Iglesia, Erik, Cryptographic policy enforcement.
  14. Pasternak, Michael, Customized monitoring of system activities.
  15. Hubbard, Edward A.; Mandyam, Sriram S., Data conversion services and associated distributed processing system.
  16. Calhoon, Sean; Carr, J. Scott; Rodriguez, Tony F., Data processing systems and methods.
  17. Calhoon,Sean; Carr,J. Scott; Rodriguez,Tony F., Data processing systems and methods with enhanced bios functionality.
  18. Lowe, Rick; Brocker, Stephen, Database for a capture system.
  19. Hillis, W. Daniel; Ferren, Bran, Delegated authority evaluation system.
  20. Hills, W. Daniel; Ferren, Bran, Delegated authority to evaluate content.
  21. Hillis, W. Daniel; Ferren, Bran, Delegating authority to evaluate content.
  22. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  23. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  24. Brundage, Trent J.; Hannigan, Brett T.; Sharma, Ravi K., Distributed content identification.
  25. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document de-registration.
  26. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document de-registration.
  27. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document registration.
  28. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document registration.
  29. Hubbard, Edward A.; Venkatramani, Krishnamurthy; Anderson, David P.; Adiga, Ashok K.; Hewgill, Greg D.; Lawson, Jeff A., Dynamic coordination and control of network connected devices for large-scale network site testing and associated architectures.
  30. Lowe, Rick; Broeker, Stephen; Liu, Weimin, File system for a capture system.
  31. Ahuja,Ratinder Paul Singh; de la Iglesia,Erik; Lowe,Rick; Howard,Matthew; Deninger,William, Generating signatures over a document.
  32. Liu, Weimin; de la Iglesia, Erik; Deninger, William; Lowe, Rick; Broeker, Stephen, High speed packet capture.
  33. Deninger, William; de la Iglesia, Erik, Identifying image type in a capture system.
  34. Deninger, William; de la Iglesia, Erik, Identifying image type in a capture system.
  35. Pasternak, Michael, Installing monitoring utilities using universal performance monitor.
  36. Hillis,W. Daniel; Ferren,Bran, Knowledge web.
  37. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  38. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  39. Deninger, William; Ahuja, Ratinder Paul Singh; de la Iglesia, Erik, Locational tagging in a capture system.
  40. Buhler, Peter; Kursawe, Klaus; Maeder, Roman; Osborne, Michael, Long-term secure digital signatures.
  41. Hubbard,Edward A.; Venkatramani,Krishnamurthy; Mandyam,Sriram S.; Anderson,David P., Massively distributed processing system with modular client agent and associated method.
  42. Hillis, W. Daniel; Ferren, Bran, Meta-Web.
  43. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Deninger, William; King, Samuel; Khasgiwala, Ashish; Massaro, Donald J., Method and apparatus for data capture and analysis system.
  44. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Deninger, William; King, Samuel; Khasgiwala, Ashish; Massaro, Donald J., Method and apparatus for data capture and analysis system.
  45. Balabine, Igor V.; Cargonja, Nikola; Evans, Allan M.; Zhu, Liping Julia; Shiledar, Devendra; Stough, Stephen Alan, Method and apparatus for providing security in a radio frequency identification system.
  46. Balabine, Igor V.; Cargonja, Nikola; Evans, Allan M.; Zhu, Liping Julia; Shiledar, Devendra; Stough, Stephen Alan, Method and apparatus for providing security in a radio frequency identification system.
  47. Balabine, Igor V.; Cargonja, Nikola; Evans, Allan M.; Zhu, Liping Julia; Shiledar, Devendra; Stough, Stephen Alan, Method and apparatus for providing security in a radio frequency identification system.
  48. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  49. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  50. Desai, Prashant, Method and system for conveying context data in a multi-channel and omni-channel environment.
  51. Desai, Prashant; Barrera, Bryant R., Method and system for sensitive data abstraction.
  52. Desai, Prashant; Barrera, Bryant R., Method and system for sensitive data abstraction.
  53. Rhoads,Geoffrey B.; Seder,Phillip Andrew; Miller,Marc D.; MacIntosh,Brian T.; Hein, III,William C.; Hannigan,Brett T., Method of linking on-line data to printed documents.
  54. Hubbard,Edward A., Method of managing workloads and associated distributed processing system.
  55. Lee,Cheol Woong; Lee,Chang Young, Method of preventing reduction of sales amount of records due to a digital music file illegally distributed through communication network.
  56. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  57. Chang, Shih-Fu; Meng, Horace J., Methods and architecture for indexing and editing compressed video over the world wide web.
  58. Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  59. Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  60. Beattie,Douglas D.; Creighton, Jr.,Neal Lewis; Bailey,Christopher T. M.; Remy,David L.; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  61. Beattie,Douglas; Creighton, Jr.,Neal; Bailey,Christopher; Remy,David; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  62. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  63. Carr, J. Scott; Davis, Bruce L.; Rhoads, Geoffrey B., Methods utilizing steganography.
  64. Deninger, William; de la Iglesia, Erik, Object classification in a capture system.
  65. Abu-Amara, Hosame H., Piracy prevention in digital rights management systems.
  66. Abu-Amara, Hosame H., Piracy prevention in digital rights management systems.
  67. Brundage, Trent J.; Hannigan, Brett T., Progressive watermark decoding on a distributed computing platform.
  68. Brundage,Trent J.; Hannigan,Brett T.; Sharma,Ravi K., Progressive watermark decoding on a distributed computing platform.
  69. Rowley, Peter, Providing independent verification of information in a public forum.
  70. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  71. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  72. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  73. Chang, Shih-Fu; Wang, Jun; Sajda, Paul; Pohlmeyer, Eric; Hanna, Barbara; Jangraw, David, Rapid image annotation via brain state decoding and visual pattern mining.
