Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
대표청구항▼
1. A method for watermarking computer code, the method performed by a computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the system to perform the method, the method comprising: statistically analyzing the computer code t
1. A method for watermarking computer code, the method performed by a computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the system to perform the method, the method comprising: statistically analyzing the computer code to generate a probabilistic state model relating to sequences of operation codes included in the computer code, wherein the analyzing comprises: analyzing the computer code to identify a first operation code included in the computer code;analyzing the computer code to identify a second operation code included in the computer code; anddetermining a probability that the first operation code is followed by the second operation code within the computer code;generating one or more statistical models of the computer code based on the probabilistic state model;generating at least one watermark based on the one or more statistical models of the computer code; andinserting the at least one watermark into the computer code. 2. The method of claim 1, wherein the method further comprises: prior to inserting the at least one watermark, accepting the at least one watermark for insertion based on the one or more statistical models of the computer code. 3. The method of claim 1, wherein statistically analyzing the computer code further comprises: analyzing the computer code to determine a number of times each of a plurality of operation codes are included in the computer code;identifying a plurality of common operation codes based on the determined number of times each of the plurality of operation codes are included in the computer code; andgenerating the statistical model based on the identified plurality of common operation codes. 4. The method of claim 3, wherein generating the at least one watermark is further based on at least one operation code of the plurality of common operation codes. 5. The method of claim 1, wherein the probabilistic state model comprises a first node associated with the first operation code, a second node associated with the second operation code, and an edge associated with the determined probability that the first operation code is followed by the second operation code within the computer code. 6. The method of claim 1, wherein inserting the at least one watermark comprises inserting the at least one watermark into inert code included in the computer code. 7. The method of claim 1, wherein inserting the at least one watermark comprises inserting the at least one watermark into unused code included in the computer code. 8. The method of claim 1, wherein inserting the at least one watermark comprises identifying unused code included in the computer code and replacing the unused code with the watermark. 9. The method of claim 1, wherein the at least one watermark comprises inert code. 10. The method of claim 1, wherein generating the at least one watermark is further based on a plurality of watermark primitives. 11. A method for watermarking a first computer code, the method performed by a computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the system to perform the method, the method comprising: statistically analyzing a second computer code to generate a probabilistic state model relating to sequences of operation codes included in the second computer code, where the analyzing comprises: analyzing the second computer code to identify a first operation code included in the second computer code;analyzing the second computer code to identify a second operation code included in the second computer code; anddetermining a probability that the first operation code is followed by the second operation code within the second computer code;generating one or more statistical models of the second computer code based on the probabilistic state model;generating at least one watermark based on the one or more statistical models of the second computer code; andinserting the at least one watermark into the first computer code. 12. The method of claim 11, wherein the first computer code is different, at least in part, than the second computer code. 13. The method of claim 11, wherein the first computer code is identical to the second computer code. 14. The method of claim 11, wherein the method further comprises: prior to inserting the at least one watermark, accepting the at least one watermark for insertion based on the one or more statistical models of the second computer code. 15. The method of claim 11, wherein statistically analyzing the computer code further comprises: analyzing the second computer code to determine a number of times each of a plurality of operation codes are included in the second computer code;identifying a plurality of common operation codes based on the determined number of times each of the plurality of operation codes are included in the second computer code; andgenerating the statistical model based on the identified plurality of common operation codes. 16. The method of claim 15, wherein generating the at least one watermark is further based on at least one operation code of the plurality of common operation codes. 17. The method of claim 11, wherein inserting the at least one watermark comprises inserting the at least one watermark into unused code included in the first computer code. 18. The method of claim 11, wherein inserting the at least one watermark comprises identifying unused code included in the first computer code and replacing the unused code with the watermark. 19. The method of claim 11, wherein the at least one watermark comprises inert code. 20. The method of claim 11, wherein generating the at least one watermark is further based on a plurality of watermark primitives.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (83)
Zhao, Jian, Active watermarks and watermark agents.
Venkatesan, Ramarathnam; Yacobi, Yacov, License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer.
Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Graham, Stanley E.; Rhoads, Geoffrey B., Management of documents and other objects using optical devices.
Wang Wu ; Kongara Prasad, Method and apparatuses for transferring data for multiple applications through a single communication link in response to authentication information.
Nakamura Takeshi,JPX ; Sugaya Kazumi,JPX ; Oriyama Yoshiaki,JPX, Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark.
Nakamura Takao,JPX ; Ogawa Hiroshi,JPX ; Takashima Yoichi,JPX, Method for embedding and reading watermark-information in digital form, and apparatus thereof.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Home, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Homing, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan, Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
Venkatesan, Ramarathnam; Vazirani, Vijay, Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Rhoads,Geoffrey B.; Rodriguez,Tony F.; McKinley,Tyler J.; Miller,Marc D.; Hierholzer,Kirstin, User control and activation of watermark enabled objects.
Ammon Gustafson ; Geoffrey Rhoads ; Adnan V. Alattar ; Ravi K. Sharma ; Clay Davidson, Watermark detection utilizing regions with higher probability of success.
Braudaway, Gordon W.; Martens, Marco; Mintzer, Frederick C.; Shearer, James B.; Tresser, Charles P.; Wu, Chai W., Watermarks for customer identification.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.