[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20010026618A1 - Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels - Google Patents

Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels Download PDF

Info

Publication number
US20010026618A1
US20010026618A1 US09/790,566 US79056601A US2001026618A1 US 20010026618 A1 US20010026618 A1 US 20010026618A1 US 79056601 A US79056601 A US 79056601A US 2001026618 A1 US2001026618 A1 US 2001026618A1
Authority
US
United States
Prior art keywords
signal
rights management
control information
appliance
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/790,566
Other versions
US6449367B2 (en
Inventor
David Van Wie
Robert Weber
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intertrust Technologies Corp
Original Assignee
Intertrust Technologies Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US09/790,566 priority Critical patent/US6449367B2/en
Application filed by Intertrust Technologies Corp filed Critical Intertrust Technologies Corp
Publication of US20010026618A1 publication Critical patent/US20010026618A1/en
Priority to US10/189,231 priority patent/US6618484B2/en
Publication of US6449367B2 publication Critical patent/US6449367B2/en
Application granted granted Critical
Priority to US10/618,427 priority patent/US8307212B2/en
Priority to US12/259,243 priority patent/US20090113200A1/en
Priority to US13/667,275 priority patent/US20130298249A1/en
Anticipated expiration legal-status Critical
Assigned to ORIGIN FUTURE ENERGY PTY LTD reassignment ORIGIN FUTURE ENERGY PTY LTD SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERTRUST TECHNOLOGIES CORPORATION
Assigned to INTERTRUST TECHNOLOGIES CORPORATION reassignment INTERTRUST TECHNOLOGIES CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: ORIGIN FUTURE ENERGY PTY LTD.
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00137Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users
    • G11B20/00159Parental control systems
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00188Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00188Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
    • G11B20/00195Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier using a device identifier associated with the player or recorder, e.g. serial numbers of playback apparatuses or MAC addresses
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00557Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein further management data is encrypted, e.g. sector headers, TOC or the lead-in or lead-out areas
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0071Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a purchase action
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • G11B20/00768Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/0084Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific time or date
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/02Editing, e.g. varying the order of information signals recorded on, or reproduced from, record carriers
    • G11B27/031Electronic editing of digitised analogue information signals, e.g. audio or video signals
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/10Indexing; Addressing; Timing or synchronising; Measuring tape travel
    • G11B27/19Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier
    • G11B27/28Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording
    • G11B27/32Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording on separate auxiliary tracks of the same or an auxiliary record carrier
    • G11B27/327Table of contents
    • G11B27/329Table of contents on a disc [VTOC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/40052High-speed IEEE 1394 serial bus
    • H04L12/40104Security; Encryption; Content protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/40052High-speed IEEE 1394 serial bus
    • H04L12/40117Interconnection of audio or video/imaging devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42646Internal components of the client ; Characteristics thereof for reading from or writing on a non-volatile solid state storage medium, e.g. DVD, CD-ROM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • H04N21/4415Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card using biometric characteristics of the user, e.g. by voice recognition or fingerprint scanning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44204Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44236Monitoring of piracy processes or activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1483Protection against unauthorised use of memory or access to memory by checking the subject access rights using an access-table, e.g. matrix or list
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B2020/10916Seeking data on the record carrier for preparing an access to a specific address
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B2220/00Record carriers by type
    • G11B2220/20Disc-shaped record carriers
    • G11B2220/21Disc-shaped record carriers characterised in that the disc is of read-only, rewritable, or recordable type
    • G11B2220/215Recordable discs
    • G11B2220/216Rewritable discs
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B2220/00Record carriers by type
    • G11B2220/20Disc-shaped record carriers
    • G11B2220/21Disc-shaped record carriers characterised in that the disc is of read-only, rewritable, or recordable type
    • G11B2220/215Recordable discs
    • G11B2220/218Write-once discs
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B2220/00Record carriers by type
    • G11B2220/20Disc-shaped record carriers
    • G11B2220/25Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
    • G11B2220/2537Optical discs
    • G11B2220/2562DVDs [digital versatile discs]; Digital video discs; MMCDs; HDCDs
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B2220/00Record carriers by type
    • G11B2220/20Disc-shaped record carriers
    • G11B2220/25Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
    • G11B2220/2537Optical discs
    • G11B2220/2562DVDs [digital versatile discs]; Digital video discs; MMCDs; HDCDs
    • G11B2220/2575DVD-RAMs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91321Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy protection control signal, e.g. a record inhibit signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91328Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy management signal, e.g. a copy generation management signal [CGMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91335Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • H04N5/77Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
    • H04N5/772Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera the recording apparatus and the television camera being placed in the same enclosure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • H04N5/775Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/84Television signal recording using optical recording
    • H04N5/85Television signal recording using optical recording on discs or drums
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/79Processing of colour television signals in connection with recording
    • H04N9/80Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
    • H04N9/804Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components
    • H04N9/8042Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components involving data reduction

