Secure and efficient content screening in a networked environment
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-001/00
G06F-021/10
G06F-021/44
G06F-021/60
H04L-009/08
H04L-009/32
G09C-005/00
H04L-029/06
출원번호
US-0080605
(2011-04-05)
등록번호
US-9607131
(2017-03-28)
발명자
/ 주소
Winograd, Joseph M.
Petrovic, Rade
Zhao, Jian
출원인 / 주소
Verance Corporation
대리인 / 주소
Perkins Coie LLP
인용정보
피인용 횟수 :
7인용 특허 :
220
초록▼
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. These operations can be conducted by one or more trusted devices that reside in a networked environment. The authenticity of various devices can be verified through the exchange of certificates that can further enable such devices to ascertain capabilities of one another. Based on the ascertained capabilities, an operational configuration for conducting watermark extraction and content screening can be determined.
대표청구항▼
1. A method, comprising: receiving a device authentication certificate at a first device from a second device;verifying an authenticity of the certificate;ascertaining capabilities of the second device; andbased on at least the ascertained capabilities of the second device, determining by the first
1. A method, comprising: receiving a device authentication certificate at a first device from a second device;verifying an authenticity of the certificate;ascertaining capabilities of the second device; andbased on at least the ascertained capabilities of the second device, determining by the first device an operational configuration among one or more of the first device, the second device, a trusted delegated device and a trusted slave device for conducting watermark extraction and content screening operations associated with a content, the operational configuration providing an allocation of resources needed to perform the watermark extraction and content screening operations and for fulfillment of a content use policy associated with an extracted watermark payload. 2. The method of claim 1, wherein the certificate comprises information indicative of at least a portion of the capabilities of the second device. 3. The method of claim 2, wherein the certificate is a digital transmission content protection over Internet protocol (DTCP-IP) certificate; andinformation regarding the capabilities of the second device is carried as part of the DCTP-IP certificate. 4. The method of claim 1, wherein at least a portion of the capabilities of the second device is ascertained from a source other than the certificate. 5. The method of claim 4, wherein the at least a portion of the capabilities of the second device is received through an additional communication with the second device. 6. The method of claim 1, wherein the ascertained capabilities of the second device comprises a capability to conduct some or all of the watermark extraction and content screening operations. 7. The method of claim 6, wherein the operational configuration designates the second device to perform at least one of the watermark extraction and content screening operations. 8. The method of claim 1, wherein the ascertained capabilities of the second device comprises a capability to grant computational and memory resources to other devices. 9. The method of claim 1, further comprising: receiving a device authentication certificate at the second device from the first device;verifying an authenticity of the certificate received from the first device; andascertaining capabilities of the first device by the second device. 10. The method of claim 9, wherein the certificate received from the first device comprises information indicative of at least a portion of the capabilities of the first device. 11. The method of claim 10, wherein the certificate received from the first device is a digital transmission content protection over Internet protocol (DTCP-IP) certificate; andinformation regarding the capabilities of the first device is carried as part of the DCTP-IP certificate. 12. The method of claim 9, wherein at least a portion of the capabilities of the first device is ascertained from a source other than the certificate. 13. The method of claim 12, wherein the at least a portion of the capabilities of the first device is received through an additional communication with the first device. 14. The method of claim 9, wherein the ascertained capabilities of the first device comprises a capability to conduct some or all of the watermark extraction and/or content screening operations. 15. The method of claim 9, wherein the ascertained capabilities of the first device comprises a capability to grant computational and memory resources to other devices. 16. The method of claim 9, wherein the operational configuration designates the first device to perform at least one of the watermark extraction and content screening operations. 17. The method of claim 9, wherein the operational configuration designates the first and the second devices to collaboratively perform the watermark extraction and content screening operation. 18. The method of claim 1, wherein the operational configuration designates at least one of the first and the second devices to conduct the watermark extraction and content screening operations in accordance with a factor selected from the group consisting of: availability of computational resources;availability of watermark extraction and screening capabilities;an integration complexity for a device manufacturer;a consumer experience;a processing performance; andan overall preference ranking. 19. The method of claim 1, wherein at least one of the first and second devices is configured to operate in a home network. 20. A device, comprising: a processor; anda memory, including processor executable code, the processor executable code when executed by the processor configures the device to:receive a device authentication certificate from a second device;verify an authenticity of the certificate;ascertain capabilities of the second device; andbased on at least the ascertained capabilities of the second device, determine an operational configuration among one or more of the device, the second device, a trusted delegated device and a trusted slave device for conducting watermark extraction and content screening operations associated with a content, the operational configuration providing an allocation of resources needed to perform the watermark extraction and content screening operations and for fulfillment of a content use policy associated with an extracted watermark payload. 21. The device of claim 20, wherein the certificate comprises information indicative of at least a portion of the capabilities of the second device. 