IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0788118
(2010-05-26)
|
등록번호 |
US-8099601
(2012-01-17)
|
발명자
/ 주소 |
- Serret-Avila, Xavier
- Boccon-Gibod, Gilles
|
출원인 / 주소 |
- Intertrust Technologies Corp.
|
대리인 / 주소 |
Finnegan, Henderson, Farabow, Garrett & Dunner, LLP
|
인용정보 |
피인용 횟수 :
5 인용 특허 :
35 |
초록
▼
Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in
Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The data signal is then stored and distributed on, e.g., a compact disc, a DVD, or the like. When a user attempts to access or use a portion of the data signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If the signature-containing watermark is not found, the signal is checked for the presence of the strong watermark. If the strong watermark is found, further use of the signal is inhibited, as the presence of the strong watermark, in combination with the absence or corruption of the signature-containing watermark, provides evidence that the signal has been improperly modified. If, on the other hand, the strong mark is not found, further use of the data signal can be allowed, as the absence of the strong mark indicates that the data signal was never registered with the signature-containing watermark.
대표청구항
▼
1. A system for protecting an electronic file from unauthorized use, the system comprising: a processor; anda non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising: receiving a request to copy the electron
1. A system for protecting an electronic file from unauthorized use, the system comprising: a processor; anda non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising: receiving a request to copy the electronic file from the system to a remote computer system;checking the electronic file for the presence of a signature-containing watermark;if the signature-containing watermark is detected: retrieving the signature from the watermark,using the signature to verify the authenticity of at least a portion of the electronic file,if the verification is successful, granting the request to copy the electronic file to the remote computer system, andif the verification is not successful, denying the request to copy the electronic file to the remote computer system; anif the signature-containing watermark is not detected: checking the electronic file for the presence of another watermark,if the other watermark is found, denying the request to copy the electronic file to the remote computer system, andif the other watermark is not found, granting the request to copy the electronic file to the remote computer system. 2. The system of claim 1, wherein the other watermark is a strong watermark. 3. The method of claim 1, wherein the other watermark is relatively more difficult to detect than the signature-containing watermark. 4. A system for protecting an electronic file from unauthorized use, the system comprising: a processor; anda non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising: receiving a request to copy the electronic file from the system to a remote computer system;checking the electronic file for the presence of a signature-containing watermark;if the signature-containing watermark detected: retrieving the signature from the watermark,using the signature to verify the authenticity of at least a portion of the electronic file,if the verification is successful, granting the request to copy the electronic file to the remote computer system, andif the verification is not successful, denying the request to copy the electronic file to the remote computer system; andif the signature-containing watermark is not detected: checking the electronic file for the presence of another watermark,if the other watermark is found, granting the request to copy the electronic file to the remote computer system, andif the other watermark is not found, denying the request to copy the electronic file to the remote computer system. 5. The system of claim 4, wherein the other watermark is a strong watermark. 6. The system of claim 4, wherein the other watermark is relatively more difficult to detect than the signature-containing watermark. 7. A system for protecting an electronic file from unauthorized use, the system comprising: a processor; anda non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising: receiving a request to use the electronic file in a predefined manner;checking the electronic file for the presence of a signature-containing watermark;if the signature-containing watermark is detected: retrieving the signature from the watermark,using the signature to verify the authenticity of at least a portion of the electronic file,if the verification is successful, granting the request to use the electronic file in the predefined manner, andif the verification is not successful, denying the request to use the electronic file in the predefined manner; andif the signature-containing watermark is not detected: checking the electronic file for the presence of another watermark;if the other watermark is found, denying the request to use the electronic file in the predefined manner, andif the other watermark is not found, granting the request to use the electronic file in the predefined manner. 8. The system of claim 7, wherein the predefined manner comprises printing contents of the electronic file. 9. The system of claim 7, wherein the predefined manner comprises viewing contents of the electronic file. 10. The system of claim 7, wherein the predefined manner comprises modifying the electronic file. 11. The system of claim 7, wherein the predefined manner comprises one or more of printing, copying, viewing, and modifying the electronic file. 12. The system of claim 7, wherein the other watermark is a strong watermark. 13. The system of claim 7, wherein the other watermark is relatively more difficult to detect than the signature-containing watermark. 14. A system for protecting an electronic file from unauthorized use, the system comprising: a processor; anda non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising:receiving a request to use the electronic file in a predefined manner;checking the electronic file for the presence of a signature-containing watermark;if the signature-containing watermark is detected: retrieving the signature from the watermark,using the signature to verify the authenticity of at least a portion of the electronic file,if the verification is successful, granting the request to use the electronic file in the predefined manner, andif the verification is not successful, denying the request to use the electronic file in the predefined manner; andif the signature-containing watermark is not detected: checking the electronic file for the presence of another watermark,if the other watermark is found, granting the request to use the electronic file in the predefined manner, andif the other watermark is not found, denying the request to use the electronic file in the predefined manner. 15. The system of claim 14, wherein the predefined manner comprises printing contents of the electronic file. 16. The system of claim 14, wherein the predefined manner comprises viewing contents of the electronic file. 17. The system of claim 14, wherein the predefined manner comprises modifying the electronic file. 18. The system of claim 14, wherein the predefined manner comprises one or more of printing, copying, viewing, and modifying the electronic file. 19. The system of claim 14, wherein the other watermark is a strong watermark. 20. The system of claim 14, wherein the other watermark is relatively more difficult to detect than the signature-containing watermark.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.