Definitions

  • the present inventions relate generally to computer security, and more particularly to steganographic techniques for hiding or encoding electronic control information within an information signal carried by an insecure communications channel. Still more particularly, the present inventions relate to systems, methods and techniques that substantially invisibly and/or indelibly convey, over analog or other insecure communications channels, digital rights management control information for use within a virtual distribution environment electronic rights management system.
  • a related problem relates to the conversion of information between the analog and digital domains. Even if information is effectively protected and controlled initially using strong digital rights management techniques, an analog copy of the same information may no longer be securely protected.
  • DVD Digital Versatile Disk
  • a consumer now has a high quality analog copy of the original digital property.
  • a person could re-record the analog signal on a DVD-R (a Digital Versatile Disk appliance and media supporting both read and write operations). This recording will in many circumstances have substantial quality—and would no longer be subject to “pay per view” or other digital rights management controls associated with the digital form of the same content.
  • the present inventions solve these and other problems by providing “end to end” secure rights management protection allowing content providers and rights holders to be sure their content will be adequately protected—irrespective of the types of devices, signaling formats and nature of signal processing within the content distribution chain.
  • This “end to end” protection also allows authorized analog appliances to be easily, seamlessly and cost-effectively integrated into a modem digital rights management architecture.
  • the present inventions may provide a Virtual Distribution Environment (“VDE”) in which electronic rights management control information may be delivered over insecure (e.g., analog) communications channels.
  • VDE Virtual Distribution Environment
  • This Virtual Distribution Environment is highly flexible and convenient, accommodating existing and new business models while also providing an unprecedented degree of flexibility in facilitating ad hoc creation of new arrangements and relationships between electronic commerce and value chain participants—regardless of whether content is distributed in digital and/or analog formats.
  • An indelible method of associating electronic commerce and/or rights management controls with analog content such as film, video, and sound recordings.
  • the present inventions use “steganography” to substantially indelibly and substantially invisibly encode rights management and/or electronic commerce rules and controls within an information signal such as, for example, an analog signal or a digitized (for example, sampled) version of an analog signal.
  • Another “steganographic” technique encodes a secret message within another, routine message.
  • the message “Hey Elmer, Lisa Parked My Edsel” encodes the secret message “HELP ME”—the first letter of each word of the message forming the letters of the secret message (“Hey Elmer, Lisa Parked My Edsel”).
  • HELP ME the first letter of each word of the message forming the letters of the secret message
  • Variations on this technique can provide additional security, but the basic concept is the same—finding a way to hide a secret message within information that can or will be sent over an insecure channel.
  • Invisible ink is another commonly used “steganography” technique.
  • the secret message is written using a special disappearing or invisible ink.
  • the message can be written on a blank piece of paper, or more commonly, on the back or front of the piece of paper carrying a routine-looking or legitimate letter or other written communication.
  • the recipient performs a special process on the received document (e.g., exposing it to a chemical or other process that makes the invisible ink visible) so that he or she can read the message.
  • a special process on the received document e.g., exposing it to a chemical or other process that makes the invisible ink visible
  • anyone intercepting the paper will be unable to detect the secret message—or even know that it is there—unless the interceptor knows to look for the invisible message and also knows how to treat the paper to make the invisible ink visible.
  • the present inventions use steganography to ensure that encoded control information is both substantially invisible and substantially indelible as it passes over an insecure communications channel.
  • a secure, trusted component such as a protected processing environment described in Ginter et al. recovers the steganographically-encoded control information, and uses the recovered information to perform electronic rights management (for example, on analog or other information signals carried over the same channel).
  • One specific aspect provided by the present inventions involve steganographically encoding digital rights management control information onto an information signal such as, for example, an analog or digitized television, video or radio signal.
  • the steganographic encoding process substantially inextricably intertwines the digital control information with images, sounds and/or other content the information signal carries—but preferably without noticeably degrading or otherwise affecting those images, sounds and/or other content. It may be difficult to detect (even with educated signal processing techniques) that the analog signal has been steganographically encoded with a rights management control signal, and it may be difficult to eliminate the steganographically encoded control signal without destroying or degrading the other information or content the signal carries.
  • the present inventions also provide a secure, trusted protected processing environment to recover the steganographically-encoded control signal from the information signal, and to enforce rights management processes based on the recovered steganographically encoded control signal. This allows the information signal delivery mechanism to be fully integrated (and made compatible) with a digital virtual distribution environment and/or other electronic rights management system.
  • steganographically encoded, digital rights management control information may be used in conjunction with a scrambled and/or encrypted information signal.
  • the scrambling and/or encryption can be used to enforce the rights management provided in accordance with the steganographically encoded rights management control information.
  • the control signal can be steganographically decoded and used to control, at least in part, under what circumstances and/or how the information signal is to be descrambled and/or decrypted.
  • digital certificates can be used to securely enforce steganographically encoded rights management control information.
  • steganography is used to encode an information signal with rights management control information in the form of one or more protected organizational structures having association with electronic controls.
  • the electronic controls may, for example, define permitted and/or required operation(s) on content, and consequences of performing and/or failing to perform such operations.
  • the organizational structure(s) may identify, implicitly or explicitly, the content the electronic controls apply to.
  • the organizational structure(s) may also define the extent of the content, and semantics of the content.
  • the type, amount and characteristics of the steganographically encoded rights management control information are flexible and programmable—providing a rich, diverse mechanism for accommodating a wide variety of rights management schemes.
  • the control information can be used to securely enforce straightforward secure rights management consequences such as “copy/no copy/one copy” type controls—but are by no means limited to such models.
  • the present invention can be used to enable and enforce much richer, more complex rights management models—including for example those involving usage auditing, automatic electronic payment, and the use of additional electronic network connections.
  • the rights management control arrangements provided by the present invention are infinitely extensible and scaleable—fully accommodating future models as they are commercially deployed while preserving full compatibility with different (and possibly more limited) rights management models deployed during earlier stages.
  • the organizational structure(s) may be steganographically encoded in such a way that they are protected for purposes of secrecy and/or integrity.
  • the employed steganographic techniques may provide some degree of secrecy protection—or other security techniques (e.g., digital encryption, digital seals, etc.) may be used to provide a desired or requisite degree of security and/or integrity protection for the steganographically encoded information.
  • the organizational structure(s) may comprise digital electronic containers that securely contain corresponding digital electronic control information. Such containers may, for example, use cryptographic techniques.
  • the organizational structure(s) may define associations with other electronic control information. The other electronic control information may be delivered independently over the same or different communications path used to deliver the organizational structure(s).
  • the steganographic techniques employed may involve applying the organizational structure information in the form of high frequency “noise” to an analog information signal. Spectral transforms may be used to apply and recover such steganographically-encoded high frequency “noise.” Since the high frequency noise components of the information signal may be essentially random, adding a pseudo-random steganographically encoded control signal component may introduce substantially no discernible information signal degradation, and may be difficult to strip out once introduced (at least without additional knowledge of how the signal was incorporated, which may include a shared secret).
  • a steganographic encoding process analyzes an information signal to determine how much excess bandwidth is available for steganographic encoding.
  • the steganographic encoding process may use variable data rate encoding to apply more control information to parts of an information signal that use much less than all of the available communications channel bandwidth, and to apply less control information to parts of an information signal that use nearly all of the available communications channel bandwidth.
  • multiple organizational structures may be steganographically encoded within a given information signal.
  • the multiple organizational structures may apply to different corresponding portions of the information signal, and/or the multiple organizational structures may be repetitions or copies of one another to ensure that an electronic appliance has “late entry” and/or error correcting capability and/or can rapidly locate a pertinent organizational structure(s) starting from any arbitrary portion of the information signal stream.
  • an organizational structure may be steganographically encoded within a particular portion of a content-carrying information signal to which the organizational structure applies—thereby establishing an implicit correspondence between the organizational structure and the identification and/or extent and/or semantics of the information content to which the organizational structure applies.
  • the correspondence may, for example, include explicit components (e.g., internally stated start/end points), with the storage or other physical association determined by convenience (i.e., it may make sense to put the organizational structure close to where it is used, in order to avoid seeking around storage media to find it).
  • pointers can be steganographically encoded into parts of an information signal stream that has little excess available bandwidth. Such pointers may be used, for example, to direct an electronic appliance to portions of the information signal stream having more available bandwidth for steganographic encoding. Such pointers may provide improved steganographic decode access time—especially, for example, in applications in which the information signal stream is stored or otherwise available on a random access basis.
  • FIG. 1 shows a virtual distribution environment providing steganographic encoding of digital rights management control information
  • FIGS. 1 A- 1 E show example electronic appliances embodying aspects of this invention
  • FIG. 2 shows an example of how electronic control information can be steganographically encoded within an image
  • FIG. 3 shows an example rights management component providing a steganographic decoding function
  • FIG. 4 shows an example of how steganographically encoded electronic control signals can be extracted and used for digital rights management
  • FIGS. 5 A- 5 D show example techniques for enforcing steganographically encoded rights management control information
  • FIGS. 5 E- 5 F show example “end to end” protected distribution systems provided in accordance with the invention.
  • FIG. 6 shows an example of multiple sets of digital rights management control information steganographically encoded onto different parts of the same information signal stream
  • FIG. 7A shows an example detailed steganographic encoding process
  • FIG. 7B shows an example detailed steganographic decoding process
  • FIG. 8 shows an example frequency domain view of an example steganographic signal encoding technique
  • FIG. 9 shows an example use of a variable steganographic encoding rate to avoid exceeding channel bandwidths
  • FIGS. 10 and 10A show how steganographically encoded pointers can be used to minimize access times to control signals steganographically encoded onto information signal streams available on a random access basis;
  • FIG. 11 shows an example steganographically encoded organizational structure
  • FIG. 12 shows an example electronic appliance architecture having electronic rights management capabilities based at least in part on steganographically encoded control information
  • FIGS. 13 and 13A show example control steps that may be performed by the FIG. 12 appliance
  • FIG. 14 shows an example steganographic refresh arrangement
  • FIGS. 15 A- 15 F show example distribution systems using steganographic encoding of rights management control information along at least one leg of an information distribution path.
  • FIG. 1 shows an example Virtual Distribution Environment (VDE) 50 employing steganography to deliver electronic digital rights management control information over an insecure (e.g., analog) communications channel.
  • VDE Virtual Distribution Environment
  • a provider 60 delivers an information signal 70 to multiple electronic appliances 100 ( 1 ), . . . , 100 (N).
  • provider 60 is shown as being a television broadcaster that delivers an analog television information signal 70 over a wireless or cable communications path, and appliances 100 ( 1 ), . . . , 100 (N) are shown as being home color television sets 106 .
  • FIGS. 1 A- 1 E the present inventions may be used by a variety of different types of electronic appliances 100 receiving a variety of different types of information signals via a variety of different types of communications channels.
  • provider 60 steganographically encodes electronic rights management control information 126 into the information signal 70 .
  • This control information 126 is represented in this diagram as a traffic light because it may define permitted and/or required operation(s), and consequences of performing or failing to perform such operations.
  • control information 126 could specify that a viewer or class of viewers has permission to watch a particular program, is forbidden to watch a program, or may watch a program only under certain conditions (for example, based on paying a certain amount, being over a certain age, etc.).
  • the control information 126 is shown as being packaged within an electronic “container” 136 .
  • Container 136 (which in at least one example is provided by steganographic encoding techniques) is used to protect the integrity of the control information 126 .
  • the provider 60 encodes the electronic rights management control information 126 onto information signal 70 using steganographic techniques that make the control information both:
  • control information 126 is substantially indelibly encoded because, in this example, it is substantially inextricably intertwined with the television images and/or sound—and can't easily be eliminated from information signal 70 without destroying the images, sound or other information carried by the information signal.
  • steganographically encoding rights management control information will generally survive compression and decompression of a digitized analog signal, and will also survive repeated analog/digital/analog conversion sequences.
  • the steganographically encoded control information 126 is substantially indelible, the television viewer is not bothered by the steganographically encoded information because the steganographically encoded rights management control information is, in this example, also encoded substantially invisibly. In fact, the viewer may not be able to see the steganographic control information at all—and it may have no effect whatsoever on his or her viewing experience (other than in terms of the effect is has on associated rights management processes).
  • the control information 126 is shown in dotted lines on the FIG. 1 screens of television sets 106 to emphasize that the control information is substantially inextricably intertwined with the television images and/or sounds—and yet can't really be seen or noticed by the television viewer.
  • FIG. 2 shows an example of how digital control information 126 may be encoded within an image 128 so that, in one particular example, it is both substantially invisible and substantially indelible.
  • substantially invisible may refer to the characteristic of the encoded control information as not substantially interfering with or adversely affecting the viewer's experience in viewing image 128 or otherwise using the content carried by the information signal 70 and/or that it is difficult to detect using various types of signal processing techniques, for example.
  • invisibility can be a measurable quantity (measured in a number of processor instructions, such as MIPS years, for example), and can be related to signal processing as opposed to the naked eye.
  • substantially indelible can mean, for example, that the encoded digital control information is substantially inextricably intertwined with the content information, making it difficult for example to strip out the encoded digital control information without also damaging or degrading the content.
  • Degree of indelibility may, for example, be measured by the number of processor instructions required to strip the information out.
  • FIG. 2 shows that a slight rearrangement of picture element configuration in a small portion of image 128 is one way to steganographically encode electronic control information into the image to provide a substantially indelible, substantially invisible encoding.
  • This encoding may be unnoticeable to the viewer, and yet it may be difficult to strip out or eliminate without also damaging the image.
  • Steganographically encoding digital control information into the information signal 70 may effectively merge, from a practical standpoint, the digital control information with the other information carried by the signal (for example, television programming or other content).
  • the steganographic techniques make it difficult for someone to intentionally or unintentionally eliminate the encoded control information without damaging the content, but may (in one example) nevertheless hide the encoded control information so that it does not unduly detract from the content.
  • indelibility of the steganographic encoding provides persistence, indelibility may be more important than invisibility in at least some applications. For example, it may be desirable in some applications to use a shared secret to decode and then remove the steganographically encoded control information 126 before presenting the information signal (or its content) to the user.
  • the steganographically encoded information need not be particularly invisible in this scenario. Even though someone with knowledge of the shared secret can remove the steganographically encoded information, it may nevertheless remain substantially indelible to anyone who doesn't know the shared secret required to remove it.
  • FIG. 1 shows that control information 126 may be packaged within one or more organizational structures such as secure digital containers 136 .
  • Containers 136 may be, for example, of the type described in the Ginter et al. patent specification in connection with FIGS. 17 - 26 B.
  • the organizational structure(s) may identify, implicitly or explicitly, the content the electronic controls apply to.
  • the organizational structure(s) may also define the extent of the content, and semantics of the content.
  • the organizational structure(s) may be encoded in such a way that they are protected for purposes of secrecy, authenticity and/or integrity.
  • the employed steganographic technique may provide such protection, or another security technique may be used in conjunction with steganography to provide a desired or requisite degree of protection depending on the application.
  • Containers 136 may, for example, use mathematical techniques called “encryption” that help guarantee the integrity and/or secrecy of the control information 126 they contain.
  • Each of the FIG. 1 example appliances 100 may include a electronic digital rights management component 124 .
  • Rights management component 124 may, for example, comprise one or more tamper-resistant integrated circuit “chips”.
  • Components 124 may, for example, be of the general type described in detail at FIG. 9 and following of the Ginter et al. patent specification. Briefly, Ginter et al. describes a Virtual Distribution Environment (“VDE”) including multiple electronic appliances coupled together through a communications capability. Each electronic appliance has such a secure, tamper-resistant “protected processing environment” in which rights management processes may securely take place.
  • the Virtual Distribution Environment delivers digital control information to the protected processing environments by packaging the control information within secure electronic digital containers. This delivered control information provides at least part of the basis for performing electronic rights management functions within the protected processing environments.
  • the ability to securely deliver digital control information to such protected processing environments as embodied with components 124 is important at least because it increases flexibility and enhances functionality.
  • different digital control information can be delivered for the same or different electronic content.
  • one set of rules may apply to a particular television program, another set of rules might apply to a particular film, and a still different set of rules could apply to a particular musical work.
  • different classes of users of the same electronic content can receive different control information depending upon their respective needs.
  • Rights management components 124 are able to steganographically decode the control information 126 carried by the information signal 70 .
  • Components 124 use the decoded control information 126 to electronically manage rights.
  • components 126 may use the decoded control information 126 to control how the images and/or sound carried by information signal 70 may be used.
  • digital rights management component 124 may comprise or include one or more integrated circuit chips as shown in FIG. 3.
  • the FIG. 3 example rights management component 124 includes an analog-to-digital converter 130 , a steganographic decoder 132 , and a rights management processor 134 .
  • Rights management processor 134 may include or comprise a protected processing environment 138 as described in Ginter et al. FIGS. 8 - 12 , for example, providing a tamper-resistant execution environment for effecting the operations provided by electronic controls 126 .
  • Rights management component 124 may also include a steganographic encoder and a digital-to-analog converter (not shown).
  • the analog-to-digital converter (ADC) 130 shown in FIG. 3 takes the incoming information signal 70 and—if it is in analog form—converts it to a digital signal (see FIG. 4, step “A”).
  • Steganographic decoder 132 obtains the digital control information 126 from the resulting digital signal (FIG. 4, step “B”).
  • digital control information 126 may define permitted and/or required operation(s) on the content carried by signal 70 , and may further define consequences of performing and/or failing to perform such operations.
  • Rights management processor 134 may manage these rights and/or permissions and associated consequences (FIG. 4, step “C”).
  • FIGS. 1 A- 1 E show various example electronic appliances 100 embodying aspects of the present invention. For example:
  • FIG. 1A shows an example media player 102 capable of playing Digital Versatile Disks (DVDs) 104 on a home color television set 106 .
  • media player 102 may provide analog output signals to television set 106 , and may also process digitized video and/or audio analog signals stored on optical disk 104 .
  • Rights management component 124 A provides digital rights protection based on steganographically encoded controls 126 .
  • FIG. 1B shows an example set top box 108 that can receive cable television signals (for example, via a satellite dish antenna 110 from a satellite 112 ) for performance on home television set 106 .
  • Set top box 108 shown in FIG. 1B may receive television signals from antenna 110 in analog scrambled or unscrambled form, and provide analog signals to television 106 .
  • Rights management component 124 B provides digital rights protection based on steganographically encoded controls 126 .
  • FIG. 1C shows an example radio receiver 114 that receives radio signals and plays the radio sound or music on a loud speaker 116 .
  • the radio receiver 114 of FIG. 1C may receive analog radio signals, and provide analog audio signals to loud speaker 116 .
  • Rights management component 124 C provides digital rights protection based on steganographically encoded controls 126 .
  • FIG. 1D shows an example video cassette recorder 118 that can play back video and sound signals recorded on a video cassette tape 120 onto television 106 .
  • the video tape 120 may store video and audio signals in analog form, which VCR 118 may read and provide to television 106 in analog form.
  • Rights management component 124 D provides digital rights protection based on steganographically encoded controls 126 .
  • FIG. 1E shows an example television camera that can capture video images and produce video signals for recording on a video cassette tape 120 and play back on television set 106 .
  • the FIG. 1E camcorder 122 may generate analog video and audio signals for storage onto video tape 120 , and/or may provide analog signals for processing by television 106 .
  • Rights management component 124 E provides digital rights protection based on steganographically encoded controls 126 .
  • the present inventions flexibly accommodate a wide variety of electronic rights management techniques—giving rightsholders extreme flexibility and programmability in defining, for example, commerce and rights management models that far exceed the simple “copy/no copy, one copy.”
  • a closed appliance that is, one lacking at least an occasional connection to a payment method (e.g., Visa, MasterCard, American Express, electronic cash, Automated Clearinghouses (ACHs) and/or a Financial Clearinghouse that serves as the interface for at least one payment method)
  • a payment method e.g., Visa, MasterCard, American Express, electronic cash, Automated Clearinghouses (ACHs) and/or a Financial Clearinghouse that serves as the interface for at least one payment method
  • Time-based rental models in which a consumer may “perform” or “play” the property an unlimited number of times in a given interval (assuming the appliance has a built-in secure time clock, can operatively connect itself to such a clock, or otherwise receive time from a reliable source);
  • An even more flexible and diverse array of rights controls and associated consequences are enabled by the present inventions if at least one appliance is connected to some form of communications “backchannel” between the appliance and some form of payment method.
  • This backchannel may be a telephone call, the use of a modem, a computer data network, such as the Internet, a communications channel from a settop box to the head end or some other point on a cable TV distribution system, or a hybrid arrangement involving high bandwidth distribution of analog properties with a slower return channel, a phone line and modem—just to name a few examples.
  • Non-limiting examples of such more rights controls and associated consequences enabled by the present invention include the following:
  • Pay-per-use models in which a customer pays a specified price for each use of the property and/or different unit prices depending on the number of uses. In one example, the customer might pay $3.99 for the first viewing and $2.99 for each subsequent viewing; and,
  • FIGS. 5 A- 5 D show some examples of how rights management component 124 can enforce steganographically encoded digital rights management controls.
  • rights management component 124 controls an on/off switch 140 based on steganographically encoded electronic controls 126 .
  • Component 124 turns switch 140 on (for example, to allow the analog television signal to pass to television set 106 ) when electronic controls 126 permit, and otherwise opens (turns off) switch 140 to prevent the analog signal from reaching the output.
  • the incoming analog signal is scrambled, and the FIG. 5A on/off switch 140 is replaced by a FIG. 5B descrambler 142 of conventional design.
  • the descrambler 142 descrambles the analog input signal to provide a descrambled output under control of rights management component 124 .
  • Rights management component 124 allows descrambler 142 to descramble the analog signal only under conditions specified by electronic controls 126 that the component 124 obtains from the analog input signal. Scrambling the analog signal gives the rights management component 124 a relatively secure way of enforcing electronic controls 126 —since the rights management component can prevent the descrambler from operating unless conditions set by the controls are satisfied.
  • the rights management function and the descrambling function may be integrated into a single component in which the descramble and decrypt functions of the rights management component are essentially serving the same function, but may still be distinct to account for specialized approaches to descrambling that may not be sufficiently strong or interoperable with other environments to use generally. If they are separate components, the data path between them should be protected (for example, by ensuring that both components are in a tamper resistant enclosure, or using secure authentication and key exchange to send the descrambling sequence to the descrambler).
  • FIG. 5C shows how digital certificates may be used to enforce steganographically encoded electronic controls 126 .
  • appliance 100 A outputs content to another appliance 110 D only if appliance 100 D has a rights management component 124 D that can enforce the electronic controls 126 .
  • the supplying appliance 100 A's rights management component 124 A may require the receiving appliance 100 D's rights management component 124 D to present a digital certificate 199 attesting to the fact that the receiving appliance 100 D has a rights management component 124 fully capable of securely enforcing electronic controls 126 .
  • Receiving appliance 110 D could present this digital certificate 199 by steganographically encoding it within an analog signal it provides to the supplying appliance over an analog signal channel for example (the analog signal channel could be the same one the supplying appliance will use to deliver the steganographically encoded content). If a digital channel is available, the handshake can be over a digital link between the two appliances using, for example, secure authentication techniques disclosed in Ginter et al. and/or for example in Schneier, Applied Cryptography (2d Ed. Wiley 1996) at page 52 et seq.
  • FIG. 5D shows that rights management component 124 A can enforce electronic controls 126 by marking the content through “fingerprinting” and/or “watermarking” prior to releasing the content to a device that doesn't have a rights management component 124 .
  • fingerprinting could involve using steganographic techniques to fingerprint the content.
  • a movie delivered using “conventional” containers as disclosed in Ginter et al. could use steganographically encoded containers “on the way” to the display device.
  • it could include the identity of the user, etc. as well as the control information appropriate for the device.
  • Another case could be text sent to a printer, using different steganographic encoding techniques such as line and/or character shifting.
  • FIGS. 5 E- 5 F illustrate how the persistent association with content provided by steganographically encoded electronic rights management control information 126 provides “end to end” protection within an arbitrary information signal distribution system—irrespective of the processes the information signal is subjected to as it travels to its final destination.
  • FIG. 5E shows an example of how the present inventions can be used to maintain end-to-end rights management protection over content initially distributed in an analog signal format.
  • FIG. 5F shows an example of how the present invention can be used to maintain end-to-end rights management protection over content initially distributed in digital form.
  • an analog signal transmission site (e.g., a radio or television broadcaster) transmits an analog signal A steganographically encoded with an organizational structure 136 including electronic controls 126 .
  • This analog signal A may be received by an electronic appliance 100 A having a rights management component 124 A as described above.
  • Appliance 100 A may, for example, convert the signal into digital and/or digitized format, and store the digitized version of the signal onto a digital storage medium 104 .
  • Electronic appliance 100 A may play back the recorded digitized signal, convert the signal back to analog form, and deliver the analog signal A to a further electronic appliance 106 B.
  • electronic appliance 106 B also has a rights management component 124 B.
  • the steganographic techniques provided by the present invention ensure that the electronic controls 126 persist in the signal A delivered from appliance 100 A to appliance 106 B—and from appliance 106 B to still other appliances. Because of the substantial indelibility characteristics of the steganographically encoded control information 126 , this information persists in the signal as stored on recording medium 104 , in copies of the recorded signal produced by replaying the medium, and in further downstream versions of the signal.
  • This persistence will, for example, survive conversion from analog to digital format (e.g., sampling or “digitizing”), storage, and subsequent conversion from digital to analog format.
  • the steganographically encoded control information 126 is substantially indelibly, substantially inextricably intertwined and integrated with the information signal A, the digitized version of the information signal that appliance 100 A records on medium 104 will also contain the steganographically encoded control information 126 .
  • appliance 100 A plays back the recording from medium 104 , it will reproduce information signal A along with the steganographically encoded control information 126 .
  • the steganographically encoded control information 126 thus persists irrespective of digitization (or other processing) of signal A.
  • lossy compression techniques used on the data may remove high frequency noise—thereby potentially damaging the steganographic channel.
  • the steganographic encoding function should be matched to the compression algorithm(s) using conventional signal analysis techniques to avoid this consequence.
  • appliance 106 B may output further copies or versions of signal A in analog form and/or digital form. Because of its inherently persistent characteristics, the steganographically encoded control information 126 will be present in all subsequent versions of the signal outputted by appliance 106 B—be they in analog format, digital format, or any other useful format.
  • Degrading a digital signal carrying control information is fatal—the rights management system typically may no longer function properly if even a single bit is altered.
  • the preferred embodiment provides redundancy (repeating pointers and the organizational structures and/or any control information incorporated into the organizational structures), and also uses conventional error correction coding such as, for example, Reed-Solomon (or similar) error correcting codes.
  • error correction coding such as, for example, Reed-Solomon (or similar) error correcting codes.
  • the steganographically encoded control information 126 is substantially inextricably intertwined with the desired content carried by information signal A, any process that degrades the steganographically encoded control information 126 will also tend to degrade the information signal's desired content.
  • the steganographically encoded information may degrade (along with the content) in multi-generation “copies” of the signal, degraded copies may not be commercially significant since the information content of the signal will be similarly degraded due to the substantially inextricable intertwining between the steganographically encoded control information 126 and the content carried by signal A.
  • the refresh circuit shown in FIG. 14 with appropriate error correcting capabilities is one way to prevent the steganographically encoded information from being degraded even if the rest of the information the signal carries becomes degraded.
  • FIG. 5F example shows content being initially distributed in digital form over a network to an electronic appliance 100 J such as a personal computer.
  • Personal computer 100 J may convert the digitally delivered content to an analog signal A for distribution to other appliances 106 B, 100 A.
  • Personal computer appliance 100 J may include a rights management component 124 J that ensures, based on controls 126 , that appliance 100 J does not release a version of the content associated with controls 126 that is not protected by the controls.
  • rights management component 124 J is capable of steganographically encoding the analog signal A with the control information 126 (e.g., it may perform the processes shown in FIG. 7A below).
  • Rights management component 124 J enforces controls 126 , at least in part, by ensuring that any analog version of the content associated with controls 126 is steganographically encoded with those controls.
  • Further “downstream” appliances 106 B, 100 A may each include their own rights management component 124 for use in interacting with steganographically encoded controls 126 .
  • FIG. 6 shows that a particular information signal 70 may be encoded with many different containers 136 and associated rights management control sets 126 . For example, different portions of an information signal 70 may be associated with different control information 126 .
  • a movie 270 In this example of a movie 270 :
  • a first “trailer” 272 may be associated with control information 126 ( 1 ),
  • a second trailer 274 may be associated with control information 126 ( 2 ),
  • a title section 276 may be associated with control information 126 ( 3 ),
  • the first five minutes of the movie may be associated with control information 126 ( 4 ), and
  • the rest of the movie may be associated with control information 126 ( 5 ).
  • Control information portions 126 ( 1 ), 126 ( 2 ), 126 ( 3 ), 126 ( 4 ) and 126 ( 5 ) may all be different.
  • control information 126 ( 1 ) may permit the user to copy trailer 272
  • control information 126 ( 4 ) may prohibit the user from copying the first five minutes 278 of the film.
  • control information 126 ( 5 ) may be steganographically encoded onto the information signal 70 .
  • control information 126 ( 5 ) could be encoded once per minute onto the rest of movie 280 . This redundancy allows a media player 102 or other electronic appliance 100 to rapidly obtain a copy of the control information 126 ( 5 ) no matter where the user begins watching or playing the movie 270 , and also helps ensure that transmission errors will not prevent the rights management component 124 from recovering at least one “good” copy of the organizational structure.
  • FIGS. 7A and 7B show example overall steganographic encoding and decoding processes, respectively.
  • the FIG. 7A process may be used to steganographically encode digital control information onto an analog signal, and FIG. 7B performs the inverse operation of steganographically decoding the control information from the analog signal.
  • the FIG. 7A process may be performed at a supply point
  • the FIG. 7B process may be performed at a usage point.
  • An electronic appliance 100 can be both a supply point and a usage point, and so it may perform both the FIG. 7A process and the FIG. 7B process.
  • the analog information signal 70 inputted to the steganographic encoding process may be any sort of information signal such as, for example, the analog signal shown in Graph A 1 .
  • a conventional analog-to-digital conversion block 402 may be used, if necessary, to convert this analog input signal to a digitized signal (see Graph A 2 ).
  • a spectral transform block 404 may then be used to transform the digitized information from the time domain to the frequency domain.
  • Spectral transform block 404 may be any conventional transformation such as, for example, a Fast Fourier Transform (FFT) or a Walsh Transform. An example of the resulting spectral information is shown in the A 3 graph.
  • FFT Fast Fourier Transform
  • Walsh Transform An example of the resulting spectral information is shown in the A 3 graph.
  • a steganographic encode block 406 may be used to steganographically encode digital control information 126 , in clear text form and/or after encryption by a conventional digital encryption block 414 based on an encryption key Key s
  • Steganographic information can be combined with a pseudo-random data stream (e.g. exclusive-or'd into the output of a DES engine)—in effect shuffling around the noise in the signal rather than replacing noise with the signal, per se.
  • the values in the pseudo-random stream can be protected by encryption (e.g. the key that initializes the DES engine should be protected).
  • the steganographic channel is “public” (e.g., unencrypted)
  • the stream should be readily reproducible (e.g.
  • a “public header”—see Ginter et al.) is always detectable using a shared preset value (that does not need to be protected, distinguishing it from the private header keys), may be provided to ensure that the rights management technology can be activated properly. Since the rights management component 124 at the receiving side needs to know how to descramble the signal, there normally will be an indication in the “public header” that names a key that will be used to unlock the private header (and so on, as described, for example, in Ginter et al.). Some publicly available, agreed upon preset values may be used to extract the “public header” information from the steganographically encoded channel.
  • Steganographic encode block 406 may be any conventional steganographic encoding arrangement capable of steganographically encoding a digital signal onto information signal 70 .
  • Steganographic encode step 406 may be based on a key K c —allowing the same basic steganographic encoding and decoding transformations to be used by a wide variety of different appliances while still maintaining individuality and secrecy through the use of different steganographic keys.
  • the steganographic encoding step 406 may introduce the (encrypted) digital control information into the high frequency spectrum portion of the spectrally transformed information signal 70 .
  • the spectrally transformed signal with steganographic encoding is shown in the FIG. 7A Graph A 4 , and is shown in more detail in FIG. 8.
  • the steganographic encoding may affect the higher order frequency components of the spectrally transformed signal (see dotted perturbations in the fourth, fifth, sixth, seventh and eighth order components in FIG. 8).
  • the steganographic encoding may add to and/or subtract from the amplitudes of these higher order components.
  • the effect of introducing high frequency steganographically encoded signal components may be to mask the steganographic encoding within the random high frequency noise inherently provided within information signal 70 —thereby providing substantial invisibility and substantial indelibility.
  • the amount of amplitude modification performed by steganographic encode step 406 may be limited in this example to ensure that the resulting steganographically encoded signal does not exceed the available channel bandwidth. See, for example,
  • B is a function of time in bits/second.
  • the function S corresponds to an area under a curve resulting from the product of B (bandwidth) and t (time).
  • the parameter delta t refers to the “granularity” of the analog-to-digital conversion (i.e., 1/sampling rate).
  • FIG. 9 shows an example plot of information signal bandwidth versus time.
  • the total bandwidth available is limited by the bandwidth of the transmission channel—including the bandwidth of the storage medium (if any) used to deliver the signal, and the bandwidth of the reproduction equipment. Since the total bandwidth depends on the inherent characteristics of the transmission channel used to communicate information signal 70 , it is typically a fixed constant.
  • FIG. 9 shows that the bandwidth actually used by the information signal 70 typically varies with time. For example, although somewhat counterintuitive, the more complex an image, the more noise is typically available for “shuffling around” to create a steganographic channel. Of course, this isn't always true—a highly intricate geometric pattern may have very little noise available for encoding, and a simple picture of a cloud may have a great deal of noise available.
  • Steganographic encode block 406 can use an encoding rate and characteristic that ensures the steganographically encoded signal bandwidth doesn't exceed the total bandwidth available in the communication channel.
  • the amount of bandwidth available for steganographic encoding may be on the order of on the average of 0.1% of the total transmission channel bandwidth—but as mentioned above, this bandwidth available for steganographic encoding may be unequally distributed with respect to time within the information signal stream 70 and may depend on the content of the information signal.
  • steganographic encode block 406 analyzes the content (e.g., by performing statistical weighted averaging), and provides a responsive variable steganographic encoding rate.
  • steganographic encoding block 406 can use a high data rate during example time periods “II” and “IV” in which the information signal 70 has characteristics that allow high steganographic rate encoding without the resulting signal exceeding the available overall channel bandwidth.
  • Encoding block 406 can use a low data rate during time periods “I” and “III” in which the information signal 70 has characteristics that do not allow high data rate steganographic encoding without exceeding available overall channel bandwidth.
  • Steganographic encoding block 406 may use any number of different variable rates to accommodate different relationships between information signal 70 characteristics and available channel bandwidth.
  • the steganographically encoded spectral information outputted by steganographic encode block 406 may be subjected to an inverse spectral transform 408 .
  • Inverse spectral transform 408 in this example may perform the inverse of the transform performed by step 404 —outputting a version of the digitized time domain signal shown in Graph A 2 but now bearing the steganographically encoded information (Graph A 5 ).
  • the digital control information steganographically encoded by block 406 may be substantially indelible and substantially invisible with respect to the Graph A 5 signal—that is, it may be very difficult to eliminate the steganographically encoded information and it may also be very difficult to discern it.
  • This signal may be further scrambled and/or encrypted (e.g., based on a scrambling and/or encryption key Key d ) before being converted to analog form (shown in Graph A 6 ) by a conventional digital-to-analog conversion block 412 (if necessary).
  • Signal scrambling may be independent of steganographically encoded control information. For example, a good way to support existing devices is to not scramble the signal, and to use legislative means to ensure that each new device manufactured is equipped with rights management technology. Scrambling/encrypting of content, can be used to enforce use of rights management.
  • the resulting steganographically encoded information signal 70 may then be transmitted over an insecure communications channel.
  • Digital-to-analog conversion step 412 may be omitted if a digital communications channel (e.g., an optical disk, a digital satellite link, etc.) is available to deliver the signal.
  • a digital communications channel e.g., an optical disk, a digital satellite link, etc.
  • FIG. 7B shows an example inverse process for recovering digital control information 126 from the steganographically encoded information signal 70 .
  • the steganographically encoded analog signal is converted to a digitized signal (if necessary) by an analog-to-digital conversion step 402 ′ and decrypted/descrambled (if necessary) by a decryption/descrambling block 422 ′ to yield a facsimile of the inverse spectral transform block 408 output shown in FIG. 7A.
  • the analog-to-digital conversion block 402 ′ is the inverse operation of FIG. 7A, block 412
  • the decrypt/descramble block 422 ′ is the inverse of the FIG. 7A scramble/encrypt block 410 .
  • the resulting digitized signal provided by FIG. 7B block 422 ′ is spectrally transformed by step 404 ′ (this may be the same spectral transform used in FIG. 7A, block 404 ) to yield a steganographically encoded spectral signal A 3 .
  • Steganographic decode block 424 may perform the inverse operation of the FIG. 7A steganographic encode block 406 based on the same steganographic key Key c (if a key-based steganographic encoding/decoding transformation is used).
  • the output of steganographic decode block 424 may be decrypted by block 426 (the inverse of FIG.
  • the 7A encrypt block 414 based on key Key s ) to provide recovered digital control information 126 .
  • the resulting control information 126 may be used for performing electronic rights management functions.
  • Required keys may be delivered in containers and/or using the key distribution techniques and device initialization approaches disclosed in Ginter et al., for example.
  • steganographic encode block 406 may encode control information organizational structures such as secure containers (see Ginter et al., FIGS. 17 - 26 B and associated text) during times when the content bandwidth is low relative to the total available bandwidth (see FIG. 10 regions II and IV), and may not attempt to encode such organizational structures during times when the content bandwidth is high relative to the total available bandwidth (see FIG. 10, regions I, III). In this way, steganographic encode block 406 may maximize the total bandwidth use without causing the steganographically encoded signal to exceed available bandwidth.
  • control information organizational structures such as secure containers (see Ginter et al., FIGS. 17 - 26 B and associated text) during times when the content bandwidth is low relative to the total available bandwidth (see FIG. 10 regions II and IV), and may not attempt to encode such organizational structures during times when the content bandwidth is high relative to the total available bandwidth (see FIG. 10, regions I, III).
  • steganographic encode block 406 may maximize the total bandwidth use without causing the steganographically encoded signal to exceed available bandwidth.
  • steganographic encode block 406 may encode “pointers” or other directional information into the information signal 70 during times when the content is such that it doesn't allow high data rate steganographic encoding of organizational structures 136 . Multiple pointers and multiple “pointed to” locations can also help provide redundancy.
  • FIG. 10 example involving steganographic encoding of pointers 800 may be especially suited for content delivery or presentation on random access storage media such as optical disks. Using such random access media, a content handling device may be able to rapidly “seek” to the place where an organizational structure is stored at a higher recorded bandwidth and then read the organizational structure at this higher bandwidth (See FIG. 10A).
  • steganographic encode block 406 in this example encodes, during periods when the content is such that it is not possible to steganographically encode organizational structures, pointers 800 that direct the content handling device to one or more places where the organizational structure appears in the content stream.
  • pointers 800 might encode the location(s) on a storage medium (e.g., an optical disk 104 —see FIG. 10A) at which the closest organizational structure is stored.
  • An optical disk player 102 with random access capability may “seek” to the place at which the closest organizational structure 136 is stored on the disk 104 , and rapidly read the organizational structure off of the disk in less time than might be required to read an organizational structure that steganographic encode block 406 encodes at a lower data rate during times when the content bandwidth occupies most of the available channel bandwidth.
  • the process of reading a pointer 800 , “seeking” to a position on the medium specified by the pointer, and then reading an organization structure 136 steganographically encoded at a high data rate may provide overall faster access times than if the organizational structure was itself encoded at a lower data rate within the parts of the information signal stream used in this example to encode only pointers.
  • FIG. 11 shows an example organizational structure 136 suitable for steganographic encoding similar to that shown in FIG. 17 of the co-pending Ginter et al. application.
  • the organizational structure may include one or more permissions records 136 d providing control sets 136 e providing electronic controls especially for an analog device(s).
  • the permissions record 136 d may also provide a reference 136 f at least one location or other external source for additional controls. This reference may be to an Internet “Uniform Resource Locator” (URL), for example.
  • the organizational structure 136 may optionally include a content block 136 g providing digital content subject to the controls.
  • organizational structure 136 is encased in a protective “wrapper” 136 x provided by the steganographic technique used to encode the organizational structure 136 , digital encryption techniques, and/or a combination of the steganography and encryption.
  • This protective wrapper 136 x is used to ensure that the organizational structure 136 cannot be tampered with and maintains its integrity. Wrapper 136 x may also provide a degree of confidentiality if required.
  • FIG. 12 shows an example detailed internal architecture for an example electronic appliance 100 such as optical disk player 102 .
  • rights management component 124 may be a tamper-resistant integrated circuit including internal microprocessor 200 , flash memory 202 and cryptographic engine 204 (see Ginter et al. FIGS. 9-15B and associated text for a more detailed internal view of an example tamper-resistant rights management component 124 and a “protected processing environment” 138 it provides).
  • a main system bus 206 may couple rights management component 124 to a main system microprocessor 208 and various system components such as, for example, a CD-ROM decoder 210 , a control and audio block 212 , a video decoder 214 , a digital output protection block 216 , and a communications system 218 .
  • main microprocessor 208 controls the overall operations of appliance 100 , with rights management component 124 performing security-related functions such as rights management and steganographic decoding.
  • an optical pickup 220 reads information from optical disk 104 and provides it to RF amplifier 222 .
  • RF amplifier 222 provides its output to digital signal processor (DSP) 224 , which processes the output in a conventional manner and also controls the orientation of the optical disk 104 relative to optical pickup 220 via a driver 226 .
  • DSP 224 coordinates with a conventional CD-ROM decoder 210 to provide decoded digitized video and audio information.
  • Decoder 210 operates in conjunction with a buffer memory 228 , and may also cooperate with cryptographic engine 204 to ensure that any encrypted video information is decrypted appropriately.
  • the video output of CD-ROM decoder 210 may be decompressed by MPEG-2 video decoder 214 and applied via an NTSC and/or PAL encoder 230 to television 106 .
  • the output could be in a non-interlaced format such as RGB rather than in interlaced formats such as NTSC and PAL.
  • control and audio block 212 (which may operate in conjunction with its own buffer memory 232 ) may receive digitized audio information recorded on optical disk 204 via DSP 224 and CD-ROM decoder 210 .
  • Control and audio block 212 may provide this audio output to audio processing block 234 for output to loudspeakers 116 .
  • Control and audio block 212 may also provide an interface to the user via an infrared sensor 236 (for a remote control, for example), front-panel user controls 238 and/or an LED display 240 .
  • security microprocessor 200 within rights management component 124 receives the digitized video and/or audio that DSP 224 reads from optical disk 104 via pickup 220 and RF amp 222 .
  • Security microprocessor 200 steganographically decodes this digitized analog information signal to recover the digital control information 126 encoded onto the information signal.
  • Security microprocessor 200 also performs rights management functions based on the digital control information 126 it recovers.
  • security microprocessor may remove the steganographic encoding from a received digitized analog signal (since it shares a secret such as the steganographic encoding key Key c with the steganographic encoding point, it can remove the steganographic encoding) and/or steganographically encode a signal with received, augmented and/or new rights management control information.
  • microprocessor 200 may selectively control cryptography engine 204 to decrypt encrypted content provided by optical disk 104 —thus enforcing the rights management activities provided in accordance with electronic controls 126 .
  • Security component 124 may also control digital output protection block 216 in accordance with rights management control information 126 —thus, selectively permitting digital appliance 100 to output content in digital form.
  • Rights management component 124 may take other steps (e.g., watermarking and/or fingerprinting information before releasing it) to provide a degree of copy protection and/or quality degradation to prevent or discourage someone from creating an unlimited number of high quality copies of the content of optical disk 104 .
  • Rules contained in the control information can also govern how other parts of the system behave.
  • control information could specify that no sound can be played unless the content is paid for.
  • Another property may specify that certain copy protection schemes should be turned on in the NTSC encoder. Still another might disable the digital outputs of the device altogether, or unless an additional fee is paid.
  • Rights management component 124 may, in this particular example, communicate over a network 144 (such as, for example, the Internet or other data communications path) with other rights management related entities, such as, for example, clearinghouses and repositories.
  • This “back channel” allows rights management component 124 to, for example, report usage and payment information and/or to retrieve additional rights management control information 126 to augment or supplement the control information it steganographically decodes.
  • FIG. 13 shows example control steps that may be performed by protected processing environment 138 (e.g., security microprocessor 200 ) to provide electronic digital rights protection.
  • the FIG. 13 read/play routine 300 begins with protected processing environment 138 applying rules 126 —in effect, setting the initial state in which rights management can occur (FIG. 13, block 302 ).
  • Protected processing environment 138 then reads the output of CD-ROM decoder 310 (FIG. 13, block 304 ) and obtains steganographically encoded data from the output stream (FIG. 13, block 306 ). If protected processing environment 138 encounters the beginning of the control information organizational structure (“yes” exit to decision block 308 ), the protected processing environment performs an initialization step (FIG.
  • protected processing environment 138 If protected processing environment 138 encounters a pointer (“yes” exit to decision block 318 ), then the protected processing environment determines whether it already has received the corresponding organizational structure pointed to by the received pointer (FIG. 13, decision block 320 ). The protected processing environment 138 retrieves the organizational structure if it does not already have it (FIG. 13, block 322 )—for example, by controlling DSP 224 to seek to the corresponding location on optical disk 104 indicated by the pointer, and by reading the organizational structure from the disk beginning at that disk location (FIG. 13, block 322 ).
  • the protected processing environment 138 may determine whether there is any bandwidth available to carry control information. For example, some types of content stored on optical disk 104 may take up substantially all available channel bandwidths so that no bandwidth remains for steganographic encoding. If there is no available bandwidth for steganographic encoding (“no” exit to decision block 324 ), then the protected processing environment 138 may return to the “apply rules” block 302 and repeat steps 304 - 324 to wait until bandwidth is available for steganographic encoding.
  • protected processing environment 138 performs an error handling routine that processes the exception (FIG. 13, block 326 ) and determines whether the exception is critical (decision block 328 ). In some cases, protected processing environment 138 will continue to allow the appliance 100 to process the content, finding the error to be non-critical (“no” exit to decision block 328 ). An example of this would be a timer that permits playing for a period of time. In other cases (e.g., if the error conditions indicate that optical disk 104 has been tampered with), protected processing environment 138 may halt processing and return an error condition (“yes” exit to decision block 328 , bubble 329 ).
  • FIG. 13A shows example steps that may be performed by the FIG. 13 “apply rules” routine 302 .
  • protected processing environment 138 may determine if it has received a complete organizational structure on which to base rights management for the rights being read from optical disk 104 (FIG. 13A, decision block 330 ). If the protected processing environment 138 has not received a complete organizational structure (“no” exit to decision block 330 ), it may disable content processing until it receives a complete organizational structure (FIG. 13A, block 332 ). If protected processing environment 138 has a complete organizational structure (“yes” exit to decision block 330 ), it determines whether it has the current organizational structure (decision block 334 ).
  • the protected processing environment 138 then processes the current operation with respect to the control information embodied in the organizational structure (FIG. 13A, block 336 ). If the protected processing environment 138 does not have the current organizational structure (“no” exit to decision block 334 ), it determines whether it has an organizational structure that has the same identification as the current organizational structure (FIG. 13A, decision block 338 ). The protected processing environment 138 may use that matching organizational structure as a default (“yes” exit to decision block 338 , block 340 ). Otherwise, protected processing environment 138 disables content operations until it receives a current organizational structure (“no” exit to decision block 338 , block 342 ).
  • protected processing environment 138 may also perform any or all of the FIG. 7A steganographic encoding steps, and may also or alternatively remove the steganographic encoding from a signal by using a shared secret to generate a steganographic encoding stream and then subtracting that stream from the signal.
  • Such techniques may be useful, for example, to allow protected processing environment 138 to encode new control information or to change the encoded control information.
  • the steganographically encoded control information might provide a chain of handling and control that authorizes certain protected processing environments to change some elements and add new elements to the control information 126 .
  • Protected processing environment 138 could:
  • FIG. 14 shows another example electronic appliance arrangement including a “refresh” capability involving both steganographic decoding and steganographic encoding.
  • electronic appliance 100 includes a steganographic decoding block 424 as described above plus an additional steganographic encoding block 406 .
  • the appliance 100 may obtain the digital control information from the content signal, and then may “refresh” the extracted information (e.g., using coding techniques, such as, for example, Reed-Solomon decoding based on Reed-Solomon codes applied to the signal by the steganographic encoding process) to correct errors and otherwise accurately recover the digital control information.
  • the error-corrected digital control information outputted by refresh decoder 900 may be applied to a steganographic encoding circuit 406 which steganographically encodes the content signal with the refreshed control information.
  • the FIG. 14 refresh operation could, for example, be performed on a selective basis based on the encoded digital control information itself.
  • the control information might authorize appliance 100 to redistribute the content signal only under certain conditions—one of which is to ensure that a refreshed steganographic encoding of the same (or modified) digital control information is provided within the redistributed content signal.
  • FIG. 15A shows an example analog signal distribution arrangement 500 provided in accordance with this invention.
  • a steganographic encode block 400 encodes an analog information signal A with rights management control information 126 and associated organizational structure(s) 136 .
  • the steganographically encoded information signal A′ is distributed by various mechanisms to user electronic appliances 100 .
  • the encoded signal A′ may be broadcast wirelessly over the air by a broadcaster 60 A, distributed over a cable television network by a cable television head end 502 , and/or distributed via a satellite communications network 504 .
  • Encoded signal A′ may, during the process of being distributed, be converted from analog to digital form and back again.
  • the satellite uplink 504 A may digitize signal A′ before transmitting it to the satellite 504 b , and the satellite downlink 504 c may convert the signal back to analog before providing it to user appliances 100 .
  • the steganographically encoded control information 126 persists within the signal A′ despite conversions between analog and digital formats.
  • an example set top box user appliance 108 may receive the distributed steganographically encoded analog signal A′.
  • Set top box 108 may include a rights management component 124 as described above, and may perform rights management operations and/or processes in response to and based on steganographically encoded control information 126 .
  • Set top box 108 in this example may output the steganographically encoded analog signal (or a facsimile of it) to additional user electronic appliances such as, for example, a television set 106 , a digital optical recording device (e.g., DVD-R) 102 , and/or a video tape recorder 118 .
  • additional user electronic appliances such as, for example, a television set 106 , a digital optical recording device (e.g., DVD-R) 102 , and/or a video tape recorder 118 .
  • Each of these additional appliances 106 , 102 , 118 may include a rights management component 124 that performs electronic rights management based on the steganographically encoded control information 126 . Any recordings made by recording devices 102 , 118 may also be steganographically encoded.
  • FIG. 15B shows another example analog signal distribution arrangement 510 .
  • a radio broadcaster 60 B broadcasts an analog radio signal A′ that is steganographically encoded with associated rights management control information 126 and associated organizational structure(s) 136 .
  • a wire network 512 such as a cable television system may similarly distribute the same or different steganographically encoded analog radio signal A′.
  • Broadcaster 60 B and/or network 512 may deliver the steganographically encoded radio signal A′ to a user receiving appliance 100 C such as a FM radio receiver 114 .
  • radio receiver 114 has a rights management component 124 that processes and automatically manages rights based on steganographically encoded controls 126 .
  • radio receiver 114 may (if permitted by controls 126 ) output steganographically encoded analog signal A′ to additional appliances such as, for example, a digital recorder 102 and/or an analog recorder 514 .
  • each of appliances 100 A, 100 B has a rights management component 124 that electronically manages rights based on the steganographically encoded controls 126 . Because the steganographically encoded controls 126 persist, recording devices 102 , 514 record the steganographically encoded controls 126 in any recordings they make of signal A′.
  • an airplay audit service can sample stations in a given market and identify particular properties being broadcast from “object identifier” information contained in the steganographically encoded VDE container.
  • FIG. 15C shows an example signal distribution arrangement 520 in which the steganographically encoded analog signal A′ is initially distributed in the same manner as shown in FIG. 15A, and is then converted by an electronic appliance 100 G such as a personal computer, for example, into a digital signal D.
  • appliance 100 G includes a rights management component 124 that manages rights based on steganographically encoded controls 126 .
  • Appliance 100 G may convert received analog signal A′ into digital form for distribution to and processing by digital appliances such as a digital high definition television 106 B, a digital optical disk recorder 102 , and/or a digital tape recorder 118 a .
  • the steganographically encoded control information 126 persists within the digitized signal D.
  • appliance 100 G removes the steganographic encoding from received analog signal A′ and outputs a digital signal D that is “clean” and free of steganographic encoding—but is otherwise protected so that it remains persistently associated with the now-digital control information 126 (which appliance 100 G may distribute, for example, within secure electronic containers 136 and digital, encrypted form.
  • appliance 100 G may package the received, digitized content from analog signal A′ within the same digital electronic container 136 that also contains associated control information that appliance 100 G steganographically decodes from analog signal A′.
  • appliance 100 G may distribute controls 126 independently of the digital signal D—but under circumstances in which the rights management components 124 within each of digital appliances 106 B, 102 and 118 A all securely associate the control information with the now-digital content.
  • FIG. 15D shows a similar distribution arrangement 530 for analog radio or other audio signals.
  • appliance 100 G may include a digital radio receiver that receives analog radio signal A′ and converts it into a digital information signal for distribution to digital recorders 102 , 514 A.
  • appliance 100 G may distribute the digitized analog signal A′ with steganographic encoding to appliances 102 , 514 A—each of which includes a rights management component 124 that may recover the steganographically-encoded control information 126 and perform rights management functions based thereon.
  • appliance 100 G may remove the steganographic encoding from the content before distributing it in digital form—and user other techniques (such as those described in the above-referenced Ginter et al. patent specification) to provide a secure association between the now-digital content and the digital control information 126 .
  • FIG. 15E shows yet another example distribution arrangement 540 in which digital appliances 102 , 100 G distribute information in digital form to a digital television 106 B.
  • appliance 102 may provide digital video signals D to digital television 106 B by playing them back form DVD 104 .
  • DVD player 102 may provide controls 126 within electronic digital containers 136 to digital television 106 B.
  • Digital television 106 B may include a rights management component 124 C that manages rights in the digital content based on digitally-provided control information 126 .
  • computer 100 G may receive digital content and associated control information 126 from a digital network 144 , and provide digital video signals D and associated controls 126 to digital television 106 B.
  • digital television 106 B includes an analog output that may provide analog television signals to additional devices, such as, for example, an analog video cassette recorder 118 .
  • the rights management component 124 C within digital television 106 B may steganographically encode the analog television signal A with controls 126 and associated organizational structure(s) 136 before releasing the analog signal to the outside world.
  • FIG. 15F shows a further example arrangement 550 in which a digital appliance 100 G such as a personal computer receives digital video signal D and converts it into various analog television signal formats (e.g., NTSC/PAL and/or RGB) for output to analog devices such as an analog VCR 118 , an analog set top box 108 and/or an analog television set 106 A.
  • a rights management component 124 G within digital appliance 100 G steganographically encodes the received digital controls 126 onto the analog signal A′, A′′ before releasing the analog signal to the additional appliances 118 , 106 A, 108 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Biomedical Technology (AREA)
  • General Business, Economics & Management (AREA)
  • Virology (AREA)
  • Human Computer Interaction (AREA)
  • Technology Law (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Power Engineering (AREA)
  • Automation & Control Theory (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