22. The device of claim 21, wherein the certificate is a digital transmission content protection over Internet protocol (DTCP-IP) certificate; andinformation regarding the capabilities of the second device is carried as part of the DCTP-IP certificate. 23. The device of claim 20, wherein at least a portion of the capabilities of the second device is ascertained from a source other than the certificate. 24. The device of claim 23, wherein the at least a portion of the capabilities of the second device is received through an additional communication with the second device. 25. The device of claim 20, wherein the ascertained capabilities of the second device comprises a capability to conduct some or all of the watermark extraction and content screening operations. 26. The device of claim 25, wherein the operational configuration designates the second device to perform at least one of the watermark extraction and content screening operations. 27. The device of claim 20, wherein the ascertained capabilities of the second device comprises a capability to grant computational and memory resources to other devices. 28. The device of claim 20, wherein the processor executable code when executed by the processor further configures the device to: transmit a device authentication certificate to the second device, wherein the second device can ascertain capabilities of the device from the device authentication certificate. 29. The device of claim 28, wherein the certificate transmitted by the device comprises information indicative of at least a portion of the capabilities of the device. 30. The device of claim 29, wherein the certificate transmitted by the device is a digital transmission content protection over Internet protocol (DTCP-IP) certificate; andinformation regarding the capabilities of the device is carried as part of the DCTP-IP certificate. 31. The device of claim 28, wherein at least a portion of the capabilities of the device is ascertained from a source other than the certificate. 32. The device of claim 31, wherein the processor executable code when executed by the processor further configures the device to conduct an additional communication with the second to provide at least a portion of the capabilities of the to the second device. 33. The device of claim 28, wherein the capabilities of the device ascertained by the second device comprises a capability to conduct some or all of the watermark extraction and/or content screening operations. 34. The device of claim 28, wherein the capabilities of the device ascertained by the second device comprises a capability to grant computational and memory resources to other devices. 35. The device of claim 28, wherein the operational configuration designates the device to perform at least one of the watermark extraction and content screening operations. 36. The device of claim 28, wherein the operational configuration designates the device and the second device to collaboratively perform the watermark extraction and content screening operation. 37. The device of claim 20, wherein the operational configuration designates at least one of the device and the second device to conduct the watermark extraction and content screening operations in accordance with a factor selected from the group consisting of: availability of computational resources;availability of watermark extraction and screening capabilities;an integration complexity for a device manufacturer;a consumer experience;a processing performance; andan overall preference ranking. 38. The device of claim 20, wherein at least one of the device and second device is configured to operate in a home network. 39. A computer program product, embodied on a non-transitory computer readable medium, comprising: program code for receiving a device authentication certificate at a first device from a second device;program code for verifying an authenticity of the certificate;program code for ascertaining capabilities of the second device; andprogram code for, based on at least the ascertained capabilities of the second device, determining by the first device an operational configuration among one or more of the device, the second device, a trusted delegated device and a trusted slave device for conducting watermark extraction and content screening operations associated with a content, the operational configuration providing an allocation of resources needed to perform the watermark extraction and content screening operations and for fulfillment of a content use policy associated with an extracted watermark payload.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (220)
Bradley,Brett A., Adaptive prediction filtering for digital watermarking.
Petrovic Rade ; Jemili Kanaan ; Winograd Joseph M. ; Metois Eric, Apparatus and method for embedding and extracting information in analog signals using distributed signal features.
Petrovic, Rade, Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation.
Jensen James M. ; Lynch Wendell D. ; Perelshteyn Michael M. ; Graybill Robert B. ; Hassan Sayed ; Sabin Wayne, Apparatus and methods for including codes in audio signals and decoding.
Hashemian Hashem M. (Knoxville TN) Kerlin Thomas W. (Concord TN) Upadhyaya Belle R. (Knoxville TN), Apparatus for measuring the degradation of a sensor time constant.
Efron Edward (Irvine CA) McPherson James O. (Newport Beach CA) Kim Young B. (Long Beach CA), Audio evaluation of information stored on a record medium under control of video picture frame number.
Neubauer, Christian; Eberlein, Ernst; Plankenbuhler, Roland; Heuberger, Albert; Gerhauser, Heinz; Perthold, Rainer; Schott, Hartmut, Coding process for inserting an inaudible data signal into an audio signal, decoding process, coder and decoder.
Osamu Kawamae JP; Toshifumi Takeuchi JP; Hiroshi Yoshiura JP; Takao Arai JP, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
Johan P. M. G. Linnartz NL; Maurice J. J. J-B. Maes NL; Antonius A. C. M. Kalker NL; Geert F. G. Depovere NL; Peter M. J. Rongen NL; Christianus W. F. Vriens NL; Marten E. Van Dijk NL, Device for optically scanning a record carrier.
Schumann,Robert Wilhelm; Whittemore,Richard; Goldschlag,David Mosche; Kravitz,David William; Iu,Siu Leong; Mercier,Guillaume; Bergeron,Michael; Ehrhardt,Jack; Vitkus,Richard, Digital content distribution system and method.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Lee, Chong U.; Lam, Katherine S.; Nicolas, Julien J.; Atrero, Edward, Digital system for embedding a pseudo-randomly modulated auxiliary data sequence in digital samples.