  74. Chang, Shih-Fu; Wang, Jun; Sajda, Paul; Pohlmeyer, Eric; Hanna, Barbara; Jangraw, David, Rapid image annotation via brain state decoding and visual pattern mining.
  75. de la Iglesia, Erik; Deninger, William, Rule parser.
  76. de la Iglesia, Erik; Deninger, William J., Rule parser.
  77. Peled,Ariel; Tirosh,Oren; Litai,Assaf; Baratz,Arik; Troyansky,Lidror, Secure distribution of digital content.
  78. Hubbard, Edward A.; Mandyam, Sriram S., Security architecture for distributed processing systems and associated method.
  79. Rowan, Michael J.; Bailey, Christopher T. M.; Chen, Kefeng; Creighton, Neal, Security systems and services to provide identity and uniform resource identifier verification.
  80. de la Iglesia, Erik; Ahuja, Ratinder Paul Singh; Deninger, William; King, Sam, Signature distribution in a document registration system.
  81. Hubbard, Edward A., Software-based network attached storage services hosted on massively distributed parallel computing networks.
  82. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  83. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  84. Ahuja, Ratinder Paul Singh; Deninger, William; Lakhani, Faizel; Christner, Joel, System and method for concept building.
  85. Ahuja, Ratinder Paul Singh; Lakhani, Faizel, System and method for data mining and security policy management.
  86. Ahuja, Ratinder; Lakhani, Faizel, System and method for data mining and security policy management.
  87. Ahuja, Ratinder; Lakhani, Faizel, System and method for data mining and security policy management.
  88. Liu, Weimin, System and method for data mining and security policy management.
  89. Liu, Weimin, System and method for data mining and security policy management.
  90. Liu, Weimin, System and method for data mining and security policy management.
  91. Chang, Shih-Fu; Zavesky, Eric, System and method for dynamically and interactively searching media data.
  92. Chang, Shih-Fu; Zhang, Dongqing, System and method for extracting text captions from video and generating video summaries.
  93. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  94. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  95. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  96. Ahuja, Ratinder Paul Singh; Deninger, William, System and method for intelligent term grouping.
  97. Ahuja, Ratinder Paul Singh; Christener, Joel; Gaitonde, Jitendra; Ganti, Sirisha; Haridasa, Sridevi; Hegde, Damodar K.; Jayaram, Chaitra; Kasim, Rahila; Lakhani, Faizel; Patil, Swati; Sandhu, Harsimran S., System and method for managing data and policies.
  98. Wang, Yong; Chang, Shih-Fu, System and method for motion estimation and mode decision for low-complexity H.264 decoder.
  99. Ahuja, Ratinder Paul Singh; Deninger, William J., System and method for protecting specified data combinations.
  100. Ahuja, Ratinder Paul Singh; Deninger, William J., System and method for protecting specified data combinations.
  101. Ahuja, Ratinder Paul Singh; Jha, Bimalesh; Maini, Nitin; Patel, Sujata; Jain, Ankit R.; Hegde, Damodar K.; Nanganure, Rajaram V.; Pawar, Avinash Vishnu, System and method for providing data protection workflows in a network environment.
  102. Ahuja, Ratinder Paul Singh; Jha, Bimalesh; Maini, Nitin; Patel, Sujata; Jain, Ankit R.; Hegde, Damodar K.; Nanganure, Rajaram V.; Pawar, Avinash Vishnu, System and method for providing data protection workflows in a network environment.
  103. Deninger, William; de la Iglesia, Erik, System and method for word indexing in a capture system and querying thereof.
  104. Deninger, William; de la Iglesia, Erik, System and method for word indexing in a capture system and querying thereof.
  105. Everhart, Glenn C., System and method providing improved error detection related to transmission of data over a communication link.
  106. Kennedy, Lyndon; Chang, Shih-Fu, Systems and methods for image archaeology.
  107. Mariani,Rico; Broman,David M.; Rajan,Sanjeev K.; Cooper,Kristi L., Systems and methods for limiting access to potentially dangerous code.
  108. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Coleman, Shaun; King, Samuel; Khasgiwala, Ashish, Tag data structure for maintaining relational data over captured objects.
  109. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Coleman, Shaun; King, Samuel; Khasgiwala, Ashish, Tag data structure for maintaining relational data over captured objects.
  110. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  111. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  112. Pasternak, Michael, Verification of template integrity of monitoring templates used for customized monitoring of system activities.
  113. Lowe, Rick; Coleman, Shaun; de la Iglesia, Erik; King, Samuel; Khasgiwala, Ashish, Verifying captured objects before presentation.
  114. Lowe, Rick; Coleman, Shaun; de la Iglesia, Erik; King, Samuel; Khasgiwala, Ashish, Verifying captured objects before presentation.
  115. Paek, Seungyup; Benitez, Ana; Chang, Shih-Fu; Puri, Atul; Huang, Qian; Li, Chung-Sheng; Smith, John R.; Bergman, Lawrence, Video description system and method.
  116. Hillis, W. Daniel; Ferren, Bran, Video game controller hub with control input reduction and combination schemes.
  117. Anglin, Hugh W., Watermark systems and methods.
  118. Hurtado, Marco M.; Milsted, Kenneth L.; Nguyen, Kha D., Watermarking system that executes received watermarking instructions to embed a watermark.
  119. Rosenberg, Jonathan B.; Harrison, John; Remy, David L.; Creighton, Neal L., Web site identity assurance.
  120. Rosenberg,Jonathan B.; Harrison,John C.; Remy,David L.; Creighton, Jr.,Neal L., Web site identity assurance.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로