Electronic steganographic techniques can be used to encode a rights management control signal onto an information signal carried over an insecure communications channel. Steganographic techniques ensure that the digital control information is substantially invisibly and substantially indelibly carried by the information signal. These techniques can provide end-to-end rights management protection of an information signal irrespective of transformations between analog and digital. An electronic appliance can recover the control information and use it for electronic rights management to provide compatibility with a Virtual Distribution Environment. In one example, the system encodes low data rate pointers within high bandwidth time periods of the content signal to improve overall control information read/seek times.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • This application is related to commonly assigned copending application Ser. No. 08/388,107 of Ginter et al., filed Feb. 13, 1995, entitled “SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION” (attorney reference number 895-13). We incorporate by reference, into this application, the entire disclosure of this prior-filed Ginter et al. patent application just as if its entire written specification and drawings were expressly set forth in this application.[0001]
  • FIELD OF THE INVENTION
  • The present inventions relate generally to computer security, and more particularly to steganographic techniques for hiding or encoding electronic control information within an information signal carried by an insecure communications channel. Still more particularly, the present inventions relate to systems, methods and techniques that substantially invisibly and/or indelibly convey, over analog or other insecure communications channels, digital rights management control information for use within a virtual distribution environment electronic rights management system. [0002]
  • BACKGROUND AND SUMMARY OF THE INVENTION
  • The world is becoming digital. Digital signals are everywhere—in our computers, television sets, VCRs, home stereos, and CD players. Digital processing—which operates on information “bits” (numerical “on” or “off” values)—provides a degree of precision and protection from noise that cannot be matched by the older, “analog” formats we have used since the beginning of the electronic age. [0003]
  • Despite the clear advantage of digital communications, the older “analog” domain remains significant. Many of our most important information delivery mechanisms continue to be based on analog—not digital—signaling. In fact, most of our electronic entertainment, news, sports and music program material comes to us in the form of analog signals. For example: [0004]
  • Television remains largely analog. Although the distribution of television programming to local cable systems is increasingly digital and most modem television sets include digital signal processing circuits, the local cable television “head end” continues to send television signals to the subscriber's set top box and television in analog—not digital—form. It will cost a great deal to convert local cable distribution from analog to digital. In the United States, for example, the widespread conversion from analog to digital television is projected to take no less than 15 years and perhaps even longer. [0005]
  • In radio broadcasting, too, analog communication continues to reign supreme. Thousands of radio stations broadcast music, news and other programs every day in analog form. Except for a few experimental digital systems, practically all radio broadcasting is carried over analog communications channels. [0006]
  • The movies and videos we rent at the local video tape rental store are analog. [0007]
  • Commercially available music tape cassettes are recorded in analog formats. [0008]
  • Moreover, the “real world” is analog. Everything digital must ultimately be turned into something analog if we are to experience it; and conversely, everything analog must be turned into something digital if the power of modern digital technology will be used to handle it. Modem digital technology also allows people to get better quality for less money. [0009]
  • Despite the pervasiveness of analog signals, existing methods for managing rights and protecting copyright in the analog realm are primitive or non-existent. For example: [0010]
  • Quality degradation inherent in multigenerational analog copying has not prevented a multi-billion dollar pirating industry from flourishing. [0011]
  • Some methods for video tape copy and pay per view protection attempt to prevent any copying at all of commercially released content, or allow only one generation of copying. These methods can generally be easily circumvented. [0012]
  • Not all existing devices respond appropriately to copy protection signals. [0013]
  • Existing schemes are limited for example to “copy/no copy” controls. [0014]
  • Copy protection for sound recordings has not been commercially implemented. [0015]
  • A related problem relates to the conversion of information between the analog and digital domains. Even if information is effectively protected and controlled initially using strong digital rights management techniques, an analog copy of the same information may no longer be securely protected. [0016]
  • For example, it is generally possible for someone to make an analog recording of program material initially delivered in digital form. Some analog recordings based on digital originals are of quite good quality. For example, a Digital Versatile Disk (“DVD”) player may convert a movie from digital to analog format and provide the analog signal to a high quality analog home VCR. The home VCR records the analog signal. A consumer now has a high quality analog copy of the original digital property. A person could re-record the analog signal on a DVD-R (a Digital Versatile Disk appliance and media supporting both read and write operations). This recording will in many circumstances have substantial quality—and would no longer be subject to “pay per view” or other digital rights management controls associated with the digital form of the same content. [0017]
  • Since analog formats will be with us for a long time to come, rightsholders such as film studios, video rental and distribution companies, music studios and distributors, and other value chain participants would very much like to have significantly better rights management capabilities for analog film, video, sound recordings and other content. Solving this problem generally requires a way to securely associate rights management information with the content being protected. [0018]
  • People have for many years been using various techniques allowing digital information to, in effect, ride “piggyback” on analog information signals. For example, since the 1960s, it has been common to digitally encode text information such as subtitles into otherwise unused portions of analog television signals (e.g., within the so-called “Vertical Blanking Interval”). [0019]
  • Unfortunately, sending digital information using such known digital encoding techniques is problematic because the digital information is not persistent. It is relatively easy to strip out or eliminate digital information encoded using prior techniques commonly employed for superimposing digital signals onto an analog information signal. Analog communications channels may commonly be subjected to various signal processing that may (intentionally or unintentionally) strip out digital information added to the analog signal—defeating any downstream system, process or technique that depends on the presence and readability of the digital information. For example, the television vertical blanking signal—along with any signal components disposed within the vertical blanking interval—is typically routinely eliminated whenever a video signal is processed by a computer. [0020]
  • Attempting to use insecure techniques for providing rights management is at best ineffective, and can be worse than no rights management at all. Unscrupulous people can strip out insecure control information altogether so that the corresponding information signal is subject to no controls at all—for example, defeating copy protection mechanisms and allowing users to avoid paying for rights usage. More nefariously, an unscrupulous person could alter an insecure system by substituting false control information in place of the proper information. Such substitutions could, for example, divert payments to someone other than legitimate rights holders—facilitating electronic fraud and theft. [0021]
  • Prior, insecure techniques fail to solve the overall problem of how to provide and securely manage advanced automatic electronic rights management for analog and other information signals conveyed over an insecure communications channel. The lack of strong rights management for analog signals creates a huge gap in any comprehensive electronic rights management strategy, and makes it possible for consumers and others to circumvent—to at least some extent—even the strongest digital rights management technologies. Consequently, there is a real need to seamlessly integrate analog delivery models with modern electronic digital rights management techniques. [0022]
  • The present inventions solve these and other problems by providing “end to end” secure rights management protection allowing content providers and rights holders to be sure their content will be adequately protected—irrespective of the types of devices, signaling formats and nature of signal processing within the content distribution chain. This “end to end” protection also allows authorized analog appliances to be easily, seamlessly and cost-effectively integrated into a modem digital rights management architecture. [0023]
  • The present inventions may provide a Virtual Distribution Environment (“VDE”) in which electronic rights management control information may be delivered over insecure (e.g., analog) communications channels. This Virtual Distribution Environment is highly flexible and convenient, accommodating existing and new business models while also providing an unprecedented degree of flexibility in facilitating ad hoc creation of new arrangements and relationships between electronic commerce and value chain participants—regardless of whether content is distributed in digital and/or analog formats. [0024]
  • The present inventions additionally provide the following important and advantageous features: [0025]
  • An indelible and invisible, secure technique for providing rights management information. [0026]
  • An indelible method of associating electronic commerce and/or rights management controls with analog content such as film, video, and sound recordings. [0027]
  • Persistent association of the commerce and/or rights management controls with content from one end of a distribution system to the other—regardless of the number and types of transformations between signaling formats (for example, analog to digital, and digital to analog). [0028]
  • The ability to specify “no copy/one copy/many copies” rights management rules, and also more complex rights and transaction pricing models (such as, for example, “pay per view” and others). [0029]
  • The ability to fully and seamlessly integrate with comprehensive, general electronic rights management solutions (such as those disclosed in the Ginter et al. patent specification referenced above). [0030]
  • Secure control information delivery in conjunction with authorized analog and other non-digital and/or non-secure information signal delivery mechanisms. [0031]
  • The ability to provide more complex and/or more flexible commerce and/or rights management rules as content moves from the analog to the digital realm and back. [0032]
  • The flexible ability to communicate commerce and/or rights management rules implementing new, updated, or additional business models to authorized analog and/or digital devices. [0033]
  • Briefly, the present inventions use “steganography” to substantially indelibly and substantially invisibly encode rights management and/or electronic commerce rules and controls within an information signal such as, for example, an analog signal or a digitized (for example, sampled) version of an analog signal. [0034]
  • The Greek term “steganography” refers to various “hidden writing” secret communication techniques that allow important messages to be securely carried over insecure communications channels. Here are some examples of steganography: [0035]
  • In ancient Persia an important message was once tattooed on a trusted messenger's shaved scalp. The messenger then allowed his hair to grow back—completely hiding the message. Once the messenger made his way to his destination, he shaved his hair off again—exposing the secret message so the recipient could read it on the messenger's shaved scalp. See Kahn, David, [0036] The Codebreakers page 81 et seq. and page 513 et seq. (Macmillan 1967). This unusual technique for hiding a message is one illustration of “steganography.”
  • Another “steganographic” technique encodes a secret message within another, routine message. For example, the message “Hey Elmer, Lisa Parked My Edsel” encodes the secret message “HELP ME”—the first letter of each word of the message forming the letters of the secret message (“Hey Elmer, Lisa Parked My Edsel”). Variations on this technique can provide additional security, but the basic concept is the same—finding a way to hide a secret message within information that can or will be sent over an insecure channel. [0037]
  • Invisible ink is another commonly used “steganography” technique. The secret message is written using a special disappearing or invisible ink. The message can be written on a blank piece of paper, or more commonly, on the back or front of the piece of paper carrying a routine-looking or legitimate letter or other written communication. The recipient performs a special process on the received document (e.g., exposing it to a chemical or other process that makes the invisible ink visible) so that he or she can read the message. Anyone intercepting the paper will be unable to detect the secret message—or even know that it is there—unless the interceptor knows to look for the invisible message and also knows how to treat the paper to make the invisible ink visible. [0038]
  • The present inventions use steganography to ensure that encoded control information is both substantially invisible and substantially indelible as it passes over an insecure communications channel. At the receiving end, a secure, trusted component (such as a protected processing environment described in Ginter et al.) recovers the steganographically-encoded control information, and uses the recovered information to perform electronic rights management (for example, on analog or other information signals carried over the same channel). [0039]
  • One specific aspect provided by the present inventions involve steganographically encoding digital rights management control information onto an information signal such as, for example, an analog or digitized television, video or radio signal. The steganographic encoding process substantially inextricably intertwines the digital control information with images, sounds and/or other content the information signal carries—but preferably without noticeably degrading or otherwise affecting those images, sounds and/or other content. It may be difficult to detect (even with educated signal processing techniques) that the analog signal has been steganographically encoded with a rights management control signal, and it may be difficult to eliminate the steganographically encoded control signal without destroying or degrading the other information or content the signal carries. [0040]
  • The present inventions also provide a secure, trusted protected processing environment to recover the steganographically-encoded control signal from the information signal, and to enforce rights management processes based on the recovered steganographically encoded control signal. This allows the information signal delivery mechanism to be fully integrated (and made compatible) with a digital virtual distribution environment and/or other electronic rights management system. [0041]
  • In accordance with yet another aspect provided by this invention, steganographically encoded, digital rights management control information may be used in conjunction with a scrambled and/or encrypted information signal. The scrambling and/or encryption can be used to enforce the rights management provided in accordance with the steganographically encoded rights management control information. For example, the control signal can be steganographically decoded and used to control, at least in part, under what circumstances and/or how the information signal is to be descrambled and/or decrypted. [0042]
  • In accordance with yet another feature provided by the invention, digital certificates can be used to securely enforce steganographically encoded rights management control information. [0043]
  • In accordance with still another feature provided by the invention, steganography is used to encode an information signal with rights management control information in the form of one or more protected organizational structures having association with electronic controls. The electronic controls may, for example, define permitted and/or required operation(s) on content, and consequences of performing and/or failing to perform such operations. The organizational structure(s) may identify, implicitly or explicitly, the content the electronic controls apply to. The organizational structure(s) may also define the extent of the content, and semantics of the content. [0044]
  • The type, amount and characteristics of the steganographically encoded rights management control information are flexible and programmable—providing a rich, diverse mechanism for accommodating a wide variety of rights management schemes. The control information can be used to securely enforce straightforward secure rights management consequences such as “copy/no copy/one copy” type controls—but are by no means limited to such models. To the contrary, the present invention can be used to enable and enforce much richer, more complex rights management models—including for example those involving usage auditing, automatic electronic payment, and the use of additional electronic network connections. Moreover, the rights management control arrangements provided by the present invention are infinitely extensible and scaleable—fully accommodating future models as they are commercially deployed while preserving full compatibility with different (and possibly more limited) rights management models deployed during earlier stages. [0045]
  • The organizational structure(s) may be steganographically encoded in such a way that they are protected for purposes of secrecy and/or integrity. The employed steganographic techniques may provide some degree of secrecy protection—or other security techniques (e.g., digital encryption, digital seals, etc.) may be used to provide a desired or requisite degree of security and/or integrity protection for the steganographically encoded information. [0046]
  • In one example, the organizational structure(s) may comprise digital electronic containers that securely contain corresponding digital electronic control information. Such containers may, for example, use cryptographic techniques. In other examples, the organizational structure(s) may define associations with other electronic control information. The other electronic control information may be delivered independently over the same or different communications path used to deliver the organizational structure(s). [0047]
  • In one example, the steganographic techniques employed may involve applying the organizational structure information in the form of high frequency “noise” to an analog information signal. Spectral transforms may be used to apply and recover such steganographically-encoded high frequency “noise.” Since the high frequency noise components of the information signal may be essentially random, adding a pseudo-random steganographically encoded control signal component may introduce substantially no discernible information signal degradation, and may be difficult to strip out once introduced (at least without additional knowledge of how the signal was incorporated, which may include a shared secret). [0048]
  • In accordance with another aspect provided by the invention, a steganographic encoding process analyzes an information signal to determine how much excess bandwidth is available for steganographic encoding. The steganographic encoding process may use variable data rate encoding to apply more control information to parts of an information signal that use much less than all of the available communications channel bandwidth, and to apply less control information to parts of an information signal that use nearly all of the available communications channel bandwidth. [0049]
  • In accordance with still another aspect provided by the invention, multiple organizational structures may be steganographically encoded within a given information signal. The multiple organizational structures may apply to different corresponding portions of the information signal, and/or the multiple organizational structures may be repetitions or copies of one another to ensure that an electronic appliance has “late entry” and/or error correcting capability and/or can rapidly locate a pertinent organizational structure(s) starting from any arbitrary portion of the information signal stream. [0050]
  • In accordance with yet another aspect provided by this invention, an organizational structure may be steganographically encoded within a particular portion of a content-carrying information signal to which the organizational structure applies—thereby establishing an implicit correspondence between the organizational structure and the identification and/or extent and/or semantics of the information content to which the organizational structure applies. The correspondence may, for example, include explicit components (e.g., internally stated start/end points), with the storage or other physical association determined by convenience (i.e., it may make sense to put the organizational structure close to where it is used, in order to avoid seeking around storage media to find it). [0051]
  • In accordance with yet another aspect provided by this invention, pointers can be steganographically encoded into parts of an information signal stream that has little excess available bandwidth. Such pointers may be used, for example, to direct an electronic appliance to portions of the information signal stream having more available bandwidth for steganographic encoding. Such pointers may provide improved steganographic decode access time—especially, for example, in applications in which the information signal stream is stored or otherwise available on a random access basis.[0052]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features and advantages provided by this invention may be better and more completely understood by referring to the following detailed description of presently preferred example embodiments in conjunction with the drawings, of which: [0053]
  • FIG. 1 shows a virtual distribution environment providing steganographic encoding of digital rights management control information; [0054]
  • FIGS. [0055] 1A-1E show example electronic appliances embodying aspects of this invention;
  • FIG. 2 shows an example of how electronic control information can be steganographically encoded within an image; [0056]
  • FIG. 3 shows an example rights management component providing a steganographic decoding function; [0057]
  • FIG. 4 shows an example of how steganographically encoded electronic control signals can be extracted and used for digital rights management; [0058]
  • FIGS. [0059] 5A-5D show example techniques for enforcing steganographically encoded rights management control information;
  • FIGS. [0060] 5E-5F show example “end to end” protected distribution systems provided in accordance with the invention;
  • FIG. 6 shows an example of multiple sets of digital rights management control information steganographically encoded onto different parts of the same information signal stream; [0061]
  • FIG. 7A shows an example detailed steganographic encoding process; [0062]
  • FIG. 7B shows an example detailed steganographic decoding process; [0063]
  • FIG. 8 shows an example frequency domain view of an example steganographic signal encoding technique; [0064]
  • FIG. 9 shows an example use of a variable steganographic encoding rate to avoid exceeding channel bandwidths; [0065]
  • FIGS. 10 and 10A show how steganographically encoded pointers can be used to minimize access times to control signals steganographically encoded onto information signal streams available on a random access basis; [0066]
  • FIG. 11 shows an example steganographically encoded organizational structure; [0067]
  • FIG. 12 shows an example electronic appliance architecture having electronic rights management capabilities based at least in part on steganographically encoded control information; [0068]
  • FIGS. 13 and 13A show example control steps that may be performed by the FIG. 12 appliance; [0069]
  • FIG. 14 shows an example steganographic refresh arrangement; and [0070]
  • FIGS. [0071] 15A-15F show example distribution systems using steganographic encoding of rights management control information along at least one leg of an information distribution path.
  • DETAILED DESCRIPTION OF PRESENTLY PREFERRED EXAMPLE EMBODIMENTS
  • FIG. 1 shows an example Virtual Distribution Environment (VDE) [0072] 50 employing steganography to deliver electronic digital rights management control information over an insecure (e.g., analog) communications channel.
  • In this example, a [0073] provider 60 delivers an information signal 70 to multiple electronic appliances 100(1), . . . , 100(N). In this particular example, provider 60 is shown as being a television broadcaster that delivers an analog television information signal 70 over a wireless or cable communications path, and appliances 100(1), . . . , 100(N) are shown as being home color television sets 106. As made clear by FIGS. 1A-1E, the present inventions may be used by a variety of different types of electronic appliances 100 receiving a variety of different types of information signals via a variety of different types of communications channels.
  • In the FIG. 1 example, [0074] provider 60 steganographically encodes electronic rights management control information 126 into the information signal 70. This control information 126 is represented in this diagram as a traffic light because it may define permitted and/or required operation(s), and consequences of performing or failing to perform such operations. For example, control information 126 could specify that a viewer or class of viewers has permission to watch a particular program, is forbidden to watch a program, or may watch a program only under certain conditions (for example, based on paying a certain amount, being over a certain age, etc.). In this example the control information 126 is shown as being packaged within an electronic “container” 136. Container 136 (which in at least one example is provided by steganographic encoding techniques) is used to protect the integrity of the control information 126.
  • The [0075] provider 60 encodes the electronic rights management control information 126 onto information signal 70 using steganographic techniques that make the control information both:
  • substantially invisible, and [0076]
  • substantially indelible. [0077]
  • The [0078] control information 126 is substantially indelibly encoded because, in this example, it is substantially inextricably intertwined with the television images and/or sound—and can't easily be eliminated from information signal 70 without destroying the images, sound or other information carried by the information signal. For example, steganographically encoding rights management control information will generally survive compression and decompression of a digitized analog signal, and will also survive repeated analog/digital/analog conversion sequences.
  • Even though the steganographically encoded [0079] control information 126 is substantially indelible, the television viewer is not bothered by the steganographically encoded information because the steganographically encoded rights management control information is, in this example, also encoded substantially invisibly. In fact, the viewer may not be able to see the steganographic control information at all—and it may have no effect whatsoever on his or her viewing experience (other than in terms of the effect is has on associated rights management processes). The control information 126 is shown in dotted lines on the FIG. 1 screens of television sets 106 to emphasize that the control information is substantially inextricably intertwined with the television images and/or sounds—and yet can't really be seen or noticed by the television viewer.
  • FIG. 2 shows an example of how [0080] digital control information 126 may be encoded within an image 128 so that, in one particular example, it is both substantially invisible and substantially indelible. In this specific image context, for example, “substantially invisible” may refer to the characteristic of the encoded control information as not substantially interfering with or adversely affecting the viewer's experience in viewing image 128 or otherwise using the content carried by the information signal 70 and/or that it is difficult to detect using various types of signal processing techniques, for example. For example, invisibility can be a measurable quantity (measured in a number of processor instructions, such as MIPS years, for example), and can be related to signal processing as opposed to the naked eye. In this context, “substantially indelible” can mean, for example, that the encoded digital control information is substantially inextricably intertwined with the content information, making it difficult for example to strip out the encoded digital control information without also damaging or degrading the content. Degree of indelibility may, for example, be measured by the number of processor instructions required to strip the information out.
  • FIG. 2 shows that a slight rearrangement of picture element configuration in a small portion of [0081] image 128 is one way to steganographically encode electronic control information into the image to provide a substantially indelible, substantially invisible encoding. This encoding may be unnoticeable to the viewer, and yet it may be difficult to strip out or eliminate without also damaging the image. Steganographically encoding digital control information into the information signal 70 may effectively merge, from a practical standpoint, the digital control information with the other information carried by the signal (for example, television programming or other content). The steganographic techniques make it difficult for someone to intentionally or unintentionally eliminate the encoded control information without damaging the content, but may (in one example) nevertheless hide the encoded control information so that it does not unduly detract from the content.
  • Since indelibility of the steganographic encoding provides persistence, indelibility may be more important than invisibility in at least some applications. For example, it may be desirable in some applications to use a shared secret to decode and then remove the steganographically encoded [0082] control information 126 before presenting the information signal (or its content) to the user. The steganographically encoded information need not be particularly invisible in this scenario. Even though someone with knowledge of the shared secret can remove the steganographically encoded information, it may nevertheless remain substantially indelible to anyone who doesn't know the shared secret required to remove it.
  • Organization Structures [0083]
  • FIG. 1 shows that control [0084] information 126 may be packaged within one or more organizational structures such as secure digital containers 136. Containers 136 may be, for example, of the type described in the Ginter et al. patent specification in connection with FIGS. 17-26B. The organizational structure(s) may identify, implicitly or explicitly, the content the electronic controls apply to. The organizational structure(s) may also define the extent of the content, and semantics of the content.
  • The organizational structure(s) may be encoded in such a way that they are protected for purposes of secrecy, authenticity and/or integrity. The employed steganographic technique may provide such protection, or another security technique may be used in conjunction with steganography to provide a desired or requisite degree of protection depending on the application. [0085] Containers 136 may, for example, use mathematical techniques called “encryption” that help guarantee the integrity and/or secrecy of the control information 126 they contain.
  • Example Rights Management Component [0086]
  • Each of the FIG. 1 [0087] example appliances 100 may include a electronic digital rights management component 124. Rights management component 124 may, for example, comprise one or more tamper-resistant integrated circuit “chips”. Components 124 may, for example, be of the general type described in detail at FIG. 9 and following of the Ginter et al. patent specification. Briefly, Ginter et al. describes a Virtual Distribution Environment (“VDE”) including multiple electronic appliances coupled together through a communications capability. Each electronic appliance has such a secure, tamper-resistant “protected processing environment” in which rights management processes may securely take place. The Virtual Distribution Environment delivers digital control information to the protected processing environments by packaging the control information within secure electronic digital containers. This delivered control information provides at least part of the basis for performing electronic rights management functions within the protected processing environments.
  • The ability to securely deliver digital control information to such protected processing environments as embodied with [0088] components 124 is important at least because it increases flexibility and enhances functionality. For example, different digital control information can be delivered for the same or different electronic content. As one specific example, one set of rules may apply to a particular television program, another set of rules might apply to a particular film, and a still different set of rules could apply to a particular musical work. As yet another example, different classes of users of the same electronic content can receive different control information depending upon their respective needs.
  • [0089] Rights management components 124 are able to steganographically decode the control information 126 carried by the information signal 70. Components 124 use the decoded control information 126 to electronically manage rights. For example, components 126 may use the decoded control information 126 to control how the images and/or sound carried by information signal 70 may be used.
  • In one example, digital [0090] rights management component 124 may comprise or include one or more integrated circuit chips as shown in FIG. 3. The FIG. 3 example rights management component 124 includes an analog-to-digital converter 130, a steganographic decoder 132, and a rights management processor 134. Rights management processor 134 may include or comprise a protected processing environment 138 as described in Ginter et al. FIGS. 8-12, for example, providing a tamper-resistant execution environment for effecting the operations provided by electronic controls 126. Rights management component 124 may also include a steganographic encoder and a digital-to-analog converter (not shown).
  • The analog-to-digital converter (ADC) [0091] 130 shown in FIG. 3 takes the incoming information signal 70 and—if it is in analog form—converts it to a digital signal (see FIG. 4, step “A”). Steganographic decoder 132 obtains the digital control information 126 from the resulting digital signal (FIG. 4, step “B”). As mentioned above, digital control information 126 may define permitted and/or required operation(s) on the content carried by signal 70, and may further define consequences of performing and/or failing to perform such operations. Rights management processor 134 may manage these rights and/or permissions and associated consequences (FIG. 4, step “C”).
  • Example Electronic Appliances [0092]
  • The present inventions may be used with all sorts of different kinds of [0093] electronic appliances 100 each of which may include a rights management component 124. FIGS. 1A-1E show various example electronic appliances 100 embodying aspects of the present invention. For example:
  • FIG. 1A shows an [0094] example media player 102 capable of playing Digital Versatile Disks (DVDs) 104 on a home color television set 106. For example, media player 102 may provide analog output signals to television set 106, and may also process digitized video and/or audio analog signals stored on optical disk 104. Rights management component 124A provides digital rights protection based on steganographically encoded controls 126.
  • FIG. 1B shows an example set [0095] top box 108 that can receive cable television signals (for example, via a satellite dish antenna 110 from a satellite 112) for performance on home television set 106. Set top box 108 shown in FIG. 1B may receive television signals from antenna 110 in analog scrambled or unscrambled form, and provide analog signals to television 106. Rights management component 124B provides digital rights protection based on steganographically encoded controls 126.
  • FIG. 1C shows an [0096] example radio receiver 114 that receives radio signals and plays the radio sound or music on a loud speaker 116. The radio receiver 114 of FIG. 1C may receive analog radio signals, and provide analog audio signals to loud speaker 116. Rights management component 124C provides digital rights protection based on steganographically encoded controls 126.
  • FIG. 1D shows an example [0097] video cassette recorder 118 that can play back video and sound signals recorded on a video cassette tape 120 onto television 106. In FIG. 1D, the video tape 120 may store video and audio signals in analog form, which VCR 118 may read and provide to television 106 in analog form. Rights management component 124D provides digital rights protection based on steganographically encoded controls 126.
  • FIG. 1E shows an example television camera that can capture video images and produce video signals for recording on a [0098] video cassette tape 120 and play back on television set 106. The FIG. 1E camcorder 122 may generate analog video and audio signals for storage onto video tape 120, and/or may provide analog signals for processing by television 106. Rights management component 124E provides digital rights protection based on steganographically encoded controls 126.
  • Example Rights Management Enforcement Techniques [0099]
  • Different rights holders want different types of rights management and control. For example, some rights holders may be completely satisfied with a relatively simple “copy/no copy/one copy” rights management control model, whereas other rights holders may desire a richer, more complex rights management scheme. The present inventions flexibly accommodate a wide variety of electronic rights management techniques—giving rightsholders extreme flexibility and programmability in defining, for example, commerce and rights management models that far exceed the simple “copy/no copy, one copy.” Assuming a closed appliance, that is, one lacking at least an occasional connection to a payment method (e.g., Visa, MasterCard, American Express, electronic cash, Automated Clearinghouses (ACHs) and/or a Financial Clearinghouse that serves as the interface for at least one payment method), the following are non-limiting examples of steganographically encoded rights controls and associated consequences that can be accommodated by the present invention: [0100]
  • Limiting use of a given property to a specified number of times this property can be used on a given appliance; [0101]
  • Prohibiting digital to analog and analog to digital conversions; [0102]
  • Ensuring that one analog or digital appliance will communicate the protected property only to another appliance that is also VDE enabled and capable of enforcing the controls associated with that property; [0103]
  • Time-based rental models in which a consumer may “perform” or “play” the property an unlimited number of times in a given interval (assuming the appliance has a built-in secure time clock, can operatively connect itself to such a clock, or otherwise receive time from a reliable source); [0104]
  • Enforcing an expiration date after which the property cannot be performed (also assuming access to a reliable time source); [0105]
  • Associating different control sets with each of several properties on a single physical media. In one example, a “trailer” might have unlimited copying and use associated while a digital film property may have an associated control set that prevents any copying; [0106]
  • Associating multiple control sets with a given property regardless of media and whether the appliance is closed or has an occasionally connected communications “backchannel.”[0107]
  • An even more flexible and diverse array of rights controls and associated consequences are enabled by the present inventions if at least one appliance is connected to some form of communications “backchannel” between the appliance and some form of payment method. This backchannel may be a telephone call, the use of a modem, a computer data network, such as the Internet, a communications channel from a settop box to the head end or some other point on a cable TV distribution system, or a hybrid arrangement involving high bandwidth distribution of analog properties with a slower return channel, a phone line and modem—just to name a few examples. Non-limiting examples of such more rights controls and associated consequences enabled by the present invention include the following: [0108]
  • Associating with a given property in analog format new, independently delivered controls obtained from a rightsholder or other authorized source; [0109]
  • A broad range of usage-based pricing models, including pay-per-view or pay-per-use; [0110]
  • Creating permissions enabling excerpting of properties in analog formats, maintaining persistent control over those excerpts, and charging for those excerpts; [0111]
  • Pay-per-use models in which a customer pays a specified price for each use of the property and/or different unit prices depending on the number of uses. In one example, the customer might pay $3.99 for the first viewing and $2.99 for each subsequent viewing; and, [0112]
  • Controls that prevent an analog property being converted to digital format and then being transmitted or communicated except in a container with controls and/or with a pointer to a source of controls, that apply in a digital environment. [0113]
  • FIGS. [0114] 5A-5D show some examples of how rights management component 124 can enforce steganographically encoded digital rights management controls.
  • In the FIG. 5A example, [0115] rights management component 124 controls an on/off switch 140 based on steganographically encoded electronic controls 126. Component 124 turns switch 140 on (for example, to allow the analog television signal to pass to television set 106) when electronic controls 126 permit, and otherwise opens (turns off) switch 140 to prevent the analog signal from reaching the output.
  • In a more secure-example, the incoming analog signal is scrambled, and the FIG. 5A on/off [0116] switch 140 is replaced by a FIG. 5B descrambler 142 of conventional design. The descrambler 142 descrambles the analog input signal to provide a descrambled output under control of rights management component 124. Rights management component 124 allows descrambler 142 to descramble the analog signal only under conditions specified by electronic controls 126 that the component 124 obtains from the analog input signal. Scrambling the analog signal gives the rights management component 124 a relatively secure way of enforcing electronic controls 126—since the rights management component can prevent the descrambler from operating unless conditions set by the controls are satisfied. The rights management function and the descrambling function may be integrated into a single component in which the descramble and decrypt functions of the rights management component are essentially serving the same function, but may still be distinct to account for specialized approaches to descrambling that may not be sufficiently strong or interoperable with other environments to use generally. If they are separate components, the data path between them should be protected (for example, by ensuring that both components are in a tamper resistant enclosure, or using secure authentication and key exchange to send the descrambling sequence to the descrambler).
  • FIG. 5C shows how digital certificates may be used to enforce steganographically encoded [0117] electronic controls 126. In this example, appliance 100A outputs content to another appliance 110D only if appliance 100D has a rights management component 124D that can enforce the electronic controls 126. In this example, there may be a “handshake” between the content supplying appliance 100A and the content receiving appliance 100D sufficient to ensure the content supplying appliance that the content receiving appliance will enforce the electronic controls 126. For example, the supplying appliance 100A's rights management component 124A may require the receiving appliance 100D's rights management component 124D to present a digital certificate 199 attesting to the fact that the receiving appliance 100D has a rights management component 124 fully capable of securely enforcing electronic controls 126. Receiving appliance 110D could present this digital certificate 199 by steganographically encoding it within an analog signal it provides to the supplying appliance over an analog signal channel for example (the analog signal channel could be the same one the supplying appliance will use to deliver the steganographically encoded content). If a digital channel is available, the handshake can be over a digital link between the two appliances using, for example, secure authentication techniques disclosed in Ginter et al. and/or for example in Schneier, Applied Cryptography (2d Ed. Wiley 1996) at page 52 et seq.
