Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
대표청구항▼
What is claimed is: 1. A method for watermarking computer code utilizing a system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: mapping a set of payload information onto a
What is claimed is: 1. A method for watermarking computer code utilizing a system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: mapping a set of payload information onto a first set of sparse space strings, wherein each sparse space string in the first set of sparse space strings is chosen randomly from a second set of sparse space strings; inserting a sparse space string from the first set of sparse space strings into the computer code, and distributing the computer code to a recipient, wherein the recipient of the computer code: extracts at least some of the inserted sparse space string from the computer code to form an extracted string, and transmits the extracted string to a database operator, wherein the database operator: identifies the sparse space string in the first set of sparse space strings associated with the extracted string, retrieves the payload information mapped to the identified sparse space string, and transmits the payload information to the recipient. 2. The method as in claim 1, wherein the number of sparse space strings in the second set of sparse space strings is at least 21000 times greater than the number of sparse space strings in the first set of sparse space strings. 3. The method as in claim 1, further comprising: dividing the sparse space string to be inserted into the computer code into a sequence of subparts, wherein inserting the sparse space string into the computer code further includes inserting each subpart of the sparse space string into the computer code, and wherein extracting at least some of the inserted sparse space string further includes extracting at least one of the subparts in the sequence of subparts. 4. The method as in claim 3, wherein each subpart in the sequence of subparts is randomly inserted into the computer code. 5. The method as in claim 3, wherein one or more subparts in the sequence of subparts is inserted multiple times into the computer code. 6. The method as in claim 3, wherein one or more subparts in the sequence of subparts is inserted using error correction codes. 7. The method as in claim 3, wherein the extracted string contains less than all of the subparts of the inserted sparse space string. 8. The method as in claim 7, wherein the database operator uses one or more probability techniques to determine which sparse space string in the first set of sparse space strings corresponds to the extracted string. 9. The method as in claim 3, further comprising: combining each subpart with one or more of position and signature information to create a modified subpart; and encrypting each of the modified subparts. 10. The method as in claim 9, wherein the position information is used to construct the extracted string.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (88)
Zhao, Jian, Active watermarks and watermark agents.
Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Graham, Stanley E.; Rhoads, Geoffrey B., Management of documents and other objects using optical devices.
Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
Wang Wu ; Kongara Prasad, Method and apparatuses for transferring data for multiple applications through a single communication link in response to authentication information.
Nakamura Takeshi,JPX ; Sugaya Kazumi,JPX ; Oriyama Yoshiaki,JPX, Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark.
Davidson Robert I. (Bellevue WA) Myhrvold Nathan (Bellevue WA) Vogel Keith Randel (Duvall WA) Yuval Gideon Andreas (Mercer Island WA) Shupak Richard (Bellevue WA) Apperson Norman Eugene (Bellevue WA), Method and system for improving the locality of memory references during execution of a computer program.
Nakamura Takao,JPX ; Ogawa Hiroshi,JPX ; Takashima Yoichi,JPX, Method for embedding and reading watermark-information in digital form, and apparatus thereof.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Venkatesan, Ramarathnam; Vazirani, Vijay, Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Rhoads,Geoffrey B.; Rodriguez,Tony F.; McKinley,Tyler J.; Miller,Marc D.; Hierholzer,Kirstin, User control and activation of watermark enabled objects.
Ammon Gustafson ; Geoffrey Rhoads ; Adnan V. Alattar ; Ravi K. Sharma ; Clay Davidson, Watermark detection utilizing regions with higher probability of success.
Braudaway, Gordon W.; Martens, Marco; Mintzer, Frederick C.; Shearer, James B.; Tresser, Charles P.; Wu, Chai W., Watermarks for customer identification.
Home, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Homing, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan, Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.