Muratani, Hirofumi, Digital watermark embedding device, digital watermark detection device, digital information distribution device, and, storage medium.
Alattar,Adnan M.; Levy,Kenneth L.; Stager,Reed R.; Rhoads,Geoffrey B.; Ellingson,Eric E., Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding.
Preuss Robert D. (Boston MA) Roukos Salim E. (Scarsdale NY) Huggins A. W. F. (Arlington MA) Gish Herbert (Newton MA) Bergamo Marcos A. (Wellesley MA) Peterson Patrick M. (Cambridge MA) Derr Alan G. (, Embedded signalling.
Rasmussen Harry R. (Tacoma WA) LaBounty Jack D. (Bellevue WA) Rosenow Michael J. (Issaquah WA), Encryption/decryption apparatus with non-accessible table of keys.
Willis Donald H. (Indianapolis IN), Luma/chroma separation filter with common delay element for comb filter separation and recursive noise reduction of comp.
Fardeau Michel (Les Milles FRX) Briend Michel (Roquevaire FRX) Tommasi Marc (Ventabren FRX) Galant Serge (Aix-en-Provence FRX), Method and apparatus for automatically identifying a program including a sound signal.
Fardeau Michel,FRX ; Briend Michel,FRX ; Tommasi Marc,FRX ; Galant Serge,FRX, Method and apparatus for automatically identifying a program including a sound signal.
Anders Nystrom Per Johan,SEX ; Larsson Carl Johan Henrik,SEX, Method and apparatus for communicating a block of digital information between a sending and a receiving station.
John O. Ryan ; Patrice Capitant ; Clayton L. Davidson ; James Holzgrafe ; Kordian J Kurowski ; Andrew Mellows ; Tony Forrest Rodriquez, Method and apparatus for copy-once watermark for video recording.
Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin ; Boney Laurence,FRX, Method and apparatus for embedding data, including watermarks, in human perceptible sounds.
Young Philip L. (1548 County Rd. 59 Fremont OH 43420) Greenberg Leonard H. (1147 Elm Ave. ; #204 Glendale CA 91201), Method and apparatus for modifying a video signal to inhibit unauthorized videotape recording and subsequent reproductio.
Winograd Joseph M. ; Petrovic Rade ; Metois Eric ; Jemili Kanaan, Method and apparatus for preventing removal of embedded information in cover signals.
Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for the protection of signal copy.
Ramsay Thomas E. (Minneapolis MN) Elkins James C. (Golden Valley MN), Method and apparatus for the transmission, storage, and retrieval of documents in an electronic domain.
Copriviza Robert C. (Tarzana CA) Dubin Arnold M. (Calabasas CA) Ackerman Edward B. (Encino CA) Wood Jackson B. (Tarzana CA) Eakins Jeffrey S. (Claremont CA) Harmon David D. (Torrance CA), Method and apparatus for video signal encoding, decoding and monitoring.
Linnartz Johan P. M. G.,NLX, Method and arrangement for detecting a watermark using statistical characteristics of the information signal in which the watermark is embedded.
Ellis Michael D. (Boulder CO) Dunn Stephen M. (Boulder CO) Fellinger Michael W. (Boulder CO) Younglove Fancy B. (Boulder CO) James David M. (Fort Collins CO) Clifton David L. (Boulder CO) Land Richar, Method and system for producing a signature characterizing an audio broadcast signal.
Chow Chee-Seng (Briarcliff Manor NY) Kutten Shay (Rockaway NJ) Yung Marcell Mordechay (New York NY), Method to deter document and intellectual property piracy through individualization.
Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for enhancing the robustness of watermark extraction from digital host content.
Fenton Patrick,CAX ; Van Dierendonck Albert J., Pseudorandom noise ranging receiver which compensates for multipath distortion by dynamically adjusting the time delay s.
Fenton Patrick (Calgary CAX), Pseudorandom noise ranging receiver which compensates for multipath distortion by making use of multiple correlator time.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Gahagan Dean A. (Kent WA) Ogami Kenneth Y. (Bothell WA), Suppressed clock pulse-duration modulator for direct sequence spread spectrum transmission systems.
Schumann Robert W. ; Iu Siu-Leong ; Bugwadia Kobad ; Mercier Guillaume ; Ramadoss Shiva ; Bergeron Michael ; Ehrhardt Jack, System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies.
Sizer ; II Theodore ; August Katherine G. ; Caldwell Charles D. ; Henrick Robert F., System for processing broadcast stream comprises a human-perceptible broadcast program embedded with a plurality of human-imperceptible sets of information.
Brian Chen ; Gregory W. Wornell, System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators.
Smith Gregory L.,CAX ; Wiltshire John H. D.,CAX ; Nolan Marvin C.,CAX, Technique for embedding a code in an audio signal and for detecting the embedded code.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.