  • FIG. 5D shows that [0118] rights management component 124A can enforce electronic controls 126 by marking the content through “fingerprinting” and/or “watermarking” prior to releasing the content to a device that doesn't have a rights management component 124. See Ginter et al. patent specification, FIGS. 58A-58C. Such fingerprinting could involve using steganographic techniques to fingerprint the content. For example, a movie delivered using “conventional” containers as disclosed in Ginter et al. could use steganographically encoded containers “on the way” to the display device. Furthermore, it could include the identity of the user, etc. as well as the control information appropriate for the device. Another case could be text sent to a printer, using different steganographic encoding techniques such as line and/or character shifting.
  • End to End Protection [0119]
  • FIGS. [0120] 5E-5F illustrate how the persistent association with content provided by steganographically encoded electronic rights management control information 126 provides “end to end” protection within an arbitrary information signal distribution system—irrespective of the processes the information signal is subjected to as it travels to its final destination.
  • FIG. 5E shows an example of how the present inventions can be used to maintain end-to-end rights management protection over content initially distributed in an analog signal format. FIG. 5F shows an example of how the present invention can be used to maintain end-to-end rights management protection over content initially distributed in digital form. [0121]
  • In the FIG. 5E example, an analog signal transmission site (e.g., a radio or television broadcaster) transmits an analog signal A steganographically encoded with an [0122] organizational structure 136 including electronic controls 126. This analog signal A may be received by an electronic appliance 100A having a rights management component 124A as described above. Appliance 100A may, for example, convert the signal into digital and/or digitized format, and store the digitized version of the signal onto a digital storage medium 104. Electronic appliance 100A may play back the recorded digitized signal, convert the signal back to analog form, and deliver the analog signal A to a further electronic appliance 106B. In this example, electronic appliance 106B also has a rights management component 124B.
  • The steganographic techniques provided by the present invention ensure that the [0123] electronic controls 126 persist in the signal A delivered from appliance 100A to appliance 106B—and from appliance 106B to still other appliances. Because of the substantial indelibility characteristics of the steganographically encoded control information 126, this information persists in the signal as stored on recording medium 104, in copies of the recorded signal produced by replaying the medium, and in further downstream versions of the signal.
  • This persistence will, for example, survive conversion from analog to digital format (e.g., sampling or “digitizing”), storage, and subsequent conversion from digital to analog format. For example, because the steganographically encoded [0124] control information 126 is substantially indelibly, substantially inextricably intertwined and integrated with the information signal A, the digitized version of the information signal that appliance 100A records on medium 104 will also contain the steganographically encoded control information 126. Similarly, when appliance 100A plays back the recording from medium 104, it will reproduce information signal A along with the steganographically encoded control information 126. The steganographically encoded control information 126 thus persists irrespective of digitization (or other processing) of signal A. In some cases, lossy compression techniques used on the data may remove high frequency noise—thereby potentially damaging the steganographic channel. When these lossy compression techniques are used or may be encountered, the steganographic encoding function should be matched to the compression algorithm(s) using conventional signal analysis techniques to avoid this consequence.
  • Similarly, [0125] appliance 106B may output further copies or versions of signal A in analog form and/or digital form. Because of its inherently persistent characteristics, the steganographically encoded control information 126 will be present in all subsequent versions of the signal outputted by appliance 106B—be they in analog format, digital format, or any other useful format.
  • Degrading a digital signal carrying control information is fatal—the rights management system typically may no longer function properly if even a single bit is altered. To avoid this, the preferred embodiment provides redundancy (repeating pointers and the organizational structures and/or any control information incorporated into the organizational structures), and also uses conventional error correction coding such as, for example, Reed-Solomon (or similar) error correcting codes. Additionally, because the steganographically encoded [0126] control information 126 is substantially inextricably intertwined with the desired content carried by information signal A, any process that degrades the steganographically encoded control information 126 will also tend to degrade the information signal's desired content. Although the steganographically encoded information may degrade (along with the content) in multi-generation “copies” of the signal, degraded copies may not be commercially significant since the information content of the signal will be similarly degraded due to the substantially inextricable intertwining between the steganographically encoded control information 126 and the content carried by signal A. The refresh circuit shown in FIG. 14 with appropriate error correcting capabilities is one way to prevent the steganographically encoded information from being degraded even if the rest of the information the signal carries becomes degraded.
  • The FIG. 5F example shows content being initially distributed in digital form over a network to an [0127] electronic appliance 100J such as a personal computer. Personal computer 100J may convert the digitally delivered content to an analog signal A for distribution to other appliances 106B, 100A. Personal computer appliance 100J may include a rights management component 124J that ensures, based on controls 126, that appliance 100J does not release a version of the content associated with controls 126 that is not protected by the controls. In this example, rights management component 124J is capable of steganographically encoding the analog signal A with the control information 126 (e.g., it may perform the processes shown in FIG. 7A below). Rights management component 124J enforces controls 126, at least in part, by ensuring that any analog version of the content associated with controls 126 is steganographically encoded with those controls. Further “downstream” appliances 106B, 100A may each include their own rights management component 124 for use in interacting with steganographically encoded controls 126.
  • Example Control Information [0128]
  • FIG. 6 shows that a particular information signal [0129] 70 may be encoded with many different containers 136 and associated rights management control sets 126. For example, different portions of an information signal 70 may be associated with different control information 126. In this example of a movie 270:
  • a first “trailer” [0130] 272 may be associated with control information 126(1),
  • a [0131] second trailer 274 may be associated with control information 126(2),
  • a [0132] title section 276 may be associated with control information 126(3),
  • the first five minutes of the movie may be associated with control information [0133] 126(4), and
  • the rest of the movie may be associated with control information [0134] 126(5).
  • Control information portions [0135] 126(1), 126(2), 126(3), 126(4) and 126(5) may all be different. For example, control information 126(1) may permit the user to copy trailer 272, whereas control information 126(4) may prohibit the user from copying the first five minutes 278 of the film.
  • As shown in FIG. 6, multiple, identical copies of control information [0136] 126(5) may be steganographically encoded onto the information signal 70. For example, control information 126(5) could be encoded once per minute onto the rest of movie 280. This redundancy allows a media player 102 or other electronic appliance 100 to rapidly obtain a copy of the control information 126(5) no matter where the user begins watching or playing the movie 270, and also helps ensure that transmission errors will not prevent the rights management component 124 from recovering at least one “good” copy of the organizational structure.
  • Example Steganographic Encoding and Decoding Processes [0137]
  • FIGS. 7A and 7B show example overall steganographic encoding and decoding processes, respectively. The FIG. 7A process may be used to steganographically encode digital control information onto an analog signal, and FIG. 7B performs the inverse operation of steganographically decoding the control information from the analog signal. Generally, the FIG. 7A process may be performed at a supply point, and the FIG. 7B process may be performed at a usage point. An [0138] electronic appliance 100 can be both a supply point and a usage point, and so it may perform both the FIG. 7A process and the FIG. 7B process.
  • Referring to FIG. 7A, the [0139] analog information signal 70 inputted to the steganographic encoding process may be any sort of information signal such as, for example, the analog signal shown in Graph A1. A conventional analog-to-digital conversion block 402 may be used, if necessary, to convert this analog input signal to a digitized signal (see Graph A2). A spectral transform block 404 may then be used to transform the digitized information from the time domain to the frequency domain. Spectral transform block 404 may be any conventional transformation such as, for example, a Fast Fourier Transform (FFT) or a Walsh Transform. An example of the resulting spectral information is shown in the A3 graph.
  • A steganographic encode [0140] block 406 may be used to steganographically encode digital control information 126, in clear text form and/or after encryption by a conventional digital encryption block 414 based on an encryption key Keys Steganographic information can be combined with a pseudo-random data stream (e.g. exclusive-or'd into the output of a DES engine)—in effect shuffling around the noise in the signal rather than replacing noise with the signal, per se. When protection is desired, the values in the pseudo-random stream can be protected by encryption (e.g. the key that initializes the DES engine should be protected). When the steganographic channel is “public” (e.g., unencrypted), the stream should be readily reproducible (e.g. by using one of a preset collection of values shared by every device). A small portion (a “public header”—see Ginter et al.) is always detectable using a shared preset value (that does not need to be protected, distinguishing it from the private header keys), may be provided to ensure that the rights management technology can be activated properly. Since the rights management component 124 at the receiving side needs to know how to descramble the signal, there normally will be an indication in the “public header” that names a key that will be used to unlock the private header (and so on, as described, for example, in Ginter et al.). Some publicly available, agreed upon preset values may be used to extract the “public header” information from the steganographically encoded channel.
  • Steganographic encode [0141] block 406 may be any conventional steganographic encoding arrangement capable of steganographically encoding a digital signal onto information signal 70. Steganographic encode step 406 may be based on a key Kc—allowing the same basic steganographic encoding and decoding transformations to be used by a wide variety of different appliances while still maintaining individuality and secrecy through the use of different steganographic keys.
  • In one example, the [0142] steganographic encoding step 406 may introduce the (encrypted) digital control information into the high frequency spectrum portion of the spectrally transformed information signal 70. The spectrally transformed signal with steganographic encoding is shown in the FIG. 7A Graph A4, and is shown in more detail in FIG. 8. As FIG. 8 shows, the steganographic encoding may affect the higher order frequency components of the spectrally transformed signal (see dotted perturbations in the fourth, fifth, sixth, seventh and eighth order components in FIG. 8). The steganographic encoding may add to and/or subtract from the amplitudes of these higher order components. The effect of introducing high frequency steganographically encoded signal components may be to mask the steganographic encoding within the random high frequency noise inherently provided within information signal 70—thereby providing substantial invisibility and substantial indelibility.
  • The amount of amplitude modification performed by steganographic encode [0143] step 406 may be limited in this example to ensure that the resulting steganographically encoded signal does not exceed the available channel bandwidth. See, for example,
  • J. Millen, “Covert Channel Capacity,” [0144] IEEE Symposium on Security and Privacy (1987).
  • R. Browne, “An Entropy Conservation Law for Testing the Completeness of Covert Channel Analysis,” [0145] Fairfax 94, pp 270-281 (1994).
  • Moskovitz et al., “The Channel Capacity of a Certain Noisy Timing Channel,”, [0146] IEEE Trans. on Information Theory ν IT-38 no. 4, pp. 1330-43, (1992).
  • Venkatraman, et al., “Capacity Estimation and Auditability of Network Covert Channels,”, [0147] Oakland 95, pp. 186-298.
  • The following equations show the relationship between total bandwidth, bandwidth available for steganographic encoding, and the data rate of the steganographically encoded signal: [0148] S = ta tb B ( t ) t ( 1 ) = ~ i = a b B ( i ) Δt ( 1 A )
    Figure US20010026618A1-20011004-M00001
  • where Δt=t[0149] n+1−t, and
  • B is a function of time in bits/second. [0150]
  • In the above expressions, the function S corresponds to an area under a curve resulting from the product of B (bandwidth) and t (time). The parameter delta t refers to the “granularity” of the analog-to-digital conversion (i.e., 1/sampling rate). [0151]
  • FIG. 9 shows an example plot of information signal bandwidth versus time. The total bandwidth available is limited by the bandwidth of the transmission channel—including the bandwidth of the storage medium (if any) used to deliver the signal, and the bandwidth of the reproduction equipment. Since the total bandwidth depends on the inherent characteristics of the transmission channel used to communicate [0152] information signal 70, it is typically a fixed constant. FIG. 9 shows that the bandwidth actually used by the information signal 70 typically varies with time. For example, although somewhat counterintuitive, the more complex an image, the more noise is typically available for “shuffling around” to create a steganographic channel. Of course, this isn't always true—a highly intricate geometric pattern may have very little noise available for encoding, and a simple picture of a cloud may have a great deal of noise available.
  • Steganographic encode [0153] block 406 can use an encoding rate and characteristic that ensures the steganographically encoded signal bandwidth doesn't exceed the total bandwidth available in the communication channel. Typically, the amount of bandwidth available for steganographic encoding may be on the order of on the average of 0.1% of the total transmission channel bandwidth—but as mentioned above, this bandwidth available for steganographic encoding may be unequally distributed with respect to time within the information signal stream 70 and may depend on the content of the information signal.
  • In this example, steganographic encode [0154] block 406 analyzes the content (e.g., by performing statistical weighted averaging), and provides a responsive variable steganographic encoding rate. For example, steganographic encoding block 406 can use a high data rate during example time periods “II” and “IV” in which the information signal 70 has characteristics that allow high steganographic rate encoding without the resulting signal exceeding the available overall channel bandwidth. Encoding block 406 can use a low data rate during time periods “I” and “III” in which the information signal 70 has characteristics that do not allow high data rate steganographic encoding without exceeding available overall channel bandwidth. Steganographic encoding block 406 may use any number of different variable rates to accommodate different relationships between information signal 70 characteristics and available channel bandwidth.
  • Referring again to FIG. 7A, the steganographically encoded spectral information outputted by steganographic encode [0155] block 406 may be subjected to an inverse spectral transform 408. Inverse spectral transform 408 in this example may perform the inverse of the transform performed by step 404—outputting a version of the digitized time domain signal shown in Graph A2 but now bearing the steganographically encoded information (Graph A5). The digital control information steganographically encoded by block 406 may be substantially indelible and substantially invisible with respect to the Graph A5 signal—that is, it may be very difficult to eliminate the steganographically encoded information and it may also be very difficult to discern it.
  • This signal may be further scrambled and/or encrypted (e.g., based on a scrambling and/or encryption key Key[0156] d) before being converted to analog form (shown in Graph A6) by a conventional digital-to-analog conversion block 412 (if necessary). Signal scrambling may be independent of steganographically encoded control information. For example, a good way to support existing devices is to not scramble the signal, and to use legislative means to ensure that each new device manufactured is equipped with rights management technology. Scrambling/encrypting of content, can be used to enforce use of rights management. If legislative means can enforce the use of rights management technology, encryption or scrambling of content may not be necessary (although a decision to provide cryptographic protection for the control information is independent of this factor and must be evaluated in light of protecting the rights management system). Rights holders can choose an enticement technique(s) based on their business model(s). The benefit of scrambling is that it provides technical means for enforcing rights management. The benefit of unscrambled content is support of hundreds of millions of devices in the installed base—with the promise that new devices (potentially including computers) will enforce the control information even though they don't “have to” from a technical perspective.
  • The resulting steganographically encoded [0157] information signal 70 may then be transmitted over an insecure communications channel. Digital-to-analog conversion step 412 may be omitted if a digital communications channel (e.g., an optical disk, a digital satellite link, etc.) is available to deliver the signal.
  • FIG. 7B shows an example inverse process for recovering [0158] digital control information 126 from the steganographically encoded information signal 70. In this recovery example, the steganographically encoded analog signal is converted to a digitized signal (if necessary) by an analog-to-digital conversion step 402′ and decrypted/descrambled (if necessary) by a decryption/descrambling block 422′ to yield a facsimile of the inverse spectral transform block 408 output shown in FIG. 7A. In this FIG. 7B example, the analog-to-digital conversion block 402′ is the inverse operation of FIG. 7A, block 412, and the decrypt/descramble block 422′ is the inverse of the FIG. 7A scramble/encrypt block 410.
  • The resulting digitized signal provided by FIG. 7B block [0159] 422′ is spectrally transformed by step 404′ (this may be the same spectral transform used in FIG. 7A, block 404) to yield a steganographically encoded spectral signal A3. Steganographic decode block 424 may perform the inverse operation of the FIG. 7A steganographic encode block 406 based on the same steganographic key Keyc (if a key-based steganographic encoding/decoding transformation is used). The output of steganographic decode block 424 may be decrypted by block 426 (the inverse of FIG. 7A encrypt block 414 based on key Keys) to provide recovered digital control information 126. The resulting control information 126 may be used for performing electronic rights management functions. Required keys may be delivered in containers and/or using the key distribution techniques and device initialization approaches disclosed in Ginter et al., for example.
  • Example Control Information Arrangements [0160]
  • In a further example shown in FIGS. 10 and 10A, steganographic encode [0161] block 406 may encode control information organizational structures such as secure containers (see Ginter et al., FIGS. 17-26B and associated text) during times when the content bandwidth is low relative to the total available bandwidth (see FIG. 10 regions II and IV), and may not attempt to encode such organizational structures during times when the content bandwidth is high relative to the total available bandwidth (see FIG. 10, regions I, III). In this way, steganographic encode block 406 may maximize the total bandwidth use without causing the steganographically encoded signal to exceed available bandwidth. As an optimization for certain applications, steganographic encode block 406 may encode “pointers” or other directional information into the information signal 70 during times when the content is such that it doesn't allow high data rate steganographic encoding of organizational structures 136. Multiple pointers and multiple “pointed to” locations can also help provide redundancy.
  • This particular FIG. 10 example involving steganographic encoding of [0162] pointers 800 may be especially suited for content delivery or presentation on random access storage media such as optical disks. Using such random access media, a content handling device may be able to rapidly “seek” to the place where an organizational structure is stored at a higher recorded bandwidth and then read the organizational structure at this higher bandwidth (See FIG. 10A). For these example arrangements, steganographic encode block 406 in this example encodes, during periods when the content is such that it is not possible to steganographically encode organizational structures, pointers 800 that direct the content handling device to one or more places where the organizational structure appears in the content stream. In one example, pointers 800 might encode the location(s) on a storage medium (e.g., an optical disk 104—see FIG. 10A) at which the closest organizational structure is stored.
  • An [0163] optical disk player 102 with random access capability may “seek” to the place at which the closest organizational structure 136 is stored on the disk 104, and rapidly read the organizational structure off of the disk in less time than might be required to read an organizational structure that steganographic encode block 406 encodes at a lower data rate during times when the content bandwidth occupies most of the available channel bandwidth. In such arrangements, the process of reading a pointer 800, “seeking” to a position on the medium specified by the pointer, and then reading an organization structure 136 steganographically encoded at a high data rate may provide overall faster access times than if the organizational structure was itself encoded at a lower data rate within the parts of the information signal stream used in this example to encode only pointers.
  • FIG. 11 shows an example [0164] organizational structure 136 suitable for steganographic encoding similar to that shown in FIG. 17 of the co-pending Ginter et al. application. In the case of container 136 with controls for an analog property, the organizational structure may include one or more permissions records 136 d providing control sets 136 e providing electronic controls especially for an analog device(s). The permissions record 136 d may also provide a reference 136 f at least one location or other external source for additional controls. This reference may be to an Internet “Uniform Resource Locator” (URL), for example. The organizational structure 136 may optionally include a content block 136 g providing digital content subject to the controls. In this example, organizational structure 136 is encased in a protective “wrapper” 136 x provided by the steganographic technique used to encode the organizational structure 136, digital encryption techniques, and/or a combination of the steganography and encryption. This protective wrapper 136 x is used to ensure that the organizational structure 136 cannot be tampered with and maintains its integrity. Wrapper 136 x may also provide a degree of confidentiality if required.
  • Detailed Example Electronic Appliance Architecture [0165]
  • FIG. 12 shows an example detailed internal architecture for an example [0166] electronic appliance 100 such as optical disk player 102. In this specific example, rights management component 124 may be a tamper-resistant integrated circuit including internal microprocessor 200, flash memory 202 and cryptographic engine 204 (see Ginter et al. FIGS. 9-15B and associated text for a more detailed internal view of an example tamper-resistant rights management component 124 and a “protected processing environment” 138 it provides).
  • A [0167] main system bus 206 may couple rights management component 124 to a main system microprocessor 208 and various system components such as, for example, a CD-ROM decoder 210, a control and audio block 212, a video decoder 214, a digital output protection block 216, and a communications system 218. In this example, main microprocessor 208 controls the overall operations of appliance 100, with rights management component 124 performing security-related functions such as rights management and steganographic decoding.
  • In the FIG. 12 [0168] example appliance 102, an optical pickup 220 reads information from optical disk 104 and provides it to RF amplifier 222. RF amplifier 222 provides its output to digital signal processor (DSP) 224, which processes the output in a conventional manner and also controls the orientation of the optical disk 104 relative to optical pickup 220 via a driver 226. DSP 224 coordinates with a conventional CD-ROM decoder 210 to provide decoded digitized video and audio information. Decoder 210 operates in conjunction with a buffer memory 228, and may also cooperate with cryptographic engine 204 to ensure that any encrypted video information is decrypted appropriately.
  • The video output of CD-[0169] ROM decoder 210 may be decompressed by MPEG-2 video decoder 214 and applied via an NTSC and/or PAL encoder 230 to television 106. (In another example, the output could be in a non-interlaced format such as RGB rather than in interlaced formats such as NTSC and PAL.) Meanwhile, control and audio block 212 (which may operate in conjunction with its own buffer memory 232) may receive digitized audio information recorded on optical disk 204 via DSP 224 and CD-ROM decoder 210. Control and audio block 212 may provide this audio output to audio processing block 234 for output to loudspeakers 116. Control and audio block 212 may also provide an interface to the user via an infrared sensor 236 (for a remote control, for example), front-panel user controls 238 and/or an LED display 240.
  • In this example, [0170] security microprocessor 200 within rights management component 124 receives the digitized video and/or audio that DSP 224 reads from optical disk 104 via pickup 220 and RF amp 222. Security microprocessor 200 steganographically decodes this digitized analog information signal to recover the digital control information 126 encoded onto the information signal. Security microprocessor 200 also performs rights management functions based on the digital control information 126 it recovers. In addition, if desired security microprocessor may remove the steganographic encoding from a received digitized analog signal (since it shares a secret such as the steganographic encoding key Keyc with the steganographic encoding point, it can remove the steganographic encoding) and/or steganographically encode a signal with received, augmented and/or new rights management control information.
  • In this example, [0171] microprocessor 200 may selectively control cryptography engine 204 to decrypt encrypted content provided by optical disk 104—thus enforcing the rights management activities provided in accordance with electronic controls 126. Security component 124 may also control digital output protection block 216 in accordance with rights management control information 126—thus, selectively permitting digital appliance 100 to output content in digital form. Rights management component 124 may take other steps (e.g., watermarking and/or fingerprinting information before releasing it) to provide a degree of copy protection and/or quality degradation to prevent or discourage someone from creating an unlimited number of high quality copies of the content of optical disk 104. Rules contained in the control information can also govern how other parts of the system behave. For example, the control information could specify that no sound can be played unless the content is paid for. Another property may specify that certain copy protection schemes should be turned on in the NTSC encoder. Still another might disable the digital outputs of the device altogether, or unless an additional fee is paid.
  • Rights management component [0172] 124 (protected processing environment 138) may, in this particular example, communicate over a network 144 (such as, for example, the Internet or other data communications path) with other rights management related entities, such as, for example, clearinghouses and repositories. This “back channel” allows rights management component 124 to, for example, report usage and payment information and/or to retrieve additional rights management control information 126 to augment or supplement the control information it steganographically decodes.
  • Example Control Steps [0173]
  • FIG. 13 shows example control steps that may be performed by protected processing environment [0174] 138 (e.g., security microprocessor 200) to provide electronic digital rights protection. The FIG. 13 read/play routine 300 begins with protected processing environment 138 applying rules 126—in effect, setting the initial state in which rights management can occur (FIG. 13, block 302). Protected processing environment 138 then reads the output of CD-ROM decoder 310 (FIG. 13, block 304) and obtains steganographically encoded data from the output stream (FIG. 13, block 306). If protected processing environment 138 encounters the beginning of the control information organizational structure (“yes” exit to decision block 308), the protected processing environment performs an initialization step (FIG. 13, block 310) to begin receiving new control information 126 and then returns to block 302 to again apply current control information (FIG. 13, block 302). If, on the other hand, protected processing environment 138 encounters a continuation of an organizational structure (“yes” exit to decision block 312, FIG. 13), the protected processing environment stores the organizational structure information it has received (FIG. 13, block 314) and turns again to the apply rules step (FIG. 13, block 302).
  • If protected [0175] processing environment 138 encounters a pointer (“yes” exit to decision block 318), then the protected processing environment determines whether it already has received the corresponding organizational structure pointed to by the received pointer (FIG. 13, decision block 320). The protected processing environment 138 retrieves the organizational structure if it does not already have it (FIG. 13, block 322)—for example, by controlling DSP 224 to seek to the corresponding location on optical disk 104 indicated by the pointer, and by reading the organizational structure from the disk beginning at that disk location (FIG. 13, block 322).
  • If protected [0176] processing environment 138 has received no organizational structures or pointers (“no” exits to each of decision blocks 308, 312, 318), then the protected processing environment may determine whether there is any bandwidth available to carry control information. For example, some types of content stored on optical disk 104 may take up substantially all available channel bandwidths so that no bandwidth remains for steganographic encoding. If there is no available bandwidth for steganographic encoding (“no” exit to decision block 324), then the protected processing environment 138 may return to the “apply rules” block 302 and repeat steps 304-324 to wait until bandwidth is available for steganographic encoding. On the other hand, if there is bandwidth available and still no steganographically encoded information has appeared (“yes” exit to decision block 324, FIG. 13), protected processing environment 138 performs an error handling routine that processes the exception (FIG. 13, block 326) and determines whether the exception is critical (decision block 328). In some cases, protected processing environment 138 will continue to allow the appliance 100 to process the content, finding the error to be non-critical (“no” exit to decision block 328). An example of this would be a timer that permits playing for a period of time. In other cases (e.g., if the error conditions indicate that optical disk 104 has been tampered with), protected processing environment 138 may halt processing and return an error condition (“yes” exit to decision block 328, bubble 329).
  • FIG. 13A shows example steps that may be performed by the FIG. 13 “apply rules” [0177] routine 302. In this example, protected processing environment 138 may determine if it has received a complete organizational structure on which to base rights management for the rights being read from optical disk 104 (FIG. 13A, decision block 330). If the protected processing environment 138 has not received a complete organizational structure (“no” exit to decision block 330), it may disable content processing until it receives a complete organizational structure (FIG. 13A, block 332). If protected processing environment 138 has a complete organizational structure (“yes” exit to decision block 330), it determines whether it has the current organizational structure (decision block 334). If the current organizational structure is present (“yes” exit to decision block 334), the protected processing environment 138 then processes the current operation with respect to the control information embodied in the organizational structure (FIG. 13A, block 336). If the protected processing environment 138 does not have the current organizational structure (“no” exit to decision block 334), it determines whether it has an organizational structure that has the same identification as the current organizational structure (FIG. 13A, decision block 338). The protected processing environment 138 may use that matching organizational structure as a default (“yes” exit to decision block 338, block 340). Otherwise, protected processing environment 138 disables content operations until it receives a current organizational structure (“no” exit to decision block 338, block 342).
  • As mentioned above, protected [0178] processing environment 138 may also perform any or all of the FIG. 7A steganographic encoding steps, and may also or alternatively remove the steganographic encoding from a signal by using a shared secret to generate a steganographic encoding stream and then subtracting that stream from the signal. Such techniques may be useful, for example, to allow protected processing environment 138 to encode new control information or to change the encoded control information. For example, the steganographically encoded control information might provide a chain of handling and control that authorizes certain protected processing environments to change some elements and add new elements to the control information 126. Protected processing environment 138 could:
  • steganographically decode the signal using shared secrets to obtain the control information; [0179]
  • modify the control information to the extent authorized by the control information; [0180]
  • remove the steganographic encoding from the signal based on the shared secret; and [0181]
  • steganographically encode the signal with the modified control information. [0182]
  • Example Refresh Capability [0183]
  • FIG. 14 shows another example electronic appliance arrangement including a “refresh” capability involving both steganographic decoding and steganographic encoding. In this example, [0184] electronic appliance 100 includes a steganographic decoding block 424 as described above plus an additional steganographic encoding block 406. The appliance 100 may obtain the digital control information from the content signal, and then may “refresh” the extracted information (e.g., using coding techniques, such as, for example, Reed-Solomon decoding based on Reed-Solomon codes applied to the signal by the steganographic encoding process) to correct errors and otherwise accurately recover the digital control information. The error-corrected digital control information outputted by refresh decoder 900 may be applied to a steganographic encoding circuit 406 which steganographically encodes the content signal with the refreshed control information.
  • The FIG. 14 refresh operation could, for example, be performed on a selective basis based on the encoded digital control information itself. For example, the control information might authorize [0185] appliance 100 to redistribute the content signal only under certain conditions—one of which is to ensure that a refreshed steganographic encoding of the same (or modified) digital control information is provided within the redistributed content signal.
  • Examples [0186]
  • FIG. 15A shows an example analog [0187] signal distribution arrangement 500 provided in accordance with this invention. Within arrangement 500, a steganographic encode block 400 encodes an analog information signal A with rights management control information 126 and associated organizational structure(s) 136. The steganographically encoded information signal A′ is distributed by various mechanisms to user electronic appliances 100. For example, the encoded signal A′ may be broadcast wirelessly over the air by a broadcaster 60A, distributed over a cable television network by a cable television head end 502, and/or distributed via a satellite communications network 504. Encoded signal A′ may, during the process of being distributed, be converted from analog to digital form and back again. For example, the satellite uplink 504A may digitize signal A′ before transmitting it to the satellite 504 b, and the satellite downlink 504 c may convert the signal back to analog before providing it to user appliances 100. As explained above, the steganographically encoded control information 126 persists within the signal A′ despite conversions between analog and digital formats.
  • In this example, an example set top [0188] box user appliance 108 may receive the distributed steganographically encoded analog signal A′. Set top box 108 may include a rights management component 124 as described above, and may perform rights management operations and/or processes in response to and based on steganographically encoded control information 126.
  • Set [0189] top box 108 in this example may output the steganographically encoded analog signal (or a facsimile of it) to additional user electronic appliances such as, for example, a television set 106, a digital optical recording device (e.g., DVD-R) 102, and/or a video tape recorder 118. Each of these additional appliances 106, 102, 118 may include a rights management component 124 that performs electronic rights management based on the steganographically encoded control information 126. Any recordings made by recording devices 102, 118 may also be steganographically encoded.
  • FIG. 15B shows another example analog [0190] signal distribution arrangement 510. In this example, a radio broadcaster 60B broadcasts an analog radio signal A′ that is steganographically encoded with associated rights management control information 126 and associated organizational structure(s) 136. A wire network 512 such as a cable television system may similarly distribute the same or different steganographically encoded analog radio signal A′. Broadcaster 60B and/or network 512 may deliver the steganographically encoded radio signal A′ to a user receiving appliance 100C such as a FM radio receiver 114. In this example, radio receiver 114 has a rights management component 124 that processes and automatically manages rights based on steganographically encoded controls 126. In this example, radio receiver 114 may (if permitted by controls 126) output steganographically encoded analog signal A′ to additional appliances such as, for example, a digital recorder 102 and/or an analog recorder 514. In this example, each of appliances 100A, 100B has a rights management component 124 that electronically manages rights based on the steganographically encoded controls 126. Because the steganographically encoded controls 126 persist, recording devices 102, 514 record the steganographically encoded controls 126 in any recordings they make of signal A′. In one non-limiting example, when rights control information is encoded in steganographic sound recordings that are broadcast via radio or some other method, an airplay audit service can sample stations in a given market and identify particular properties being broadcast from “object identifier” information contained in the steganographically encoded VDE container.
  • FIG. 15C shows an example [0191] signal distribution arrangement 520 in which the steganographically encoded analog signal A′ is initially distributed in the same manner as shown in FIG. 15A, and is then converted by an electronic appliance 100G such as a personal computer, for example, into a digital signal D. In this example, appliance 100G includes a rights management component 124 that manages rights based on steganographically encoded controls 126. Appliance 100G may convert received analog signal A′ into digital form for distribution to and processing by digital appliances such as a digital high definition television 106B, a digital optical disk recorder 102, and/or a digital tape recorder 118 a. In one example, the steganographically encoded control information 126 persists within the digitized signal D. In another example, appliance 100G removes the steganographic encoding from received analog signal A′ and outputs a digital signal D that is “clean” and free of steganographic encoding—but is otherwise protected so that it remains persistently associated with the now-digital control information 126 (which appliance 100G may distribute, for example, within secure electronic containers 136 and digital, encrypted form. In one specific example, appliance 100G may package the received, digitized content from analog signal A′ within the same digital electronic container 136 that also contains associated control information that appliance 100G steganographically decodes from analog signal A′. In another specific example, appliance 100G may distribute controls 126 independently of the digital signal D—but under circumstances in which the rights management components 124 within each of digital appliances 106B, 102 and 118A all securely associate the control information with the now-digital content.
  • FIG. 15D shows a [0192] similar distribution arrangement 530 for analog radio or other audio signals. In this example, appliance 100G may include a digital radio receiver that receives analog radio signal A′ and converts it into a digital information signal for distribution to digital recorders 102, 514A. As discussed above, appliance 100G may distribute the digitized analog signal A′ with steganographic encoding to appliances 102, 514A—each of which includes a rights management component 124 that may recover the steganographically-encoded control information 126 and perform rights management functions based thereon. In another particular example, appliance 100G may remove the steganographic encoding from the content before distributing it in digital form—and user other techniques (such as those described in the above-referenced Ginter et al. patent specification) to provide a secure association between the now-digital content and the digital control information 126.
  • FIG. 15E shows yet another [0193] example distribution arrangement 540 in which digital appliances 102, 100G distribute information in digital form to a digital television 106B. For example, appliance 102 may provide digital video signals D to digital television 106B by playing them back form DVD 104. DVD player 102 may provide controls 126 within electronic digital containers 136 to digital television 106B. Digital television 106B may include a rights management component 124C that manages rights in the digital content based on digitally-provided control information 126. Similarly, computer 100G may receive digital content and associated control information 126 from a digital network 144, and provide digital video signals D and associated controls 126 to digital television 106B.
  • In this example, [0194] digital television 106B includes an analog output that may provide analog television signals to additional devices, such as, for example, an analog video cassette recorder 118. In this example, the rights management component 124C within digital television 106B may steganographically encode the analog television signal A with controls 126 and associated organizational structure(s) 136 before releasing the analog signal to the outside world.
  • FIG. 15F shows a [0195] further example arrangement 550 in which a digital appliance 100G such as a personal computer receives digital video signal D and converts it into various analog television signal formats (e.g., NTSC/PAL and/or RGB) for output to analog devices such as an analog VCR 118, an analog set top box 108 and/or an analog television set 106A. In this example, a rights management component 124G within digital appliance 100G steganographically encodes the received digital controls 126 onto the analog signal A′, A″ before releasing the analog signal to the additional appliances 118, 106A, 108.
  • While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. [0196]

Claims (29)

What is claimed is:
1. A rights management method comprising:
(a) receiving an information signal;
(b) steganographically decoding the received information signal to recover digital rights management control information; and
(c) performing at least one rights management operation based at least in part on the recovered digital rights management control information.
2. A method as in
claim 1
wherein receiving step (a) comprises receiving an analog signal steganographically encoded with the digital rights management control information, and decoding step (b) comprises steganographically decoding the analog signal.
3. A method as in
claim 1
wherein performing step (c) comprises the step of selectively enabling descrambling of the information signal.
4. A method as in
claim 1
wherein performing step (c) comprises the step of selectively enabling decrypting of the information signal.
5. A method as in
claim 1
wherein decoding step (b) comprises recovering digital rights management control information packaged within at least one digital container, and performing step (c) comprises performing the rights management operation based at least in part on the recovered digital rights management control information.
6. A method as in
claim 1
wherein the decoding step (b) includes the step of steganographically decoding information representing at least one permissions record.
7. A method as in
claim 1
further including the step of decrypting contents of the digital container for use in performing step (c).
8. A method as in
claim 1
wherein the information signal carries further information in addition to the steganographically encoded information, and the performing step (b) comprises the step of managing at least one right in respect of the further information.
9. A method as in
claim 1
wherein the decoding step (b) includes the step of analyzing the information signal using a spectral transform.
10. A method as in
claim 1
wherein the decoding step (b) includes the step of analyzing the information signal using a key-based steganographic decoder.
11. A method as in
claim 1
wherein the decoding step (b) includes the step of steganographically decoding a pointer that points to another portion of the information signal.
12. A method as in
claim 1
wherein the steganographically encoded container includes at least one organization structure, and the decoding step (b) comprises steganographically decoding the organizational structure.
13. A rights management method comprising:
(a) receiving an information signal;
(b) steganographically decoding the received information signal to recover at least one rights management permission; and
(c) performing at least one rights management operation based at least in part on the recovered rights management permission.
14. A virtual distribution environment comprising:
plural tamper-resistant protected processing environments coupled together via at least one communications path; and
means for delivering, to the plural tamper-resistant protected processing environments, an information signal having at least one digital rights management control set substantially invisibly and substantially indelibly encoded thereon.
15. An electronic appliance comprising:
decoding means for steganographically decoding a signal to provide control information; and
rights management means coupled to the decoding means for performing at least one rights management operation based at least in part on the control information.
16. An appliance as in
claim 15
wherein the rights management means includes means for means for selectively blocking the signal.
17. An appliance as in
claim 15
wherein the rights management means includes means for selectively descrambling the signal.
18. An appliance as in
claim 15
wherein the rights management means includes means for authenticating a further appliance before delivering the signal to said further appliance.
19. An appliance as in
claim 15
wherein the rights management means includes means for requiring that a further appliance present an appropriate digital certificate before delivering the signal to said further appliance.
20. An appliance as in
claim 15
wherein the right management means includes means for fingerprinting the signal based at least in part on the control information.
21. An appliance as in
claim 15
wherein the right management means includes means for further steganographically encoding the signal based at least in part on the control information.
22. An electronic appliance comprising:
a steganographic decoder that steganographically decode a signal to provide control information; and
rights management component coupled to the decoder, the rights management component performing at least one rights management operation based at least in part on the control information.
23. An appliance as in
claim 22
wherein the rights management component includes or controls a signal blocking circuit that selectively blocks the signal.
24. An appliance as in
claim 22
wherein the rights management component includes or controls a signal descrambler.
25. An appliance as in
claim 22
wherein the rights management component includes an authenticating circuit for authenticating a further appliance before delivering the signal to said further appliance.
26. An appliance as in
claim 22
wherein the rights management component includes a circuit for requiring that a further appliance present an appropriate digital certificate before delivering the signal to said further appliance.
27. An appliance as in
claim 22
wherein the rights management component includes a circuit for fingerprinting the signal based at least in part on the control information.
28. An appliance as in
claim 22
wherein the rights management component includes a circuit for further steganographically encoding the signal based at least in part on the control information.
29. A method of steganographically encoding a signal comprising:
providing at least one organization structure including control information;
selectively encrypting at least a part of the organizational structure;
frequency transforming an input signal;
encoding the input signal with the selectively encrypted organizational structure in such a way so as to make the encoded organizational structure substantially indelible and substantially invisible; and
delivering the encoded input signal.
US09/790,566 1996-08-12 2001-02-23 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels Expired - Lifetime US6449367B2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US09/790,566 US6449367B2 (en) 1996-08-12 2001-02-23 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US10/189,231 US6618484B2 (en) 1996-08-12 2002-07-05 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US10/618,427 US8307212B2 (en) 1996-08-12 2003-07-10 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US12/259,243 US20090113200A1 (en) 1996-08-12 2008-10-27 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US13/667,275 US20130298249A1 (en) 1996-08-12 2012-11-02 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US08/689,606 US5943422A (en) 1996-08-12 1996-08-12 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US09/247,328 US6240185B1 (en) 1996-08-12 1999-02-10 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US09/790,566 US6449367B2 (en) 1996-08-12 2001-02-23 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/247,328 Continuation US6240185B1 (en) 1996-08-12 1999-02-10 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/189,231 Continuation US6618484B2 (en) 1996-08-12 2002-07-05 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels

Publications (2)

Publication Number Publication Date
US20010026618A1 true US20010026618A1 (en) 2001-10-04
US6449367B2 US6449367B2 (en) 2002-09-10

Family

ID=24769169

Family Applications (7)

Application Number Title Priority Date Filing Date
US08/689,606 Expired - Lifetime US5943422A (en) 1995-02-13 1996-08-12 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US09/247,328 Expired - Lifetime US6240185B1 (en) 1996-08-12 1999-02-10 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US09/790,566 Expired - Lifetime US6449367B2 (en) 1996-08-12 2001-02-23 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US10/189,231 Expired - Lifetime US6618484B2 (en) 1996-08-12 2002-07-05 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US10/618,427 Expired - Fee Related US8307212B2 (en) 1996-08-12 2003-07-10 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US12/259,243 Abandoned US20090113200A1 (en) 1996-08-12 2008-10-27 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US13/667,275 Abandoned US20130298249A1 (en) 1996-08-12 2012-11-02 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US08/689,606 Expired - Lifetime US5943422A (en) 1995-02-13 1996-08-12 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US09/247,328 Expired - Lifetime US6240185B1 (en) 1996-08-12 1999-02-10 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels

Family Applications After (4)

Application Number Title Priority Date Filing Date
US10/189,231 Expired - Lifetime US6618484B2 (en) 1996-08-12 2002-07-05 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US10/618,427 Expired - Fee Related US8307212B2 (en) 1996-08-12 2003-07-10 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US12/259,243 Abandoned US20090113200A1 (en) 1996-08-12 2008-10-27 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US13/667,275 Abandoned US20130298249A1 (en) 1996-08-12 2012-11-02 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels

Country Status (2)

Country Link
US (7) US5943422A (en)
AU (1) AU739300B2 (en)

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010044899A1 (en) * 1998-09-25 2001-11-22 Levy Kenneth L. Transmarking of multimedia signals
US20020001395A1 (en) * 2000-01-13 2002-01-03 Davis Bruce L. Authenticating metadata and embedding metadata in watermarks of media signals
US20020032864A1 (en) * 1999-05-19 2002-03-14 Rhoads Geoffrey B. Content identifiers triggering corresponding responses
US20020162118A1 (en) * 2001-01-30 2002-10-31 Levy Kenneth L. Efficient interactive TV
US20030028882A1 (en) * 2001-07-05 2003-02-06 Davis Bruce L. Watermarking and electronic program guides
US20030033530A1 (en) * 1996-05-16 2003-02-13 Sharma Ravi K. Variable message coding protocols for encoding auxiliary data in media signals
US20030039464A1 (en) * 2001-07-05 2003-02-27 Davis Bruce L. Watermarking to control video recording
US20030105717A1 (en) * 2001-03-13 2003-06-05 Kim Hyung Sun Read-only recording medium containing sample data and reproducing method thereof
US20030138127A1 (en) * 1995-07-27 2003-07-24 Miller Marc D. Digital watermarking systems and methods
WO2003065723A2 (en) * 2002-02-01 2003-08-07 Koninklijke Philips Electronics N.V. Watermark-based access control method and device
US20030187799A1 (en) * 2002-02-27 2003-10-02 William Sellars Multiple party content distribution system and method with rights management features
US20040059933A1 (en) * 2002-07-16 2004-03-25 Levy Kenneth L. Digital watermarking and fingerprinting applications for copy protection
US20040128514A1 (en) * 1996-04-25 2004-07-01 Rhoads Geoffrey B. Method for increasing the functionality of a media player/recorder device or an application program
US20040139047A1 (en) * 2003-01-09 2004-07-15 Kaleidescape Bookmarks and watchpoints for selection and presentation of media streams
US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US6823075B2 (en) 2000-07-25 2004-11-23 Digimarc Corporation Authentication watermarks for printed objects and related applications
US6829368B2 (en) 2000-01-26 2004-12-07 Digimarc Corporation Establishing and interacting with on-line media collections using identifiers in media signals
US20050008163A1 (en) * 2003-06-02 2005-01-13 Liquid Machines, Inc. Computer method and apparatus for securely managing data objects in a distributed context
US20050010536A1 (en) * 2002-02-27 2005-01-13 Imagineer Software, Inc. Secure communication and real-time watermarking using mutating identifiers
US6868497B1 (en) 1999-03-10 2005-03-15 Digimarc Corporation Method and apparatus for automatic ID management
US20060072785A1 (en) * 2000-09-11 2006-04-06 Davidson Clayton L Watermark encoding and decoding
US7035427B2 (en) 1993-11-18 2006-04-25 Digimarc Corporation Method and system for managing, accessing and paying for the use of copyrighted electronic media
US7047241B1 (en) 1995-10-13 2006-05-16 Digimarc Corporation System and methods for managing digital creative works
US7055034B1 (en) 1998-09-25 2006-05-30 Digimarc Corporation Method and apparatus for robust embedded data
US20060173794A1 (en) * 2002-02-27 2006-08-03 Imagineer Software, Inc. Secure electronic commerce using mutating identifiers
US20060195402A1 (en) * 2002-02-27 2006-08-31 Imagineer Software, Inc. Secure data transmission using undiscoverable or black data
US20060294014A1 (en) * 2001-03-13 2006-12-28 Kim Hyung S Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
US7197156B1 (en) 1998-09-25 2007-03-27 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US7512986B2 (en) 2001-03-28 2009-03-31 Nds Limited Digital rights management system and method
US7532740B2 (en) 1998-09-25 2009-05-12 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US20090125607A1 (en) * 1996-11-12 2009-05-14 Rhoads Geoffrey B Methods and Arrangements Employing Digital Content Items
US7587601B2 (en) 1996-04-25 2009-09-08 Digimarc Corporation Digital watermarking methods and apparatus for use with audio and video content
US20100163629A1 (en) * 1995-05-08 2010-07-01 Rhoads Geoffrey B Security Document Carrying Machine Readable Pattern
US7805500B2 (en) 1995-05-08 2010-09-28 Digimarc Corporation Network linking methods and apparatus
US7974436B2 (en) 2000-12-21 2011-07-05 Digimarc Corporation Methods, apparatus and programs for generating and utilizing content signatures
US8055899B2 (en) 2000-12-18 2011-11-08 Digimarc Corporation Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities
US8094949B1 (en) 1994-10-21 2012-01-10 Digimarc Corporation Music methods and systems
US8095796B2 (en) 1999-05-19 2012-01-10 Digimarc Corporation Content identifiers
US8122465B2 (en) 2001-07-05 2012-02-21 Digimarc Corporation Watermarking to set video usage permissions
US8290202B2 (en) 1998-11-03 2012-10-16 Digimarc Corporation Methods utilizing steganography
US8391541B2 (en) 1993-11-18 2013-03-05 Digimarc Corporation Steganographic encoding and detecting for video signals
US8429205B2 (en) 1995-07-27 2013-04-23 Digimarc Corporation Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals
US9804747B2 (en) 2008-09-30 2017-10-31 Microsoft Technology Licensing, Llc Techniques to manage access to organizational information of an entity
US10257177B2 (en) 2014-09-01 2019-04-09 Samsung Electronics Co., Ltd Electronic device and method for managing re-enrollment
US10713340B2 (en) 1999-05-19 2020-07-14 Digimarc Corporation Connected audio and other media objects
US10943030B2 (en) 2008-12-15 2021-03-09 Ibailbonding.Com Securable independent electronic document

Families Citing this family (576)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10361802B1 (en) 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
US5721788A (en) * 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
US7676059B2 (en) * 1994-10-21 2010-03-09 Digimarc Corporation Video steganography or encoding
US6983051B1 (en) * 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
US6611607B1 (en) 1993-11-18 2003-08-26 Digimarc Corporation Integrating digital watermarks in multimedia content
US6449377B1 (en) * 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
US6574350B1 (en) * 1995-05-08 2003-06-03 Digimarc Corporation Digital watermarking employing both frail and robust watermarks
US7313251B2 (en) * 1993-11-18 2007-12-25 Digimarc Corporation Method and system for managing and controlling electronic media
US6869023B2 (en) * 2002-02-12 2005-03-22 Digimarc Corporation Linking documents through digital watermarking
US6973197B2 (en) * 1999-11-05 2005-12-06 Digimarc Corporation Watermarking with separate application of the grid and payload signals
US6882738B2 (en) * 1994-03-17 2005-04-19 Digimarc Corporation Methods and tangible objects employing textured machine readable data
US6522770B1 (en) 1999-05-19 2003-02-18 Digimarc Corporation Management of documents and other objects using optical devices
US20020136429A1 (en) * 1994-03-17 2002-09-26 John Stach Data hiding through arrangement of objects
US6560349B1 (en) * 1994-10-21 2003-05-06 Digimarc Corporation Audio monitoring using steganographic information
US7724919B2 (en) 1994-10-21 2010-05-25 Digimarc Corporation Methods and systems for steganographic processing
US20050149450A1 (en) * 1994-11-23 2005-07-07 Contentguard Holdings, Inc. System, method, and device for controlling distribution and use of digital works based on a usage rights grammar
US6963859B2 (en) * 1994-11-23 2005-11-08 Contentguard Holdings, Inc. Content rendering repository
JPH08263438A (en) * 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US7362775B1 (en) 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US7743248B2 (en) * 1995-01-17 2010-06-22 Eoriginal, Inc. System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components
US7162635B2 (en) * 1995-01-17 2007-01-09 Eoriginal, Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
SE504085C2 (en) * 1995-02-01 1996-11-04 Greg Benson Methods and systems for managing data objects in accordance with predetermined conditions for users
US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7133846B1 (en) * 1995-02-13 2006-11-07 Intertrust Technologies Corp. Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
CN100365535C (en) * 1995-02-13 2008-01-30 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6738495B2 (en) * 1995-05-08 2004-05-18 Digimarc Corporation Watermarking enhanced to withstand anticipated corruptions
US7224819B2 (en) * 1995-05-08 2007-05-29 Digimarc Corporation Integrating digital watermarks in multimedia content
US7054462B2 (en) 1995-05-08 2006-05-30 Digimarc Corporation Inferring object status based on detected watermark data
US7620200B2 (en) * 1995-05-08 2009-11-17 Digimarc Corporation Authentication of identification documents
US6728390B2 (en) 1995-05-08 2004-04-27 Digimarc Corporation Methods and systems using multiple watermarks
US6760463B2 (en) * 1995-05-08 2004-07-06 Digimarc Corporation Watermarking methods and media
US6549942B1 (en) * 1995-05-25 2003-04-15 Audiohighway.Com Enhanced delivery of audio data for portable playback
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US6505160B1 (en) 1995-07-27 2003-01-07 Digimarc Corporation Connected audio and other media objects
US7770013B2 (en) * 1995-07-27 2010-08-03 Digimarc Corporation Digital authentication with digital and analog documents
US7095871B2 (en) * 1995-07-27 2006-08-22 Digimarc Corporation Digital asset management and linking media signals with related data using watermarks
US6411725B1 (en) * 1995-07-27 2002-06-25 Digimarc Corporation Watermark enabled video objects
US6965682B1 (en) 1999-05-19 2005-11-15 Digimarc Corp Data transmission by watermark proxy
US6577746B1 (en) 1999-12-28 2003-06-10 Digimarc Corporation Watermark-based object linking and embedding
AU1690597A (en) * 1996-01-11 1997-08-01 Mitre Corporation, The System for controlling access and distribution of digital property
US6205249B1 (en) 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US7664263B2 (en) 1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation
AU3205797A (en) 1996-05-15 1997-12-05 Intertrust Technologies Corp. Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US7024016B2 (en) * 1996-05-16 2006-04-04 Digimarc Corporation Digital watermarking apparatus and methods
US5889868A (en) 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7346472B1 (en) 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US7457962B2 (en) 1996-07-02 2008-11-25 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7123718B1 (en) 1999-03-24 2006-10-17 Blue Spike, Inc. Utilizing data reduction in stegnographic and cryptographic systems
US7159116B2 (en) * 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US7095874B2 (en) 1996-07-02 2006-08-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7366908B2 (en) 1996-08-30 2008-04-29 Digimarc Corporation Digital watermarking with content dependent keys and autocorrelation properties for synchronization
US7917643B2 (en) 1996-09-12 2011-03-29 Audible, Inc. Digital information library and delivery system
US5926624A (en) * 1996-09-12 1999-07-20 Audible, Inc. Digital information library and delivery system with logic for generating files targeted to the playback device
US7730317B2 (en) 1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks
FI105418B (en) * 1997-01-24 2000-08-15 Nokia Multimedia Network Termi Hiding the verification code on an electrical signal
AUPO521897A0 (en) * 1997-02-20 1997-04-11 Telstra R & D Management Pty Ltd Invisible digital watermarks
US5920861A (en) 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US7062500B1 (en) * 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
US6233684B1 (en) * 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US6735253B1 (en) 1997-05-16 2004-05-11 The Trustees Of Columbia University In The City Of New York Methods and architecture for indexing and editing compressed video over the world wide web
WO1999001815A1 (en) 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
US6353929B1 (en) * 1997-06-23 2002-03-05 One River Worldtrek, Inc. Cooperative system for measuring electronic media
US6266419B1 (en) * 1997-07-03 2001-07-24 At&T Corp. Custom character-coding compression for encoding and watermarking media content
US7546346B2 (en) * 1997-07-28 2009-06-09 Juniper Networks, Inc. Workflow systems and methods for project management and information management
US5978836A (en) 1997-07-28 1999-11-02 Solectron Corporation Workflow systems and methods
US7092914B1 (en) * 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US8300832B2 (en) * 1998-01-08 2012-10-30 Samsung Electronics Co., Ltd. System and method for copy protection for digital signals
US7778418B1 (en) 1998-01-08 2010-08-17 Samsung Electronics Co., Ltd. System and method for copy protection for digital signals
US7054463B2 (en) * 1998-01-20 2006-05-30 Digimarc Corporation Data encoding using frail watermarks
US20020002039A1 (en) 1998-06-12 2002-01-03 Safi Qureshey Network-enabled audio device
US7268700B1 (en) 1998-01-27 2007-09-11 Hoffberg Steven M Mobile communication device
US6513118B1 (en) * 1998-01-27 2003-01-28 Canon Kabushiki Kaisha Electronic watermarking method, electronic information distribution system, image filing apparatus and storage medium therefor
US6385596B1 (en) 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
FR2775812A1 (en) * 1998-03-05 1999-09-03 Inst Eurecom METHOD FOR DISSIMULATING BINARY INFORMATION IN A DIGITAL IMAGE
US7809138B2 (en) * 1999-03-16 2010-10-05 Intertrust Technologies Corporation Methods and apparatus for persistent control and protection of content
US20040098584A1 (en) * 1998-03-25 2004-05-20 Sherman Edward G. Method and system for embedded, automated, component-level control of computer systems and other complex systems
US7689532B1 (en) 2000-07-20 2010-03-30 Digimarc Corporation Using embedded data with file sharing
US7756892B2 (en) * 2000-05-02 2010-07-13 Digimarc Corporation Using embedded data with file sharing
US6608911B2 (en) * 2000-12-21 2003-08-19 Digimarc Corporation Digitally watermaking holograms for use with smart cards
US7602940B2 (en) 1998-04-16 2009-10-13 Digimarc Corporation Steganographic data hiding using a device clock
US6243480B1 (en) * 1998-04-30 2001-06-05 Jian Zhao Digital authentication with analog documents
US6253237B1 (en) 1998-05-20 2001-06-26 Audible, Inc. Personalized time-shifted programming
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US20040117644A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content
US20040107368A1 (en) * 1998-06-04 2004-06-03 Z4 Technologies, Inc. Method for digital rights management including self activating/self authentication software
US20040117664A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Apparatus for establishing a connectivity platform for digital rights management
US6044471A (en) 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US20040117631A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for digital rights management including user/publisher connectivity interface
US20040225894A1 (en) * 1998-06-04 2004-11-11 Z4 Technologies, Inc. Hardware based method for digital rights management including self activating/self authentication software
US20040117628A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content
US20040117663A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for authentication of digital content used or accessed with secondary devices to reduce unauthorized use or distribution
US6986063B2 (en) * 1998-06-04 2006-01-10 Z4 Technologies, Inc. Method for monitoring software using encryption including digital signatures/certificates
US6523113B1 (en) * 1998-06-09 2003-02-18 Apple Computer, Inc. Method and apparatus for copy protection
US6298446B1 (en) * 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US20010029582A1 (en) * 1999-05-17 2001-10-11 Goodman Daniel Isaac Method and system for copy protection of data content
US6256393B1 (en) * 1998-06-23 2001-07-03 General Instrument Corporation Authorization and access control of software object residing in set-top terminals
US6535919B1 (en) * 1998-06-29 2003-03-18 Canon Kabushiki Kaisha Verification of image data
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US7110984B1 (en) * 1998-08-13 2006-09-19 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content
AU6131899A (en) * 1998-08-31 2000-03-21 Digital Video Express, L.P. Watermarking system and methodology for digital multimedia content
US6311270B1 (en) * 1998-09-14 2001-10-30 International Business Machines Corporation Method and apparatus for securing communication utilizing a security processor
US8332478B2 (en) 1998-10-01 2012-12-11 Digimarc Corporation Context sensitive connected content
US7174457B1 (en) 1999-03-10 2007-02-06 Microsoft Corporation System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party
US6609199B1 (en) 1998-10-26 2003-08-19 Microsoft Corporation Method and apparatus for authenticating an open system application to a portable IC device
US7139915B2 (en) * 1998-10-26 2006-11-21 Microsoft Corporation Method and apparatus for authenticating an open system application to a portable IC device
US7194092B1 (en) * 1998-10-26 2007-03-20 Microsoft Corporation Key-based secure storage
US6820063B1 (en) 1998-10-26 2004-11-16 Microsoft Corporation Controlling access to content based on certificates and access predicates
US6330670B1 (en) 1998-10-26 2001-12-11 Microsoft Corporation Digital rights management operating system
US6327652B1 (en) 1998-10-26 2001-12-04 Microsoft Corporation Loading and identifying a digital rights management operating system
US7143434B1 (en) 1998-11-06 2006-11-28 Seungyup Paek Video description system and method
US6731774B1 (en) * 1998-11-30 2004-05-04 Sony Corporation Associated information adding apparatus and method, and associated information detecting apparatus and method
EP1011269B1 (en) * 1998-12-08 2007-02-14 Irdeto Access B.V. System for processing an information signal
US7624046B2 (en) * 1998-12-24 2009-11-24 Universal Music Group, Inc. Electronic music/media distribution system
US8175977B2 (en) 1998-12-28 2012-05-08 Audible License management for digital content
JP4312287B2 (en) * 1998-12-28 2009-08-12 株式会社日立製作所 Digital content distribution system
US6628802B1 (en) * 1999-01-29 2003-09-30 International Business Machines Corporation Marking and determining distortion in an image
US6963884B1 (en) 1999-03-10 2005-11-08 Digimarc Corporation Recoverable digital content degradation: method and apparatus
EP1157499A4 (en) * 1999-03-10 2003-07-09 Digimarc Corp Signal processing methods, devices, and applications for digital rights management
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
WO2000057643A1 (en) * 1999-03-24 2000-09-28 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US7051005B1 (en) * 1999-03-27 2006-05-23 Microsoft Corporation Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system
US7103574B1 (en) * 1999-03-27 2006-09-05 Microsoft Corporation Enforcement architecture and method for digital rights management
US7136838B1 (en) * 1999-03-27 2006-11-14 Microsoft Corporation Digital license and method for obtaining/providing a digital license
US6973444B1 (en) * 1999-03-27 2005-12-06 Microsoft Corporation Method for interdependently validating a digital content package and a corresponding digital license
US6651171B1 (en) * 1999-04-06 2003-11-18 Microsoft Corporation Secure execution of program code
AU4230300A (en) 1999-04-12 2000-11-14 Reciprocal, Inc. System and method for data rights management
US6918059B1 (en) 1999-04-28 2005-07-12 Universal Music Group Method and system for handling errors in a distributed computer system
US6697948B1 (en) 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
US7406214B2 (en) * 1999-05-19 2008-07-29 Digimarc Corporation Methods and devices employing optical sensors and/or steganography
US20070100757A1 (en) * 1999-05-19 2007-05-03 Rhoads Geoffrey B Content Protection Arrangements
US8752118B1 (en) * 1999-05-19 2014-06-10 Digimarc Corporation Audio and video content-based methods
US7302574B2 (en) 1999-05-19 2007-11-27 Digimarc Corporation Content identifiers triggering corresponding responses through collaborative processing
US20020032734A1 (en) 2000-07-26 2002-03-14 Rhoads Geoffrey B. Collateral data combined with user characteristics to select web site
JP4045393B2 (en) * 1999-06-01 2008-02-13 ソニー株式会社 Information signal duplication management method and information signal recording apparatus
US6959384B1 (en) 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data
US6785815B1 (en) 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques
WO2001006374A2 (en) * 1999-07-16 2001-01-25 Intertrust Technologies Corp. System and method for securing an untrusted storage
US7152165B1 (en) 1999-07-16 2006-12-19 Intertrust Technologies Corp. Trusted storage systems and methods
US7243236B1 (en) * 1999-07-29 2007-07-10 Intertrust Technologies Corp. Systems and methods for using cryptography to protect secure and insecure computing environments
US7770016B2 (en) * 1999-07-29 2010-08-03 Intertrust Technologies Corporation Systems and methods for watermarking software and other media
US7430670B1 (en) * 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
AU6750700A (en) * 1999-07-30 2001-02-19 Intertrust Technologies Corp. Methods and systems for transaction record delivery using thresholds and multi-stage protocol
JP4129610B2 (en) * 1999-07-30 2008-08-06 ソニー株式会社 Copyright protection information protection method, information signal reproduction method, information signal processing device, information signal reproduction device, and information signal recording device
WO2001018628A2 (en) 1999-08-04 2001-03-15 Blue Spike, Inc. A secure personal content server
US7124170B1 (en) 1999-08-20 2006-10-17 Intertrust Technologies Corp. Secure processing unit systems and methods
US7502759B2 (en) * 1999-08-30 2009-03-10 Digimarc Corporation Digital watermarking methods and related toy and game applications
US7406603B1 (en) 1999-08-31 2008-07-29 Intertrust Technologies Corp. Data protection systems and methods
US7889052B2 (en) * 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US7191153B1 (en) * 1999-09-10 2007-03-13 Dphi Acquisitions, Inc. Content distribution method and apparatus
AU7702300A (en) * 1999-09-13 2001-04-17 Videosdotcom, Inc. System for extending a rental period of downloaded video
US6985885B1 (en) * 1999-09-21 2006-01-10 Intertrust Technologies Corp. Systems and methods for pricing and selling digital goods
US6876991B1 (en) 1999-11-08 2005-04-05 Collaborative Decision Platforms, Llc. System, method and computer program product for a collaborative decision platform
US6449719B1 (en) * 1999-11-09 2002-09-10 Widevine Technologies, Inc. Process and streaming server for encrypting a data stream
US8055894B2 (en) * 1999-11-09 2011-11-08 Google Inc. Process and streaming server for encrypting a data stream with bandwidth based variation
WO2001041023A1 (en) * 1999-12-03 2001-06-07 Matsushita Electric Industrial Company, Limited A content distribution system and a reference server
JP4881500B2 (en) * 1999-12-09 2012-02-22 ソニー株式会社 Information processing apparatus and information processing method, content providing apparatus and content providing method, reproducing apparatus and reproducing method, and recording medium
US6757824B1 (en) 1999-12-10 2004-06-29 Microsoft Corporation Client-side boot domains and boot rules
US6996720B1 (en) * 1999-12-17 2006-02-07 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
US6970849B1 (en) 1999-12-17 2005-11-29 Microsoft Corporation Inter-server communication using request with encrypted parameter
US7047411B1 (en) 1999-12-17 2006-05-16 Microsoft Corporation Server for an electronic distribution system and method of operating same
US6792113B1 (en) 1999-12-20 2004-09-14 Microsoft Corporation Adaptable security mechanism for preventing unauthorized access of digital data
US7346582B2 (en) * 1999-12-21 2008-03-18 Sony Corporation Electronic money, electronic use right, charging system, information processing apparatus, and reproducing method and reproduction control method of contents data
US6832316B1 (en) * 1999-12-22 2004-12-14 Intertrust Technologies, Corp. Systems and methods for protecting data secrecy and integrity
JP3468183B2 (en) * 1999-12-22 2003-11-17 日本電気株式会社 Audio reproduction recording apparatus and method
EP1247210A4 (en) * 1999-12-24 2009-04-29 Telstra Corp Ltd A virtual token
DE60044179D1 (en) 1999-12-28 2010-05-27 Sony Corp System and method for the commercial traffic of images
US20020114465A1 (en) * 2000-01-05 2002-08-22 Shen-Orr D. Chaim Digital content delivery system and method
US20020059637A1 (en) * 2000-01-14 2002-05-16 Rakib Selim Shlomo Home gateway for video and data distribution from various types of headend facilities and including digital video recording functions
US6912528B2 (en) * 2000-01-18 2005-06-28 Gregg S. Homer Rechargeable media distribution and play system
US6754784B1 (en) 2000-02-01 2004-06-22 Cirrus Logic, Inc. Methods and circuits for securing encached information
JP2001219440A (en) * 2000-02-09 2001-08-14 Sony Disc Technology Inc Multi-cavity molding apparatus and its molding method
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US6834308B1 (en) * 2000-02-17 2004-12-21 Audible Magic Corporation Method and apparatus for identifying media content presented on a media playing device
US7298864B2 (en) * 2000-02-19 2007-11-20 Digimarc Corporation Digital watermarks as a gateway and control mechanism
US7133924B1 (en) 2000-03-08 2006-11-07 Music Choice Personalized audio system and method
US7856485B2 (en) 2000-03-08 2010-12-21 Music Choice Systems and methods for providing customized media channels
US7275256B1 (en) 2001-08-28 2007-09-25 Music Choice System and method for providing an interactive, visual complement to an audio program
US7028082B1 (en) 2001-03-08 2006-04-11 Music Choice Personalized audio system and method
US8463780B1 (en) 2000-03-08 2013-06-11 Music Choice System and method for providing a personalized media service
US7325043B1 (en) 2000-03-08 2008-01-29 Music Choice System and method for providing a personalized media service
US7783722B1 (en) 2000-03-08 2010-08-24 Music Choice Personalized audio system and method
US7320025B1 (en) 2002-03-18 2008-01-15 Music Choice Systems and methods for providing a broadcast entertainment service and an on-demand entertainment service
US7127744B2 (en) * 2000-03-10 2006-10-24 Digimarc Corporation Method and apparatus to protect media existing in an insecure format
JP2001256318A (en) * 2000-03-14 2001-09-21 Sony Corp System and method for contents transaction and program providing medium
US7266681B1 (en) * 2000-04-07 2007-09-04 Intertrust Technologies Corp. Network communications security agent
US7085839B1 (en) 2000-04-07 2006-08-01 Intertrust Technologies Corporation Network content management
US6879963B1 (en) 2000-04-12 2005-04-12 Music Choice Cross channel delivery system and method
US7606735B1 (en) 2000-04-17 2009-10-20 Welch James D Method of providing audio format professional information update service for payment, via internet
US8170920B1 (en) 2000-04-17 2012-05-01 Welch James D Method of providing audio format professional information update service, via an electronic network
US7305104B2 (en) * 2000-04-21 2007-12-04 Digimarc Corporation Authentication of identification documents using digital watermarks
US7111168B2 (en) * 2000-05-01 2006-09-19 Digimarc Corporation Digital watermarking systems
US20050132233A1 (en) * 2000-05-10 2005-06-16 Cisco Technology, Inc. Digital rights framework
US6885999B1 (en) 2000-05-10 2005-04-26 Cisco Technology, Inc. Digital identifiers and digital identifier control systems for intellectual properties
US6721793B1 (en) 2000-05-10 2004-04-13 Cisco Technology, Inc. Intellectual property over non-internet protocol systems and networks
US7031943B1 (en) 2000-05-10 2006-04-18 Cisco Technology, Inc. Digital license agreement
US6959289B1 (en) 2000-05-10 2005-10-25 Cisco Technology, Inc. Digital rights framework
US7426495B1 (en) 2000-05-10 2008-09-16 Cisco Technology, Inc. Virtual packing list
US6728773B1 (en) 2000-05-10 2004-04-27 Cisco Technology Inc. System for controlling and regulating distribution of intellectual properties using internet protocol framework
US7313692B2 (en) 2000-05-19 2007-12-25 Intertrust Technologies Corp. Trust management systems and methods
CN101615231A (en) * 2000-06-02 2009-12-30 松下电器产业株式会社 Recording medium, license management apparatus and record and playback reproducer
US7107448B1 (en) * 2000-06-04 2006-09-12 Intertrust Technologies Corporation Systems and methods for governing content rendering, protection, and management applications
EP1287474B1 (en) * 2000-06-05 2016-02-03 Sealedmedia Limited Digital rights management
US7213266B1 (en) 2000-06-09 2007-05-01 Intertrust Technologies Corp. Systems and methods for managing and protecting electronic content and applications
JP4776804B2 (en) * 2000-06-12 2011-09-21 キヤノン株式会社 Network device, control method therefor, and computer program
US20040073617A1 (en) 2000-06-19 2004-04-15 Milliken Walter Clark Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US7050586B1 (en) 2000-06-19 2006-05-23 Intertrust Technologies Corporation Systems and methods for retrofitting electronic appliances to accept different content formats
US7017189B1 (en) * 2000-06-27 2006-03-21 Microsoft Corporation System and method for activating a rendering device in a multi-level rights-management architecture
US6981262B1 (en) 2000-06-27 2005-12-27 Microsoft Corporation System and method for client interaction in a multi-level rights-management architecture
US7171692B1 (en) 2000-06-27 2007-01-30 Microsoft Corporation Asynchronous communication within a server arrangement
US7051200B1 (en) 2000-06-27 2006-05-23 Microsoft Corporation System and method for interfacing a software process to secure repositories
US7158953B1 (en) * 2000-06-27 2007-01-02 Microsoft Corporation Method and system for limiting the use of user-specific software features
US6891953B1 (en) * 2000-06-27 2005-05-10 Microsoft Corporation Method and system for binding enhanced software features to a persona
US20020046045A1 (en) * 2000-06-30 2002-04-18 Attila Narin Architecture for an electronic shopping service integratable with a software application
US7225159B2 (en) * 2000-06-30 2007-05-29 Microsoft Corporation Method for authenticating and securing integrated bookstore entries
GB0016695D0 (en) * 2000-07-08 2000-08-23 Radioscape Ltd Digital transactions for the delivery of media files
JP2002032290A (en) * 2000-07-13 2002-01-31 Canon Inc Checking method and checking system
WO2002017214A2 (en) * 2000-08-24 2002-02-28 Digimarc Corporation Watermarking recursive hashes into frequency domain regions and wavelet based feature modulation watermarks
US6931545B1 (en) * 2000-08-28 2005-08-16 Contentguard Holdings, Inc. Systems and methods for integrity certification and verification of content consumption environments
US20030196120A1 (en) * 2000-08-28 2003-10-16 Contentguard Holdings, Inc. Method and apparatus for automatic deployment of a rendering engine
US7743259B2 (en) 2000-08-28 2010-06-22 Contentguard Holdings, Inc. System and method for digital rights management using a standard rendering engine
US7149721B1 (en) * 2000-09-05 2006-12-12 Adobe Systems Incorporated Electronic content rights with and-or expression
US7165175B1 (en) 2000-09-06 2007-01-16 Widevine Technologies, Inc. Apparatus, system and method for selectively encrypting different portions of data sent over a network
US7840691B1 (en) 2000-09-07 2010-11-23 Zamora Radio, Llc Personal broadcast server system for providing a customized broadcast
AU2001291316A1 (en) * 2000-09-14 2002-03-26 Probix, Inc. System for protecting objects distributed over a network
EP1320957A1 (en) * 2000-09-14 2003-06-25 Probix, Inc. System for establishing an audit trail to protect objects distributed over a network
US7127615B2 (en) 2000-09-20 2006-10-24 Blue Spike, Inc. Security based on subliminal and supraliminal channels for data objects
US6724913B1 (en) * 2000-09-21 2004-04-20 Wen-Hsing Hsu Digital watermarking
US7237123B2 (en) 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
AU2001294168A1 (en) * 2000-10-03 2002-04-15 Vidius Inc. Secure distribution of digital content
US7181625B2 (en) * 2000-10-17 2007-02-20 Vidius Inc. Secure distribution of digital content
JP2002108827A (en) * 2000-10-03 2002-04-12 Ntt Docomo Inc Method for providing contents, equipment on providing side and equipment on using side
US20020042754A1 (en) * 2000-10-10 2002-04-11 Del Beccaro David J. System and method for receiving broadcast audio/video works and for enabling a consumer to purchase the received audio/video works
US8472627B2 (en) * 2000-10-30 2013-06-25 Geocodex Llc System and method for delivering encrypted information in a communication network using location indentity and key tables
US6985588B1 (en) 2000-10-30 2006-01-10 Geocodex Llc System and method for using location identity to control access to digital information
US20020051541A1 (en) * 2000-10-30 2002-05-02 Glick Barry J. System and method for maintaining state between a client and server
US7143289B2 (en) * 2000-10-30 2006-11-28 Geocodex Llc System and method for delivering encrypted information in a communication network using location identity and key tables
US7120254B2 (en) * 2000-10-30 2006-10-10 Geocodex Llc Cryptographic system and method for geolocking and securing digital information
US7542936B1 (en) * 2000-11-02 2009-06-02 Utbk, Inc. Method, apparatus and system for marketing, delivering, and collecting payment for information
US7054840B1 (en) * 2000-11-02 2006-05-30 Pitney Bowes Inc. Virtual bookshelf for online storage use and sale of material
US6889209B1 (en) * 2000-11-03 2005-05-03 Shieldip, Inc. Method and apparatus for protecting information and privacy
US7343324B2 (en) * 2000-11-03 2008-03-11 Contentguard Holdings Inc. Method, system, and computer readable medium for automatically publishing content
US7562012B1 (en) 2000-11-03 2009-07-14 Audible Magic Corporation Method and apparatus for creating a unique audio signature
US7043473B1 (en) 2000-11-22 2006-05-09 Widevine Technologies, Inc. Media tracking system and method
US6938164B1 (en) 2000-11-22 2005-08-30 Microsoft Corporation Method and system for allowing code to be securely initialized in a computer
US6961567B1 (en) * 2000-12-07 2005-11-01 Palm, Inc. Generic activation and registration framework for wireless devices
US7150045B2 (en) * 2000-12-14 2006-12-12 Widevine Technologies, Inc. Method and apparatus for protection of electronic media
US7266704B2 (en) * 2000-12-18 2007-09-04 Digimarc Corporation User-friendly rights management systems and methods
US6965683B2 (en) 2000-12-21 2005-11-15 Digimarc Corporation Routing networks for use with watermark systems
US8103877B2 (en) 2000-12-21 2012-01-24 Digimarc Corporation Content identification and electronic tickets, coupons and credits
US6912294B2 (en) * 2000-12-29 2005-06-28 Contentguard Holdings, Inc. Multi-stage watermarking process and system
US7555571B1 (en) * 2001-01-05 2009-06-30 Palm, Inc. Activation of mobile computing device on a cellular network
WO2002061669A1 (en) * 2001-01-10 2002-08-08 The Trustees Of Columbia University In The City Of New York Method and apparatus for watermarking images
US7289623B2 (en) 2001-01-16 2007-10-30 Utbk, Inc. System and method for an online speaker patch-through
US7774279B2 (en) 2001-05-31 2010-08-10 Contentguard Holdings, Inc. Rights offering and granting
US20030220880A1 (en) * 2002-01-17 2003-11-27 Contentguard Holdings, Inc. Networked services licensing system and method
US8069116B2 (en) * 2001-01-17 2011-11-29 Contentguard Holdings, Inc. System and method for supplying and managing usage rights associated with an item repository
US6754642B2 (en) 2001-05-31 2004-06-22 Contentguard Holdings, Inc. Method and apparatus for dynamically assigning usage rights to digital works
US7206765B2 (en) * 2001-01-17 2007-04-17 Contentguard Holdings, Inc. System and method for supplying and managing usage rights based on rules
US7072487B2 (en) * 2001-01-26 2006-07-04 Digimarc Corporation Watermark detection using adaptive color projections
EP1231788A1 (en) * 2001-02-12 2002-08-14 Koninklijke Philips Electronics N.V. Arrangement for distributing content, profiling center, receiving device and method
JP2002244927A (en) * 2001-02-16 2002-08-30 Matsushita Electric Ind Co Ltd Data distribution system
CN101030425A (en) * 2001-02-19 2007-09-05 皇家菲利浦电子有限公司 Method of embedding a secondary signal in the bitstream of a primary signal
AUPR321701A0 (en) * 2001-02-20 2001-03-15 Millard, Stephen R. Method of licensing content on updatable digital media
US9363409B2 (en) * 2001-03-05 2016-06-07 Digimarc Corporation Image management system and methods using digital watermarks
US7249257B2 (en) 2001-03-05 2007-07-24 Digimarc Corporation Digitally watermarked maps and signs and related navigational tools
US7098931B2 (en) * 2001-03-05 2006-08-29 Digimarc Corporation Image management system and methods using digital watermarks
US7042470B2 (en) * 2001-03-05 2006-05-09 Digimarc Corporation Using embedded steganographic identifiers in segmented areas of geographic images and characteristics corresponding to imagery data derived from aerial platforms
US7254249B2 (en) * 2001-03-05 2007-08-07 Digimarc Corporation Embedding location data in video
US7061510B2 (en) * 2001-03-05 2006-06-13 Digimarc Corporation Geo-referencing of aerial imagery using embedded image identifiers and cross-referenced data sets
US7197160B2 (en) 2001-03-05 2007-03-27 Digimarc Corporation Geographic information systems using digital watermarks
WO2004012077A1 (en) * 2001-03-12 2004-02-05 Mercury Computer Systems, Inc. Digital data processing apparatus, framework, and methods for dynamically configurable application execution on accelerated resources
US20020133402A1 (en) 2001-03-13 2002-09-19 Scott Faber Apparatus and method for recruiting, communicating with, and paying participants of interactive advertising
US7181017B1 (en) 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US7111169B2 (en) * 2001-03-29 2006-09-19 Intel Corporation Method and apparatus for content protection across a source-to-destination interface
US7363278B2 (en) 2001-04-05 2008-04-22 Audible Magic Corporation Copyright detection and protection system and method
US7580988B2 (en) * 2001-04-05 2009-08-25 Intertrust Technologies Corporation System and methods for managing the distribution of electronic content
US20030187798A1 (en) * 2001-04-16 2003-10-02 Mckinley Tyler J. Digital watermarking methods, programs and apparatus
US7188342B2 (en) * 2001-04-20 2007-03-06 Microsoft Corporation Server controlled branding of client software deployed over computer networks
US7136840B2 (en) 2001-04-20 2006-11-14 Intertrust Technologies Corp. Systems and methods for conducting transactions and communications using a trusted third party
US7046819B2 (en) 2001-04-25 2006-05-16 Digimarc Corporation Encoded reference signal for digital watermarks
US8392827B2 (en) * 2001-04-30 2013-03-05 International Business Machines Corporation Method for generation and assembly of web page content
US8812398B2 (en) * 2001-05-08 2014-08-19 Qualcomm Incorporated Key for a wireless-enabled device
CA2446584A1 (en) 2001-05-09 2002-11-14 Ecd Systems, Inc. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20020169721A1 (en) * 2001-05-10 2002-11-14 Cooley William Ray Digital watermarking apparatus, systems and methods
US20020169963A1 (en) * 2001-05-10 2002-11-14 Seder Phillip Andrew Digital watermarking apparatus, systems and methods
US20030043852A1 (en) * 2001-05-18 2003-03-06 Bijan Tadayon Method and apparatus for verifying data integrity based on data compression parameters
US20020177454A1 (en) * 2001-05-23 2002-11-28 Nokia Mobile Phones Ltd System for personal messaging
US7725401B2 (en) 2001-05-31 2010-05-25 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
US20030009424A1 (en) * 2001-05-31 2003-01-09 Contentguard Holdings, Inc. Method for managing access and use of resources by verifying conditions and conditions for use therewith
US8099364B2 (en) 2001-05-31 2012-01-17 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US6876984B2 (en) 2001-05-31 2005-04-05 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
US7222104B2 (en) * 2001-05-31 2007-05-22 Contentguard Holdings, Inc. Method and apparatus for transferring usage rights and digital work having transferrable usage rights
US8001053B2 (en) 2001-05-31 2011-08-16 Contentguard Holdings, Inc. System and method for rights offering and granting using shared state variables
US8275716B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Method and system for subscription digital rights management
US8275709B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US6895503B2 (en) 2001-05-31 2005-05-17 Contentguard Holdings, Inc. Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
JP2004530222A (en) 2001-06-07 2004-09-30 コンテントガード ホールディングズ インコーポレイテッド Method and apparatus for supporting multiple zones of trust in a digital rights management system
US7774280B2 (en) 2001-06-07 2010-08-10 Contentguard Holdings, Inc. System and method for managing transfer of rights using shared state variables
WO2002101494A2 (en) * 2001-06-07 2002-12-19 Contentguard Holdings, Inc. Protected content distribution system
EP1393230A4 (en) * 2001-06-07 2004-07-07 Contentguard Holdings Inc Method and apparatus managing the transfer of rights
US7581103B2 (en) 2001-06-13 2009-08-25 Intertrust Technologies Corporation Software self-checking systems and methods
US7110525B1 (en) 2001-06-25 2006-09-19 Toby Heller Agent training sensitive call routing system
US7979914B2 (en) 2001-06-25 2011-07-12 Audible, Inc. Time-based digital content authorization
US20030005327A1 (en) * 2001-06-29 2003-01-02 Julian Durand System for protecting copyrighted materials
US7237121B2 (en) * 2001-09-17 2007-06-26 Texas Instruments Incorporated Secure bootloader for securing digital devices
US7529659B2 (en) * 2005-09-28 2009-05-05 Audible Magic Corporation Method and apparatus for identifying an unknown work
US7877438B2 (en) * 2001-07-20 2011-01-25 Audible Magic Corporation Method and apparatus for identifying new media content
US8972481B2 (en) 2001-07-20 2015-03-03 Audible Magic, Inc. Playlist generation method and apparatus
DE10140237A1 (en) * 2001-08-22 2003-03-27 Brainshield Technologies Inc Copy protection device
US6704403B2 (en) 2001-09-05 2004-03-09 Ingenio, Inc. Apparatus and method for ensuring a real-time connection between users and selected service provider using voice mail
US20030051172A1 (en) * 2001-09-13 2003-03-13 Lordemann David A. Method and system for protecting digital objects distributed over a network
US20030135623A1 (en) * 2001-10-23 2003-07-17 Audible Magic, Inc. Method and apparatus for cache promotion
CN1331125C (en) * 2001-11-15 2007-08-08 索尼音乐娱乐公司 System and method for controlling the use and duplication of digital content distributed on removable media
US7243230B2 (en) 2001-11-16 2007-07-10 Microsoft Corporation Transferring application secrets in a trusted operating system environment
US7159240B2 (en) * 2001-11-16 2007-01-02 Microsoft Corporation Operating system upgrades in a trusted operating system environment
US7137004B2 (en) * 2001-11-16 2006-11-14 Microsoft Corporation Manifest-based trusted agent management in a trusted operating system environment
US7441192B2 (en) 2001-12-06 2008-10-21 Toyota Motor Sales U.S.A., Inc. Programming, selecting, and playing multimedia files
WO2003051031A2 (en) 2001-12-06 2003-06-19 The Trustees Of Columbia University In The City Of New York Method and apparatus for planarization of a material by growing and removing a sacrificial film
US8001052B2 (en) 2001-12-10 2011-08-16 Dunkeld Bryan C System and method for unique digital asset identification and transaction management
US7580850B2 (en) 2001-12-14 2009-08-25 Utbk, Inc. Apparatus and method for online advice customer relationship management
ATE509326T1 (en) 2001-12-18 2011-05-15 L 1 Secure Credentialing Inc MULTIPLE IMAGE SECURITY FEATURES FOR IDENTIFYING DOCUMENTS AND METHOD FOR PRODUCING THEM
US7728048B2 (en) 2002-12-20 2010-06-01 L-1 Secure Credentialing, Inc. Increasing thermal conductivity of host polymer used with laser engraving methods and compositions
US7937439B2 (en) 2001-12-27 2011-05-03 Utbk, Inc. Apparatus and method for scheduling live advice communication with a selected service provider
AU2002219608A1 (en) * 2002-01-11 2003-07-30 Fujitsu Limited Security system using optical information recording medium
US7321667B2 (en) 2002-01-18 2008-01-22 Digimarc Corporation Data hiding through arrangement of objects
US7020304B2 (en) * 2002-01-22 2006-03-28 Digimarc Corporation Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding
US7328345B2 (en) * 2002-01-29 2008-02-05 Widevine Technologies, Inc. Method and system for end to end securing of content for video on demand
US7269543B2 (en) * 2002-02-25 2007-09-11 Zoran Corporation System and method for providing network connectivity to a common embedded interface by stimulating the embedded interface
US7505889B2 (en) * 2002-02-25 2009-03-17 Zoran Corporation Transcoding media system
US7372952B1 (en) 2002-03-07 2008-05-13 Wai Wu Telephony control system with intelligent call routing
EP1488302A4 (en) * 2002-03-14 2005-11-30 Contentguard Holdings Inc System and method for graphical rights expressions
US7617295B1 (en) 2002-03-18 2009-11-10 Music Choice Systems and methods for providing a broadcast entertainment service and an on-demand entertainment service
US7299292B2 (en) * 2002-03-29 2007-11-20 Widevine Technologies, Inc. Process and streaming server for encrypting a data stream to a virtual smart card client system
US7487365B2 (en) 2002-04-17 2009-02-03 Microsoft Corporation Saving and retrieving data based on symmetric key encryption
US7890771B2 (en) 2002-04-17 2011-02-15 Microsoft Corporation Saving and retrieving data based on public key encryption
US7287275B2 (en) 2002-04-17 2007-10-23 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
US7383570B2 (en) 2002-04-25 2008-06-03 Intertrust Technologies, Corp. Secure authentication systems and methods
US7149899B2 (en) * 2002-04-25 2006-12-12 Intertrust Technologies Corp. Establishing a secure channel with a human user
AU2003243187A1 (en) 2002-05-02 2003-11-17 Shieldip, Inc. Method and apparatus for protecting information and privacy
US7824029B2 (en) 2002-05-10 2010-11-02 L-1 Secure Credentialing, Inc. Identification card printer-assembler for over the counter card issuing
US7680743B2 (en) * 2002-05-15 2010-03-16 Microsoft Corporation Software application protection by way of a digital rights management (DRM) system
US6954541B2 (en) * 2002-05-29 2005-10-11 Xerox Corporation Method of detecting changes occurring in image editing using watermarks
US8601504B2 (en) * 2002-06-20 2013-12-03 Verance Corporation Secure tracking system and method for video program content
WO2004001540A2 (en) * 2002-06-21 2003-12-31 Probix, Inc. Method and system for protecting digital objects distributed over a network using an electronic mail interface
US7281273B2 (en) * 2002-06-28 2007-10-09 Microsoft Corporation Protecting content on medium from unfettered distribution
US20040083487A1 (en) * 2002-07-09 2004-04-29 Kaleidescape, A Corporation Content and key distribution system for digital content representing media streams
US7003131B2 (en) * 2002-07-09 2006-02-21 Kaleidescape, Inc. Watermarking and fingerprinting digital content using alternative blocks to embed information
US20040091111A1 (en) * 2002-07-16 2004-05-13 Levy Kenneth L. Digital watermarking and fingerprinting applications
US20040049624A1 (en) * 2002-09-06 2004-03-11 Oak Technology, Inc. Network to computer internal interface
US7594271B2 (en) * 2002-09-20 2009-09-22 Widevine Technologies, Inc. Method and system for real-time tamper evidence gathering for software
NZ521555A (en) * 2002-09-24 2005-05-27 Auckland Uniservices Ltd Transaction method involving authenticating an digital object such as an image or audio file and applying at least one authentication code to the digital object
US7778438B2 (en) 2002-09-30 2010-08-17 Myport Technologies, Inc. Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval
US6996251B2 (en) 2002-09-30 2006-02-07 Myport Technologies, Inc. Forensic communication apparatus and method
US10721066B2 (en) 2002-09-30 2020-07-21 Myport Ip, Inc. Method for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval
JP2006504986A (en) 2002-10-15 2006-02-09 ベランス・コーポレイション Media monitoring, management and information system
US7978874B2 (en) * 2002-10-21 2011-07-12 Digimarc Corporation Digital watermarking for workflow by tracking content or content identifiers with respect to time
JP3945644B2 (en) * 2002-11-05 2007-07-18 ソニー株式会社 Copy number control method, server device, recording control method, and recording control device
US20040093509A1 (en) * 2002-11-12 2004-05-13 Gidon Elazar Method and apparatus for connecting a storage device to a television
US7573876B2 (en) 2002-12-05 2009-08-11 Intel Corporation Interconnecting network processors with heterogeneous fabrics
US7493289B2 (en) * 2002-12-13 2009-02-17 Aol Llc Digital content store system
US20040177115A1 (en) * 2002-12-13 2004-09-09 Hollander Marc S. System and method for music search and discovery
US7797064B2 (en) 2002-12-13 2010-09-14 Stephen Loomis Apparatus and method for skipping songs without delay
US7412532B2 (en) 2002-12-13 2008-08-12 Aol Llc, A Deleware Limited Liability Company Multimedia scheduler
US6732157B1 (en) 2002-12-13 2004-05-04 Networks Associates Technology, Inc. Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages
US7912920B2 (en) 2002-12-13 2011-03-22 Stephen Loomis Stream sourcing content delivery system
US8918195B2 (en) 2003-01-02 2014-12-23 Catch Media, Inc. Media management and tracking
US8644969B2 (en) 2003-01-02 2014-02-04 Catch Media, Inc. Content provisioning and revenue disbursement
US7761176B2 (en) * 2003-01-02 2010-07-20 Catch Media, Inc. Promotional portable music players
US7191193B2 (en) * 2003-01-02 2007-03-13 Catch Media Automatic digital music library builder
US8666524B2 (en) 2003-01-02 2014-03-04 Catch Media, Inc. Portable music player and transmitter
US8732086B2 (en) 2003-01-02 2014-05-20 Catch Media, Inc. Method and system for managing rights for digital music
JP4029735B2 (en) * 2003-01-28 2008-01-09 ヤマハ株式会社 Song data reproducing apparatus and program
US8332326B2 (en) * 2003-02-01 2012-12-11 Audible Magic Corporation Method and apparatus to identify a work received by a processing system
WO2004070584A2 (en) * 2003-02-04 2004-08-19 Canonline Global Media, Inc. Method and apparatus for converting objects between weakly and strongly typed programming frameworks
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
US7272658B1 (en) 2003-02-13 2007-09-18 Adobe Systems Incorporated Real-time priority-based media communication
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US7660982B1 (en) * 2003-02-27 2010-02-09 Weinblatt Lee S Subscription broadcast security system
WO2004079545A2 (en) * 2003-03-05 2004-09-16 Digimarc Corporation Content identification, personal domain, copyright notification, metadata and e-commerce
US7676034B1 (en) 2003-03-07 2010-03-09 Wai Wu Method and system for matching entities in an auction
US7626609B1 (en) 2003-03-07 2009-12-01 Music Choice Method and system for displaying content while reducing burn-in of a display
US7158169B1 (en) 2003-03-07 2007-01-02 Music Choice Method and system for displaying content while reducing burn-in of a display
US7007170B2 (en) * 2003-03-18 2006-02-28 Widevine Technologies, Inc. System, method, and apparatus for securely providing content viewable on a secure device
US7356143B2 (en) * 2003-03-18 2008-04-08 Widevine Technologies, Inc System, method, and apparatus for securely providing content viewable on a secure device
US7707117B1 (en) * 2003-03-24 2010-04-27 Cybersource Corporation Method and apparatus for communicating state information in an electronic transaction message
US20040192243A1 (en) * 2003-03-28 2004-09-30 Siegel Jaime A. Method and apparatus for reducing noise from a mobile telephone and for protecting the privacy of a mobile telephone user
US7845014B2 (en) * 2003-03-28 2010-11-30 Sony Corporation Method and apparatus for implementing digital rights management
US20040199771A1 (en) * 2003-04-04 2004-10-07 Widevine Technologies, Inc. Method for tracing a security breach in highly distributed content
DE602004030434D1 (en) 2003-04-16 2011-01-20 L 1 Secure Credentialing Inc THREE-DIMENSIONAL DATA STORAGE
EP2357623A1 (en) 2003-04-25 2011-08-17 Apple Inc. Graphical user interface for browsing, searching and presenting media items
US9406068B2 (en) 2003-04-25 2016-08-02 Apple Inc. Method and system for submitting media for network-based purchase and distribution
EP1629408B1 (en) 2003-05-30 2015-01-28 Privaris, Inc. A system and methods for assignation and use of media content subscription service privileges
EP2280524A3 (en) * 2003-06-05 2012-08-08 Intertrust Technologies Corporation Interoperable systems and methods for peer-to-peer service orchestration
US8095470B1 (en) * 2003-06-09 2012-01-10 Microsoft Corporation Identifying a content provider
US7698183B2 (en) * 2003-06-18 2010-04-13 Utbk, Inc. Method and apparatus for prioritizing a listing of information providers
US7949877B2 (en) * 2003-06-30 2011-05-24 Realnetworks, Inc. Rights enforcement and usage reporting on a client device
US7712140B2 (en) * 2003-08-04 2010-05-04 Lsi Corporation 3-prong security/reliability/real-time distributed architecture of information handling system
US7886009B2 (en) 2003-08-22 2011-02-08 Utbk, Inc. Gate keeper
US8438395B2 (en) * 2003-09-18 2013-05-07 Digimarc Corporation Digitally watermarking documents associated with vehicles
US9055239B2 (en) 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
US7616776B2 (en) 2005-04-26 2009-11-10 Verance Corproation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US7369677B2 (en) * 2005-04-26 2008-05-06 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
KR100561847B1 (en) * 2003-10-08 2006-03-16 삼성전자주식회사 Method of public key encryption and decryption method
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US7281274B2 (en) * 2003-10-16 2007-10-09 Lmp Media Llc Electronic media distribution system
US8185475B2 (en) * 2003-11-21 2012-05-22 Hug Joshua D System and method for obtaining and sharing media content
CA2489999A1 (en) * 2003-12-09 2005-06-09 Lorne M. Trottier A secure integrated media center
US7185195B2 (en) * 2003-12-14 2007-02-27 Realnetworks, Inc. Certificate based digital rights management
JP2007519286A (en) * 2003-12-15 2007-07-12 松下電器産業株式会社 Secret information setting device and secret information setting method
KR20050070953A (en) * 2003-12-31 2005-07-07 삼성전자주식회사 Analogue/digital signal processing apparatus for outputting the analogue input signal without eliminating the copy protection signal included therein and method thereof
JP4981455B2 (en) 2004-02-04 2012-07-18 ディジマーク コーポレイション On-chip digital watermarked image signal and photo travel log with digital watermark
GB0402909D0 (en) * 2004-02-10 2004-03-17 Stegostik Ltd Data storage
US7430754B2 (en) * 2004-03-23 2008-09-30 Microsoft Corporation Method for dynamic application of rights management policy
US8117595B2 (en) * 2004-03-23 2012-02-14 Microsoft Corporation Method for updating data in accordance with rights management policy
US7287159B2 (en) 2004-04-01 2007-10-23 Shieldip, Inc. Detection and identification methods for software
WO2005101837A1 (en) * 2004-04-09 2005-10-27 Warner Bros. Entertainment Inc. Motion picture distribution system and related method
US8028323B2 (en) 2004-05-05 2011-09-27 Dryden Enterprises, Llc Method and system for employing a first device to direct a networked audio device to obtain a media item
WO2005121978A1 (en) * 2004-06-09 2005-12-22 Matsushita Electric Industrial Co., Ltd. Copy control information deciding apparatus
US7694121B2 (en) * 2004-06-30 2010-04-06 Microsoft Corporation System and method for protected operating system boot using state validation
US20060085348A1 (en) * 2004-07-16 2006-04-20 Ns8 Corporation Method and system for managing the use of electronic works
US20060026162A1 (en) * 2004-07-19 2006-02-02 Zoran Corporation Content management system
US8130746B2 (en) * 2004-07-28 2012-03-06 Audible Magic Corporation System for distributing decoy content in a peer to peer network
EP1621956B1 (en) * 2004-07-30 2017-05-31 Irdeto B.V. Method of providing rights data objects
JP4748762B2 (en) * 2004-08-24 2011-08-17 キヤノン株式会社 Signature generation method and information processing apparatus
FR2875092A1 (en) * 2004-09-07 2006-03-10 France Telecom PROTECTION AND CONTROL OF DIFFUSION OF CONTENT ON TELECOMMUNICATIONS NETWORKS
US7590589B2 (en) 2004-09-10 2009-09-15 Hoffberg Steven M Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference
US7529845B2 (en) * 2004-09-15 2009-05-05 Nokia Corporation Compressing, filtering, and transmitting of protocol messages via a protocol-aware intermediary node
US9609279B2 (en) * 2004-09-24 2017-03-28 Google Inc. Method and system for providing secure CODECS
JP4843208B2 (en) * 2004-09-30 2011-12-21 株式会社東芝 Digital content editing apparatus, digital content editing method, digital content editing program, and recording medium recording digital content editing program
US7752671B2 (en) * 2004-10-04 2010-07-06 Promisec Ltd. Method and device for questioning a plurality of computerized devices
WO2006042155A2 (en) * 2004-10-08 2006-04-20 E-Klone, Inc. Floating vector scrambling methods and apparatus
US7015823B1 (en) 2004-10-15 2006-03-21 Systran Federal Corporation Tamper resistant circuit boards
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US7958369B2 (en) * 2004-10-22 2011-06-07 Hewlett-Packard Development Company, L.P. Systems and methods for multiple level control of access of privileges to protected media content
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
US8660961B2 (en) 2004-11-18 2014-02-25 Contentguard Holdings, Inc. Method, system, and device for license-centric content consumption
US20060106726A1 (en) * 2004-11-18 2006-05-18 Contentguard Holdings, Inc. Method, system, and device for license-centric content consumption
US7739742B2 (en) * 2005-02-01 2010-06-15 Lionel Poizner Theft protection method and promotion system for audio media
US20080015999A1 (en) * 2005-02-04 2008-01-17 Widevine Technologies, Inc. Securely ingesting encrypted content into content servers
CA2593441A1 (en) * 2005-02-11 2006-08-17 Universal Data Protection Corporation Method and system for microprocessor data security
US8538768B2 (en) 2005-02-16 2013-09-17 Ingenio Llc Methods and apparatuses for delivery of advice to mobile/wireless devices
US7607020B2 (en) * 2005-03-01 2009-10-20 Adobe Systems Incorporated Communication with an external source application
US7370190B2 (en) * 2005-03-03 2008-05-06 Digimarc Corporation Data processing systems and methods with enhanced bios functionality
WO2006096612A2 (en) 2005-03-04 2006-09-14 The Trustees Of Columbia University In The City Of New York System and method for motion estimation and mode decision for low-complexity h.264 decoder
US20070061265A1 (en) * 2005-03-17 2007-03-15 Speedus Corp. A system and method for the provision of audio and/or visual services
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US9436804B2 (en) * 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US20060271915A1 (en) * 2005-05-24 2006-11-30 Contentguard Holdings, Inc. Usage rights grammar and digital works having usage rights created with the grammar
WO2006138620A2 (en) 2005-06-15 2006-12-28 Music Choice Systems and methods for facilitating the acquisition of content
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US7438078B2 (en) * 2005-08-05 2008-10-21 Peter Woodruff Sleeping bag and system
US20070067309A1 (en) 2005-08-05 2007-03-22 Realnetworks, Inc. System and method for updating profiles
WO2007028241A2 (en) * 2005-09-07 2007-03-15 Universal Data Protection Corporation Method and system for data security of recording media
US20070067643A1 (en) * 2005-09-21 2007-03-22 Widevine Technologies, Inc. System and method for software tamper detection
US8065733B2 (en) * 2005-09-23 2011-11-22 Google, Inc. Method for evolving detectors to detect malign behavior in an artificial immune system
WO2007038245A2 (en) 2005-09-23 2007-04-05 Widevine Technologies, Inc. Method for evolving detectors to detect malign behavior in an artificial immune system
US7817608B2 (en) * 2005-09-23 2010-10-19 Widevine Technologies, Inc. Transitioning to secure IP communications for encoding, encapsulating, and encrypting data
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US9626667B2 (en) 2005-10-18 2017-04-18 Intertrust Technologies Corporation Digital rights management engine systems and methods
US20070204078A1 (en) * 2006-02-09 2007-08-30 Intertrust Technologies Corporation Digital rights management engine systems and methods
AU2006304655B2 (en) * 2005-10-18 2012-08-16 Intertrust Technologies Corporation Methods for digital rights management
US8689016B2 (en) 2005-12-02 2014-04-01 Google Inc. Tamper prevention and detection for video provided over a network to a client
US20070162390A1 (en) * 2005-12-22 2007-07-12 Macrovision Corporation Techniques for distributing and monitoring content
EP1966670B1 (en) * 2005-12-29 2017-08-23 Telecom Italia S.p.A. A method for communicating entitlement data from a server, related server, client systems and computer program product
JP4564464B2 (en) * 2006-01-05 2010-10-20 株式会社東芝 Digital content playback apparatus, method and program
US8526612B2 (en) * 2006-01-06 2013-09-03 Google Inc. Selective and persistent application level encryption for video provided to a client
US20070162369A1 (en) * 2006-01-09 2007-07-12 Hardison Joseph H Iii Internet-based method of and system for transfering and exercising monetary rights within a financial marketplace
US8626626B2 (en) 2006-01-09 2014-01-07 Interest Capturing Systems, Llc Method of and system for capturing interest earned on the monetary value of transferred monetary rights managed on an internet-based monetary rights transfer (MRT) network supported by a real-time gross settlement (RTGS) system
US9197479B2 (en) * 2006-01-10 2015-11-24 Yellowpages.Com Llc Systems and methods to manage a queue of people requesting real time communication connections
US20070180231A1 (en) * 2006-01-31 2007-08-02 Widevine Technologies, Inc. Preventing entitlement management message (EMM) filter attacks
US20070204162A1 (en) * 2006-02-24 2007-08-30 Rodriguez Tony F Safeguarding private information through digital watermarking
US7945070B2 (en) * 2006-02-24 2011-05-17 Digimarc Corporation Geographic-based watermarking keys
US8300798B1 (en) 2006-04-03 2012-10-30 Wai Wu Intelligent communication routing system and method
US7987514B2 (en) * 2006-04-04 2011-07-26 Intertrust Technologies Corp. Systems and methods for retrofitting electronic appliances to accept different content formats
US8015237B2 (en) * 2006-05-15 2011-09-06 Apple Inc. Processing of metadata content and media content received by a media distribution system
US7962634B2 (en) 2006-05-15 2011-06-14 Apple Inc. Submission of metadata content and media content to a media distribution system
WO2007143394A2 (en) 2006-06-02 2007-12-13 Nielsen Media Research, Inc. Digital rights management systems and methods for audience measurement
KR20090020632A (en) 2006-06-19 2009-02-26 파나소닉 주식회사 Information burying device and detecting device
US20090271318A1 (en) * 2006-08-29 2009-10-29 Benjamin Filmalter Grobler Digital data licensing system
US9747426B2 (en) 2006-08-31 2017-08-29 Invention Science Fund I, Llc Handling masquerading elements
US8640248B2 (en) * 2006-08-31 2014-01-28 The Invention Science Fund I, Llc Handling masquerading elements
WO2008027317A2 (en) * 2006-08-31 2008-03-06 Searete Llc Handling masquerading elements
US8555396B2 (en) * 2006-08-31 2013-10-08 The Invention Science Fund I, Llc Authenticatable displayed content
US8327155B2 (en) * 2006-08-31 2012-12-04 The Invention Science Fund I, Llc Screening for masquerading content
US8451825B2 (en) 2007-02-22 2013-05-28 Utbk, Llc Systems and methods to confirm initiation of a callback
EP2135376A4 (en) * 2007-03-22 2012-12-19 Nielsen Co Us Llc Digital rights management and audience measurement systems and methods
WO2008144087A1 (en) * 2007-05-21 2008-11-27 Nielsen Media Research, Inc. Methods and apparatus to monitor content distributed by the internet
US8621093B2 (en) * 2007-05-21 2013-12-31 Google Inc. Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network
US8243924B2 (en) 2007-06-29 2012-08-14 Google Inc. Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
JP2009027525A (en) * 2007-07-20 2009-02-05 Nec Corp Optical transmission system and optical transmission method
US8006314B2 (en) * 2007-07-27 2011-08-23 Audible Magic Corporation System for identifying content of digital data
JP5129053B2 (en) * 2007-07-27 2013-01-23 パナソニック株式会社 Content reproduction apparatus, content reproduction method, content reproduction program, and integrated circuit
US8219494B1 (en) * 2007-08-16 2012-07-10 Corbis Corporation End-to-end licensing of digital media assets
US7961878B2 (en) 2007-10-15 2011-06-14 Adobe Systems Incorporated Imparting cryptographic information in network communications
JP5166434B2 (en) * 2007-10-17 2013-03-21 パナソニック株式会社 Content reproduction apparatus, content reproduction method, recording medium, and integrated circuit
US9015147B2 (en) 2007-12-20 2015-04-21 Porto Technology, Llc System and method for generating dynamically filtered content results, including for audio and/or video channels
US8117193B2 (en) * 2007-12-21 2012-02-14 Lemi Technology, Llc Tunersphere
US8316015B2 (en) 2007-12-21 2012-11-20 Lemi Technology, Llc Tunersphere
US8868464B2 (en) 2008-02-07 2014-10-21 Google Inc. Preventing unauthorized modification or skipping of viewing of advertisements within content
WO2009126785A2 (en) 2008-04-10 2009-10-15 The Trustees Of Columbia University In The City Of New York Systems and methods for image archaeology
US8849765B2 (en) * 2008-04-22 2014-09-30 Anne Marina Faggionato System and method for providing a permanent data record for a creative work
US8335188B1 (en) * 2008-05-19 2012-12-18 Sprint Spectrum L.P. Method and system for handoffs between public and private wireless networks
WO2009155281A1 (en) 2008-06-17 2009-12-23 The Trustees Of Columbia University In The City Of New York System and method for dynamically and interactively searching media data
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US8051287B2 (en) 2008-10-15 2011-11-01 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US8494899B2 (en) 2008-12-02 2013-07-23 Lemi Technology, Llc Dynamic talk radio program scheduling
US8589372B2 (en) 2008-12-16 2013-11-19 Clinton A. Krislov Method and system for automated document registration with cloud computing
US8341141B2 (en) * 2008-12-16 2012-12-25 Krislov Clinton A Method and system for automated document registration
US8914351B2 (en) 2008-12-16 2014-12-16 Clinton A. Krislov Method and system for secure automated document registration from social media networks
US8671069B2 (en) 2008-12-22 2014-03-11 The Trustees Of Columbia University, In The City Of New York Rapid image annotation via brain state decoding and visual pattern mining
US20100235254A1 (en) * 2009-03-16 2010-09-16 Payam Mirrashidi Application Products with In-Application Subsequent Feature Access Using Network-Based Distribution System
US8199651B1 (en) 2009-03-16 2012-06-12 Audible Magic Corporation Method and system for modifying communication flows at a port level
US20100250383A1 (en) * 2009-03-26 2010-09-30 Frazier John D Steganographic media payment system
US8929303B2 (en) * 2009-04-06 2015-01-06 Samsung Electronics Co., Ltd. Control and data channels for advanced relay operation
US9015741B2 (en) 2009-04-17 2015-04-21 Gracenote, Inc. Method and system for remotely controlling consumer electronic devices
US7657337B1 (en) * 2009-04-29 2010-02-02 Lemi Technology, Llc Skip feature for a broadcast or multicast media station
US20100299219A1 (en) * 2009-05-25 2010-11-25 Cortes Ricardo D Configuration and Management of Add-ons to Digital Application Programs for Network-Based Distribution
US8914903B1 (en) 2009-06-03 2014-12-16 Amdocs Software System Limited System, method, and computer program for validating receipt of digital content by a client device
US8255296B2 (en) 2009-06-11 2012-08-28 Interest Capturing Systems, Llc System for implementing a security issuer rights management process over a distributed communications network, deployed in a financial marketplace
US9729609B2 (en) 2009-08-07 2017-08-08 Apple Inc. Automatic transport discovery for media submission
US8935217B2 (en) 2009-09-08 2015-01-13 Apple Inc. Digital asset validation prior to submission for network-based distribution
US20110126018A1 (en) * 2009-11-23 2011-05-26 Anees Narsinh Methods and systems for transaction digital watermarking in content delivery network
JP2011223281A (en) * 2010-04-08 2011-11-04 Sony Corp Information processor, information processing system and information processing method, and program
US8544103B2 (en) 2010-05-04 2013-09-24 Intertrust Technologies Corporation Policy determined accuracy of transmitted information
US8874896B2 (en) 2010-06-18 2014-10-28 Intertrust Technologies Corporation Secure processing systems and methods
US8688585B2 (en) * 2010-08-13 2014-04-01 Apple Inc. Remote container
US8838978B2 (en) 2010-09-16 2014-09-16 Verance Corporation Content access management using extracted watermark information
CN103597488B (en) 2011-04-11 2016-08-24 英特托拉斯技术公司 Information safety system and method
US8315620B1 (en) 2011-05-27 2012-11-20 The Nielsen Company (Us), Llc Methods and apparatus to associate a mobile device with a panelist profile
EP2563027A1 (en) * 2011-08-22 2013-02-27 Siemens AG Österreich Method for protecting data content
US9213972B2 (en) 2011-08-30 2015-12-15 Gregory DORSO Systems and methods for fast mobile payment
US20130101059A1 (en) * 2011-10-03 2013-04-25 Ira S. Moskowitz Pre-modulation physical layer steganography
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US8826399B2 (en) 2011-12-06 2014-09-02 Gregory DORSO Systems and methods for fast authentication with a mobile device
US8751800B1 (en) 2011-12-12 2014-06-10 Google Inc. DRM provider interoperability
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9197937B1 (en) 2012-04-26 2015-11-24 Music Choice Automatic on-demand navigation based on meta-data broadcast with media content
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US9081778B2 (en) 2012-09-25 2015-07-14 Audible Magic Corporation Using digital fingerprints to associate data with a work
US8990188B2 (en) 2012-11-30 2015-03-24 Apple Inc. Managed assessment of submitted digital content
US9087341B2 (en) 2013-01-11 2015-07-21 Apple Inc. Migration of feedback data to equivalent digital assets
US9626489B2 (en) 2013-03-13 2017-04-18 Intertrust Technologies Corporation Object rendering systems and methods
WO2014153199A1 (en) 2013-03-14 2014-09-25 Verance Corporation Transactional video marking system
US9246885B2 (en) * 2013-04-02 2016-01-26 International Business Machines Corporation System, method, apparatus and computer programs for securely using public services for private or enterprise purposes
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
JP2017514345A (en) 2014-03-13 2017-06-01 ベランス・コーポレイション Interactive content acquisition using embedded code
US10838378B2 (en) * 2014-06-02 2020-11-17 Rovio Entertainment Ltd Control of a computer program using media content
US10219027B1 (en) 2014-10-24 2019-02-26 Music Choice System for providing music content to a user
US20160132317A1 (en) 2014-11-06 2016-05-12 Intertrust Technologies Corporation Secure Application Distribution Systems and Methods
CN108023939B (en) 2014-11-12 2021-02-05 华为技术有限公司 Method and system for processing lock server fault in distributed system
US9510062B1 (en) 2015-08-13 2016-11-29 This Technology, Inc. In-band trick mode control
USD821401S1 (en) * 2016-01-29 2018-06-26 Siebels Asset Management Research, Ltd. Controlled document tracking and/or authentication device
TWI602076B (en) * 2016-05-13 2017-10-11 矽統科技股份有限公司 Method for locking audio/voice processing effect and audio receiving device
US10715497B1 (en) 2017-02-13 2020-07-14 Wells Fargo Bank, N.A. Digital safety box for secure communication between computing devices
US10915809B2 (en) 2019-02-04 2021-02-09 Bank Of America Corporation Neural network image recognition with watermark protection
US11575694B2 (en) 2021-01-20 2023-02-07 Bank Of America Corporation Command and control steganographic communications detection engine
WO2023141286A1 (en) * 2022-01-21 2023-07-27 The Johns Hopkins University System and method for metamaking and metaverse rights management
CN115277259B (en) * 2022-09-27 2023-02-28 南湖实验室 Method for supporting large-scale cross-platform migration of persistent data through privacy calculation

Family Cites Families (491)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3609697A (en) * 1968-10-21 1971-09-28 Ibm Program security device
US3573747A (en) * 1969-02-24 1971-04-06 Institutional Networks Corp Instinet communication system for effectuating the sale or exchange of fungible properties between subscribers
US3845391A (en) 1969-07-08 1974-10-29 Audicom Corp Communication including submerged identification signal
US3798359A (en) * 1971-06-30 1974-03-19 Ibm Block cipher cryptographic system
US3798360A (en) * 1971-06-30 1974-03-19 Ibm Step code ciphering system
US3798605A (en) * 1971-06-30 1974-03-19 Ibm Centralized verification system
US3796830A (en) * 1971-11-02 1974-03-12 Ibm Recirculating block cipher cryptographic system
GB1414126A (en) * 1971-11-22 1975-11-19 Key Tronic Ltd Secutity for computer systems
US3790700A (en) 1971-12-17 1974-02-05 Hughes Aircraft Co Catv program control system
US3931504A (en) * 1972-02-07 1976-01-06 Basic Computing Arts, Inc. Electronic data processing security system and method
SE381940B (en) 1972-04-11 1975-12-22 Gretag Ag DEVICE FOR INDIVIDUAL IDENTIFICATION OF A MAJORITY OF INDIVIDUALS
US3911397A (en) * 1972-10-24 1975-10-07 Information Identification Inc Access control assembly
US3829833A (en) * 1972-10-24 1974-08-13 Information Identification Co Code element identification method and apparatus
GB1494736A (en) 1974-01-21 1977-12-14 Chubb Integrated Syst Ltd Token-control
US3924065A (en) * 1974-04-05 1975-12-02 Information Identification Inc Coherent, fixed BAUD rate FSK communication method and apparatus
US3946220A (en) * 1974-06-10 1976-03-23 Transactron, Inc. Point-of-sale system and apparatus
US3970992A (en) * 1974-06-25 1976-07-20 Ibm Corporation Transaction terminal with unlimited range of functions
US3956615A (en) * 1974-06-25 1976-05-11 Ibm Corporation Transaction execution system with secure data storage and communications
US3906448A (en) * 1974-08-01 1975-09-16 Rca Corp Fault detection facilitating means for card reader of identification card reading system
US4270182A (en) * 1974-12-30 1981-05-26 Asija Satya P Automated information input, storage, and retrieval system
US3946200A (en) 1975-02-24 1976-03-23 Gca Corporation Proportional temperature controller
US3958081A (en) * 1975-02-24 1976-05-18 International Business Machines Corporation Block cipher system for data security
US4112421A (en) * 1975-04-16 1978-09-05 Information Identification Company, Inc. Method and apparatus for automatically monitoring objects
US4217588A (en) * 1975-04-16 1980-08-12 Information Identification Company, Inc. Object monitoring method and apparatus
US4209787A (en) * 1975-04-16 1980-06-24 Gould Inc. Method for monitoring the location of monitored objects
US4071911A (en) * 1975-04-22 1978-01-31 Continental Can Co. Inc. Machine control system with machine serializing and safety circuits
US3996449A (en) 1975-08-25 1976-12-07 International Business Machines Corporation Operating system authenticator
US4196310A (en) * 1976-04-09 1980-04-01 Digital Data, Inc. Secure SCA broadcasting system including subscriber actuated portable receiving terminals
JPS533029A (en) * 1976-06-30 1978-01-12 Toshiba Corp Electronic computer
US4048619A (en) * 1976-09-07 1977-09-13 Digital Data Inc. Secure two channel sca broadcasting system
US4141005A (en) 1976-11-11 1979-02-20 International Business Machines Corporation Data format converting apparatus for use in a digital data processor
GB1561482A (en) 1976-11-18 1980-02-20 Ibm Protection of data processing system against unauthorised programmes
US4104721A (en) 1976-12-30 1978-08-01 International Business Machines Corporation Hierarchical security mechanism for dynamically assigning security levels to object programs
US4120030A (en) * 1977-03-11 1978-10-10 Kearney & Trecker Corporation Computer software security system
US4162483A (en) 1977-04-01 1979-07-24 Intech Laboratories, Inc. Bilateral master station-plural satellite station signalling apparatus
US4200913A (en) * 1977-04-13 1980-04-29 International Business Machines Corporation Operator controlled programmable keyboard apparatus
GB1553027A (en) * 1977-05-12 1979-09-19 Marconi Co Ltd Message signal scrambling apparatus
DE2840980C3 (en) * 1977-10-08 1982-05-06 Tokyo Electric Co., Ltd., Tokyo Electronic cash register and electronic cash register system
US4168396A (en) * 1977-10-31 1979-09-18 Best Robert M Microprocessor for executing enciphered programs
US4278837A (en) * 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4259720A (en) 1978-01-09 1981-03-31 Interbank Card Association Security system for electronic funds transfer system
US4262329A (en) * 1978-03-27 1981-04-14 Computation Planning, Inc. Security system for data processing
US4246638A (en) 1978-09-14 1981-01-20 Thomas William J Method and apparatus for controlling usage of a programmable computing machine
US4253157A (en) * 1978-09-29 1981-02-24 Alpex Computer Corp. Data access system wherein subscriber terminals gain access to a data bank by telephone lines
US4265371A (en) * 1978-10-06 1981-05-05 Trafalgar Industries Inc. Foodstuff vending apparatus employing improved solid-state type control apparatus
US4232317A (en) * 1978-11-01 1980-11-04 Freeny Jr Charles C Quantized hyperbolic and inverse hyperbolic object location system
US4305131A (en) * 1979-02-05 1981-12-08 Best Robert M Dialog between TV movies and human viewers
FR2448824A1 (en) * 1979-02-06 1980-09-05 Telediffusion Fse VIDEOTEX SYSTEM PROVIDED WITH INFORMATION ACCESS CONTROL MEANS
FR2448825A1 (en) * 1979-02-06 1980-09-05 Telediffusion Fse SYSTEM FOR TRANSMITTING INFORMATION BETWEEN A TRANSMISSION CENTER AND RECEIVING STATIONS, WHICH IS PROVIDED WITH A MEANS OF CONTROLLING ACCESS TO THE INFORMATION TRANSMITTED
US4598288A (en) 1979-04-16 1986-07-01 Codart, Inc. Apparatus for controlling the reception of transmitted programs
US4236217A (en) * 1979-04-20 1980-11-25 Kennedy Stanley P Energy utilization or consumption recording arrangement
US4465901A (en) * 1979-06-04 1984-08-14 Best Robert M Crypto microprocessor that executes enciphered programs
US4309569A (en) * 1979-09-05 1982-01-05 The Board Of Trustees Of The Leland Stanford Junior University Method of providing digital signatures
US4319079A (en) * 1979-09-13 1982-03-09 Best Robert M Crypto microprocessor using block cipher
DE2943436A1 (en) 1979-10-26 1981-05-07 Wolfram Dr.-Ing. 5100 Aachen Szepanski Security coding system for documents - has cover coding printed on document and optically scanned for comparison with normal text
FR2469760A1 (en) 1979-11-09 1981-05-22 Cii Honeywell Bull METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA
US4321672A (en) 1979-11-26 1982-03-23 Braun Edward L Financial data processing system
US4328544A (en) * 1980-01-04 1982-05-04 International Business Machines Corporation Electronic point-of-sale system using direct-access storage
US4375579A (en) * 1980-01-30 1983-03-01 Wisconsin Alumni Research Foundation Database encryption and decryption circuit and method using subkeys
US4306289A (en) * 1980-02-04 1981-12-15 Western Electric Company, Inc. Digital computer having code conversion apparatus for an encrypted program
US4361877A (en) * 1980-02-05 1982-11-30 Sangamo Weston, Inc. Billing recorder with non-volatile solid state memory
US4529870A (en) 1980-03-10 1985-07-16 David Chaum Cryptographic identification, financial transaction, and credential device
JPS56140452A (en) * 1980-04-01 1981-11-02 Hitachi Ltd Memory protection system
CA1183950A (en) * 1980-09-26 1985-03-12 Bo Lofberg Method for processing an information signal and means for carrying out the method
US4442484A (en) 1980-10-14 1984-04-10 Intel Corporation Microprocessor memory management and protection mechanism
US4513174A (en) * 1981-03-19 1985-04-23 Standard Microsystems Corporation Software security method using partial fabrication of proprietary control word decoders and microinstruction memories
US4446519A (en) * 1981-05-26 1984-05-01 Corban International, Ltd. Method and apparatus for providing security for computer software
US4578530A (en) 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4464650A (en) * 1981-08-10 1984-08-07 Sperry Corporation Apparatus and method for compressing data signals and restoring the compressed data signals
US4433207A (en) * 1981-09-10 1984-02-21 Best Robert M Cryptographic decoder for computer programs
US4471163A (en) * 1981-10-05 1984-09-11 Donald Thomas C Software protection system
US4670857A (en) * 1981-10-26 1987-06-02 Rackman Michael I Cartridge-controlled system whose use is limited to authorized cartridges
US4593353A (en) * 1981-10-26 1986-06-03 Telecommunications Associates, Inc. Software protection method and apparatus
US4442486A (en) * 1981-11-25 1984-04-10 U.S. Philips Corporation Protected programmable apparatus
US4454594A (en) * 1981-11-25 1984-06-12 U.S. Philips Corporation Method and apparatus to secure proprietary operation of computer equipment
US4553252A (en) * 1981-12-21 1985-11-12 Egendorf Harris H Counting computer software cartridge
HU183765B (en) 1981-12-23 1984-05-28 Phylaxia Oltoanyagtermeloe Process for producing lyophilized vaccine against duck hepatitis
EP0084441A3 (en) 1982-01-19 1984-08-22 Tabs Limited Method and apparatus for the protection of proprietary computer software
US4458315A (en) * 1982-02-25 1984-07-03 Penta, Inc. Apparatus and method for preventing unauthorized use of computer programs
AU542447B2 (en) * 1982-02-27 1985-02-21 Fujitsu Limited System for controlling key storage unit
FR2523745B1 (en) * 1982-03-18 1987-06-26 Bull Sa METHOD AND DEVICE FOR PROTECTING SOFTWARE DELIVERED BY A SUPPLIER TO A USER
GB2119992B (en) 1982-05-06 1985-10-30 Tokyo Shibaura Electric Co Automatic transaction machine
US4484217A (en) * 1982-05-11 1984-11-20 Telease, Inc. Method and system for remote reporting, particularly for pay television billing
US4494156A (en) * 1982-05-14 1985-01-15 Media Systems Technology Selectable format computer disk copier machine
US4525599A (en) 1982-05-21 1985-06-25 General Computer Corporation Software protection methods and apparatus
US4462076A (en) * 1982-06-04 1984-07-24 Smith Engineering Video game cartridge recognition and security system
US4523271A (en) 1982-06-22 1985-06-11 Levien Raphael L Software protection method and apparatus
US4590552A (en) 1982-06-30 1986-05-20 Texas Instruments Incorporated Security bit for designating the security status of information stored in a nonvolatile memory
US4462078A (en) * 1982-08-02 1984-07-24 Ron Ross Computer program protection method
US4558176A (en) * 1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
FR2536880B1 (en) * 1982-11-30 1987-05-07 Bull Sa MICROPROCESSOR DESIGNED IN PARTICULAR FOR EXECUTING THE CALCULATION ALGORITHMS OF A PUBLIC KEY ENCRYPTION SYSTEM
US4562305A (en) 1982-12-22 1985-12-31 International Business Machines Corporation Software cryptographic apparatus and method
US4609985A (en) 1982-12-30 1986-09-02 Thomson Components-Mostek Corporation Microcomputer with severable ROM
US4528643A (en) * 1983-01-10 1985-07-09 Fpdc, Inc. System for reproducing information in material objects at a point of sale location
US4588991A (en) * 1983-03-07 1986-05-13 Atalla Corporation File access security method and means
US4680731A (en) * 1983-03-17 1987-07-14 Romox Incorporated Reprogrammable cartridge memory with built-in identification circuitry and programming method
US4593376A (en) * 1983-04-21 1986-06-03 Volk Larry N System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires
US4597058A (en) * 1983-05-09 1986-06-24 Romox, Inc. Cartridge programming system
WO1984004614A1 (en) 1983-05-13 1984-11-22 Ira Dennis Gale Data security device
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4573119A (en) 1983-07-11 1986-02-25 Westheimer Thomas O Computer software protection system
FR2550638A1 (en) 1983-08-11 1985-02-15 Christophe Leveque DEVICE FOR PROTECTING SOFTWARE USED BY A COMPUTER CONNECTED TO AT LEAST ONE PERIPHERAL TERMINAL
US4926480A (en) 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4621334A (en) 1983-08-26 1986-11-04 Electronic Signature Lock Corporation Personal identification apparatus
US4584641A (en) * 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection
US4562306A (en) * 1983-09-14 1985-12-31 Chou Wayne W Method and apparatus for protecting computer software utilizing an active coded hardware device
US5103392A (en) 1983-10-05 1992-04-07 Fujitsu Limited System for storing history of use of programs including user credit data and having access by the proprietor
EP0158633A4 (en) * 1983-10-07 1986-07-24 Nat Information Utilities Corp Education utility.
US4652990A (en) * 1983-10-27 1987-03-24 Remote Systems, Inc. Protected software access control apparatus and method
US4558413A (en) * 1983-11-21 1985-12-10 Xerox Corporation Software version management system
US4740890A (en) * 1983-12-22 1988-04-26 Software Concepts, Inc. Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media
US4584639A (en) 1983-12-23 1986-04-22 Key Logic, Inc. Computer security system
US4577289A (en) * 1983-12-30 1986-03-18 International Business Machines Corporation Hardware key-on-disk system for copy-protecting magnetic storage media
US4621321A (en) 1984-02-16 1986-11-04 Honeywell Inc. Secure data processing system architecture
US4609777A (en) 1984-02-22 1986-09-02 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4599489A (en) 1984-02-22 1986-07-08 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4646234A (en) * 1984-02-29 1987-02-24 Brigham Young University Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs
US4672605A (en) 1984-03-20 1987-06-09 Applied Spectrum Technologies, Inc. Data and voice communications system
US4649515A (en) 1984-04-30 1987-03-10 Westinghouse Electric Corp. Methods and apparatus for system fault diagnosis and control
US4748561A (en) 1984-05-14 1988-05-31 Mark Brown Method of protecting computer software
US4672572A (en) 1984-05-21 1987-06-09 Gould Inc. Protector system for computer access and use
US4712238A (en) * 1984-06-08 1987-12-08 M/A-Com Government Systems, Inc. Selective-subscription descrambling
US4791565A (en) * 1984-06-20 1988-12-13 Effective Security Systems, Inc. Apparatus for controlling the use of computer software
US4562495A (en) * 1984-07-02 1985-12-31 Verbatim Corporation Multiple system disk
EP0175487A3 (en) * 1984-08-23 1989-03-08 Btg International Limited Software protection device
US4747139A (en) * 1984-08-27 1988-05-24 Taaffe James L Software security method and systems
BE900479A (en) 1984-08-31 1984-12-17 Smets Raph Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying
US4644493A (en) 1984-09-14 1987-02-17 International Business Machines Corporation Implementing a shared higher level of privilege on personal computers for copy protection of software
US4677552A (en) 1984-10-05 1987-06-30 Sibley Jr H C International commodity trade exchange
US4696034A (en) * 1984-10-12 1987-09-22 Signal Security Technologies High security pay television system
US4677434A (en) * 1984-10-17 1987-06-30 Lotus Information Network Corp. Access control system for transmitting data from a central station to a plurality of receiving stations and method therefor
EP0180460B1 (en) 1984-10-31 1990-09-19 Sony Corporation Decoders for pay television systems
CA1238427A (en) * 1984-12-18 1988-06-21 Jonathan Oseas Code protection using cryptography
JPS61166652A (en) * 1985-01-19 1986-07-28 Panafacom Ltd Interruption generating system using exceptional memory protection
US4713753A (en) * 1985-02-21 1987-12-15 Honeywell Inc. Secure data processing system architecture with format control
US4888798A (en) 1985-04-19 1989-12-19 Oms, Inc. Modular software security
US4700296A (en) 1985-04-19 1987-10-13 Palmer Jr Roy A Electronic access control system
US4688169A (en) * 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
US4685056A (en) * 1985-06-11 1987-08-04 Pueblo Technologies, Inc. Computer security device
US4685055A (en) 1985-07-01 1987-08-04 Thomas Richard B Method and system for controlling use of protected software
US4683968A (en) 1985-09-03 1987-08-04 Burroughs Corporation System for preventing software piracy employing multi-encrypted keys and single decryption circuit modules
US4757533A (en) * 1985-09-11 1988-07-12 Computer Security Corporation Security system for microcomputers
US4727550A (en) 1985-09-19 1988-02-23 Chang David B Radiation source
GB2182467B (en) * 1985-10-30 1989-10-18 Ncr Co Security device for stored sensitive data
US5216603A (en) 1985-11-18 1993-06-01 Action Technologies, Inc. Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants
US5208748A (en) 1985-11-18 1993-05-04 Action Technologies, Inc. Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants
LU86203A1 (en) 1985-12-11 1987-07-24 Cen Centre Energie Nucleaire METHOD AND APPARATUS FOR VERIFYING THE AUTHENTICITY OF DOCUMENTS LINKED TO A PERSON AND THE IDENTITY OF THEIR CARRIERS
DE3601983A1 (en) 1986-01-23 1987-07-30 Siemens Ag METHOD AND DEVICE FOR CONTACTLESS DETERMINATION OF TEMPERATURE DISTRIBUTION IN AN EXAMINATION OBJECT
US5759101A (en) 1986-03-10 1998-06-02 Response Reward Systems L.C. Central and remote evaluation of responses of participatory broadcast audience with automatic crediting and couponing
US4864494A (en) * 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US4893332A (en) 1986-05-12 1990-01-09 Aquatrol Corporation Low-powered remote sensor
US4823264A (en) 1986-05-27 1989-04-18 Deming Gilbert R Electronic funds transfer system
US4780821A (en) 1986-07-29 1988-10-25 International Business Machines Corp. Method for multiple programs management within a network having a server computer and a plurality of remote computers
GB8619989D0 (en) 1986-08-16 1986-09-24 Modray Ltd Controlling length of time
US5014234A (en) 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
WO1988001785A1 (en) 1986-08-25 1988-03-10 Sony Corporation A disc device and a disc-like recording medium
US5010571A (en) 1986-09-10 1991-04-23 Titan Linkabit Corporation Metering retrieval of encrypted data stored in customer data retrieval terminal
US4799156A (en) 1986-10-01 1989-01-17 Strategic Processing Corporation Interactive market management system
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US5050213A (en) 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4796181A (en) * 1986-10-24 1989-01-03 Wiedemer John D Billing system for computer software
US5047928A (en) 1986-10-24 1991-09-10 Wiedemer John D Billing system for computer software
US5155680A (en) 1986-10-24 1992-10-13 Signal Security Technologies Billing system for computing software
US5109413A (en) 1986-11-05 1992-04-28 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism
US5146575A (en) 1986-11-05 1992-09-08 International Business Machines Corp. Implementing privilege on microprocessor systems for use in software asset protection
US4817140A (en) * 1986-11-05 1989-03-28 International Business Machines Corp. Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
US4858121A (en) * 1986-12-12 1989-08-15 Medical Payment Systems, Incorporated Medical payment system
US4796220A (en) 1986-12-15 1989-01-03 Pride Software Development Corp. Method of controlling the copying of software
US4775978A (en) * 1987-01-12 1988-10-04 Magnetic Peripherals Inc. Data error correction system
US4757914A (en) 1987-01-27 1988-07-19 Continental Can Company, Inc. Laminated closure for a plastic container
US4893248A (en) 1987-02-06 1990-01-09 Access Corporation Monitoring and reporting system for remote terminals
US4881197A (en) 1987-02-13 1989-11-14 Addison Fischer Document composition system using named formats and named fonts
US5224160A (en) 1987-02-23 1993-06-29 Siemens Nixdorf Informationssysteme Ag Process for securing and for checking the integrity of the secured programs
US4975647A (en) 1987-06-01 1990-12-04 Nova Biomedical Corporation Controlling machine operation with respect to consumable accessory units
US4930073A (en) 1987-06-26 1990-05-29 International Business Machines Corporation Method to prevent use of incorrect program version in a computer system
US5070400A (en) 1987-06-30 1991-12-03 Comsat Pay-tv time purchase scheme
US4866769A (en) 1987-08-05 1989-09-12 Ibm Corporation Hardware assist for protecting PC software
US5206951A (en) 1987-08-21 1993-04-27 Wang Laboratories, Inc. Integration of data between typed objects by mutual, direct invocation between object managers corresponding to object types
US4999806A (en) 1987-09-04 1991-03-12 Fred Chernow Software distribution system
JPH01502861A (en) 1987-09-04 1989-09-28 ディジタル イクイプメント コーポレーション Session control within circuitry for digital processing systems supporting multiple transfer protocols
US5005122A (en) 1987-09-08 1991-04-02 Digital Equipment Corporation Arrangement with cooperating management server node and network service node
DE3888068D1 (en) * 1987-09-30 1994-04-07 Thomson Brandt Gmbh Method and circuit arrangement for recognizing a signal contained in a video signal.
US4864616A (en) 1987-10-15 1989-09-05 Micronyx, Inc. Cryptographic labeling of electronically stored data
US5390297A (en) 1987-11-10 1995-02-14 Auto-Trol Technology Corporation System for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US4975878A (en) 1988-01-28 1990-12-04 National Semiconductor Programmable memory data protection scheme
DE3803982A1 (en) 1988-02-10 1990-01-25 Igor Groza Data carrier with duplication prevention
US5214702A (en) 1988-02-12 1993-05-25 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5005200A (en) 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US4868877A (en) 1988-02-12 1989-09-19 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US4937863A (en) 1988-03-07 1990-06-26 Digital Equipment Corporation Software licensing management system
JP2635087B2 (en) 1988-03-25 1997-07-30 株式会社日立製作所 Process control method
GB8809346D0 (en) 1988-04-20 1988-05-25 Emi Plc Thorn Improvements relating to marked recorded signals
US5113518A (en) 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
US4924378A (en) 1988-06-13 1990-05-08 Prime Computer, Inc. License mangagement system and license storage key
US5191573A (en) 1988-06-13 1993-03-02 Hair Arthur R Method for transmitting a desired digital video or audio signal
US5185717A (en) 1988-08-05 1993-02-09 Ryoichi Mori Tamper resistant module having logical elements arranged in multiple layers on the outer surface of a substrate to protect stored information
US5247575A (en) 1988-08-16 1993-09-21 Sprague Peter J Information distribution system
US5111390A (en) 1988-08-22 1992-05-05 Unisys Corporation Software security system for maintaining integrity of compiled object code by restricting users ability to define compilers
US5023907A (en) 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
US4953209A (en) 1988-10-31 1990-08-28 International Business Machines Corp. Self-verifying receipt and acceptance system for electronically delivered data objects
US4949187A (en) 1988-12-16 1990-08-14 Cohen Jason M Video communications system having a remotely controlled central source of video and audio data
US4919545A (en) 1988-12-22 1990-04-24 Gte Laboratories Incorporated Distributed security procedure for intelligent networks
US4962533A (en) 1989-02-17 1990-10-09 Texas Instrument Incorporated Data protection for computer systems
US4941175A (en) 1989-02-24 1990-07-10 International Business Machines Corporation Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations
EP0383985A1 (en) 1989-02-24 1990-08-29 Claus Peter Prof. Dr. Schnorr Method for subscriber identification and for generation and verification of electronic signatures in a data exchange system
US5065429A (en) 1989-04-03 1991-11-12 Lang Gerald S Method and apparatus for protecting material on storage media
US5325524A (en) 1989-04-06 1994-06-28 Digital Equipment Corporation Locating mobile objects in a distributed computer system
US5199066A (en) 1989-04-18 1993-03-30 Special Effects Software, Inc. Method and apparatus for protecting software
US5227797A (en) 1989-04-25 1993-07-13 Murphy Quentin M Radar tomography
CA2053261A1 (en) 1989-04-28 1990-10-29 Gary D. Hornbuckle Method and apparatus for remotely controlling and monitoring the use of computer software
AU641397B2 (en) 1989-04-28 1993-09-23 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
DE69031191T2 (en) 1989-05-15 1998-02-12 Ibm System for controlling access privileges
US5075847A (en) 1989-05-26 1991-12-24 Hewlett-Packard Company Method and apparatus for computer program encapsulation
US5442645A (en) 1989-06-06 1995-08-15 Bull Cp8 Method for checking the integrity of a program or data, and apparatus for implementing this method
US5129084A (en) 1989-06-29 1992-07-07 Digital Equipment Corporation Object container transfer system and method in an object based computer operating system
US5347579A (en) 1989-07-05 1994-09-13 Blandford Robert R Personal computer diary
US5187787B1 (en) 1989-07-27 1996-05-07 Teknekron Software Systems Inc Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US5257369A (en) 1990-10-22 1993-10-26 Skeen Marion D Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US5557798A (en) 1989-07-27 1996-09-17 Tibco, Inc. Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US6044205A (en) 1996-02-29 2000-03-28 Intermind Corporation Communications system for transferring information between memories according to processes transferred with the information
US5126936A (en) 1989-09-01 1992-06-30 Champion Securities Goal-directed financial asset management system
US5027397A (en) 1989-09-12 1991-06-25 International Business Machines Corporation Data protection by detection of intrusion into electronic assemblies
US5138712A (en) 1989-10-02 1992-08-11 Sun Microsystems, Inc. Apparatus and method for licensing software on a network of computers
US5148481A (en) 1989-10-06 1992-09-15 International Business Machines Corporation Transaction system security method and apparatus
US5048085A (en) 1989-10-06 1991-09-10 International Business Machines Corporation Transaction system security method and apparatus
US5001752A (en) 1989-10-13 1991-03-19 Fischer Addison M Public/key date-time notary facility
US5136643A (en) 1989-10-13 1992-08-04 Fischer Addison M Public/key date-time notary facility
US5241671C1 (en) 1989-10-26 2002-07-02 Encyclopaedia Britannica Educa Multimedia search system using a plurality of entry path means which indicate interrelatedness of information
US5201047A (en) 1989-12-21 1993-04-06 International Business Machines Corporation Attribute-based classification and retrieval system
US5163091A (en) 1990-01-29 1992-11-10 Graziano James M Knowledge based system for document authentication (apparatus)
US5218605A (en) 1990-01-31 1993-06-08 Hewlett-Packard Company Software modules for testing computer hardware and software
US5251294A (en) 1990-02-07 1993-10-05 Abelow Daniel H Accessing, assembling, and using bodies of information
US5263165A (en) 1990-02-15 1993-11-16 International Business Machines Corporation System for providing user access control within a distributed data processing system having multiple resource managers
US5263158A (en) 1990-02-15 1993-11-16 International Business Machines Corporation Method and system for variable authority level user access control in a distributed data processing system having multiple resource manager
US5263157A (en) 1990-02-15 1993-11-16 International Business Machines Corporation Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles
US5119493A (en) 1990-02-23 1992-06-02 International Business Machines Corporation System for recording at least one selected activity from a selected resource object within a distributed data processing system
DE69031758T2 (en) 1990-04-13 1998-05-28 Koninkl Philips Electronics Nv Process for organizing and accessing product descriptive data in connection with a technical process
US5022080A (en) 1990-04-16 1991-06-04 Durst Robert T Electronic notary
FR2662007B1 (en) 1990-05-10 1992-07-10 Bull Sa PROCESS FOR OBTAINING A SECURE CLEAR ATTESTATION IN A DISTRIBUTED COMPUTER SYSTEM ENVIRONMENT.
EP0456386B1 (en) 1990-05-11 1998-11-11 International Computers Limited Access control in a distributed computer system
EP0459046A1 (en) 1990-05-31 1991-12-04 International Business Machines Corporation Computer software protection
NL9001368A (en) 1990-06-15 1992-01-02 Tel Developments B V SECURITY OF OBJECTS OR DOCUMENTS.
US5050212A (en) 1990-06-20 1991-09-17 Apple Computer, Inc. Method and apparatus for verifying the integrity of a file stored separately from a computer
US5201046A (en) 1990-06-22 1993-04-06 Xidak, Inc. Relational database management system and method for storing, retrieving and modifying directed graph data structures
US5032979A (en) 1990-06-22 1991-07-16 International Business Machines Corporation Distributed security auditing subsystem for an operating system
US5103459B1 (en) 1990-06-25 1999-07-06 Qualcomm Inc System and method for generating signal waveforms in a cdma cellular telephone system
US5091966A (en) 1990-07-31 1992-02-25 Xerox Corporation Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes
US5128525A (en) 1990-07-31 1992-07-07 Xerox Corporation Convolution filtering for decoding self-clocking glyph shape codes
CA2044404C (en) 1990-07-31 1998-06-23 Dan S. Bloomberg Self-clocking glyph shape codes
US5168147A (en) 1990-07-31 1992-12-01 Xerox Corporation Binary image processing for decoding self-clocking glyph shape codes
US5136647A (en) 1990-08-02 1992-08-04 Bell Communications Research, Inc. Method for secure time-stamping of digital documents
US5136646A (en) 1991-03-08 1992-08-04 Bell Communications Research, Inc. Digital document time-stamping with catenate certificate
US5058162A (en) 1990-08-09 1991-10-15 Hewlett-Packard Company Method of distributing computer data files
US5251304A (en) 1990-09-28 1993-10-05 Motorola, Inc. Integrated circuit microcontroller with on-chip memory and external bus interface and programmable mechanism for securing the contents of on-chip memory
US5224163A (en) 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5103476A (en) 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
US5222134A (en) 1990-11-07 1993-06-22 Tau Systems Corporation Secure system for activating personal computer software at remote locations
US5758152A (en) 1990-12-06 1998-05-26 Prime Arithmetics, Inc. Method and apparatus for the generation and manipulation of data structures
US5504818A (en) 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
DE69228350T2 (en) 1991-05-08 1999-09-23 Digital Equipment Corp., Maynard ADMINISTRATIVE INTERFACE AND FORMAT FOR LICENSE MANAGEMENT SYSTEM
US5237614A (en) 1991-06-07 1993-08-17 Security Dynamics Technologies, Inc. Integrated network security system
FR2678121B1 (en) 1991-06-18 1994-04-29 Matra Communication DEVICE FOR INSERTING DIGITAL PACKETS IN A TRANSMISSION CHANNEL.
US5438508A (en) 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system
US5319785A (en) 1991-06-28 1994-06-07 Digital Equipment Corporation Polling of I/O device status comparison performed in the polled I/O device
US5260999A (en) 1991-06-28 1993-11-09 Digital Equipment Corporation Filters in license management system
US5204897A (en) 1991-06-28 1993-04-20 Digital Equipment Corporation Management interface for license management system
US5940504A (en) 1991-07-01 1999-08-17 Infologic Software, Inc. Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site
US5577209A (en) 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5383113A (en) 1991-07-25 1995-01-17 Checkfree Corporation System and method for electronically providing customer services including payment of bills, financial analysis and loans
US5367621A (en) 1991-09-06 1994-11-22 International Business Machines Corporation Data processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated
US5301326A (en) 1991-09-24 1994-04-05 Microsoft Corporation Method and system for controlling the execution of an application program
US5355474A (en) 1991-09-27 1994-10-11 Thuraisngham Bhavani M System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification
FR2681997A1 (en) 1991-09-30 1993-04-02 Arbitron Cy METHOD AND DEVICE FOR AUTOMATICALLY IDENTIFYING A PROGRAM COMPRISING A SOUND SIGNAL
JP3065738B2 (en) 1991-10-11 2000-07-17 株式会社東芝 Computer system
GB9121995D0 (en) 1991-10-16 1991-11-27 Jonhig Ltd Value transfer system
US5265164A (en) 1991-10-31 1993-11-23 International Business Machines Corporation Cryptographic facility environment backup/restore and replication in a public key cryptosystem
US5164988A (en) 1991-10-31 1992-11-17 International Business Machines Corporation Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
US5453601A (en) 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5557518A (en) 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
US5455861A (en) 1991-12-09 1995-10-03 At&T Corp. Secure telecommunications
US5150407A (en) 1991-12-16 1992-09-22 Chan Steve S C Secured data storage devices
US5276901A (en) 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user
GB9126779D0 (en) 1991-12-17 1992-02-12 Int Computers Ltd Security mechanism for a computer system
US5319735A (en) 1991-12-17 1994-06-07 Bolt Beranek And Newman Inc. Embedded signalling
US5359721A (en) 1991-12-18 1994-10-25 Sun Microsystems, Inc. Non-supervisor mode cross address space dynamic linking
US5245165A (en) 1991-12-27 1993-09-14 Xerox Corporation Self-clocking glyph code for encoding dual bit digital values robustly
US5221833A (en) 1991-12-27 1993-06-22 Xerox Corporation Methods and means for reducing bit error rates in reading self-clocking glyph codes
US5199074A (en) 1992-01-06 1993-03-30 Advanced Micro Devices, Inc. Encryption system
US5231568A (en) 1992-01-16 1993-07-27 Impact Telemedia, Inc. Promotional game method and apparatus therefor
WO2004077300A1 (en) 1992-01-22 2004-09-10 Yoshimasa Kadooka Ic memory card and protection therefor
US5335169A (en) 1992-01-27 1994-08-02 Dsi Of Hawaii, Inc. System for tracking multiple rate assessments on transactions
US5521815A (en) 1992-01-31 1996-05-28 K.L.E. Irrevocable Trust Uniform system for verifying and tracking articles of value
JP2942837B2 (en) 1992-01-31 1999-08-30 株式会社セガ・エンタープライゼス Security check method, game device, and information storage medium used for them
US5301231A (en) 1992-02-12 1994-04-05 International Business Machines Corporation User defined function facility
GB2264796A (en) 1992-03-02 1993-09-08 Ibm Distributed transaction processing
CA2093094C (en) 1992-04-06 2000-07-11 Addison M. Fischer Method and apparatus for creating, supporting, and using travelling programs
US5291598A (en) 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
US5392390A (en) 1992-04-10 1995-02-21 Intellilink Corp. Method for mapping, translating, and dynamically reconciling data between disparate computer platforms
US5276735A (en) 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
JP2659896B2 (en) 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
US5421006A (en) 1992-05-07 1995-05-30 Compaq Computer Corp. Method and apparatus for assessing integrity of computer system software
ES2128393T3 (en) 1992-05-15 1999-05-16 Addison M Fischer METHOD AND APPARATUS FOR COMPUTER SYSTEMS WITH INFORMATION DATA STRUCTURES FOR AUTHORIZATION PROGRAMS.
US5412717A (en) 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
WO1993025038A1 (en) 1992-05-29 1993-12-09 Ecole Polytechnique Federale De Lausanne (Epfl) Method for the marking of documents
EP0581421B1 (en) 1992-07-20 2003-01-15 Compaq Computer Corporation Method and system for certificate based alias detection
US5235642A (en) 1992-07-21 1993-08-10 Digital Equipment Corporation Access control subsystem and method for distributed computer system using locally cached authentication credentials
US5285494A (en) 1992-07-31 1994-02-08 Pactel Corporation Network management system
US5721788A (en) 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
US5361359A (en) 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
AU678985B2 (en) 1992-09-21 1997-06-19 Uniloc Corporation Pty Limited System for software registration
JP3084969B2 (en) 1992-10-16 2000-09-04 松下電器産業株式会社 Playback device, recording device, cased recording medium, and recording medium initialization device
US5319705A (en) 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5535322A (en) 1992-10-27 1996-07-09 International Business Machines Corporation Data processing system with improved work flow system and method
GB2295947B (en) 1992-10-27 1997-08-13 Mitsubishi Corp Pay broadcasting system
US5343526A (en) 1992-10-30 1994-08-30 At&T Bell Laboratories Method for establishing licensor changeable limits on software usage
US5349642A (en) 1992-11-03 1994-09-20 Novell, Inc. Method and apparatus for authentication of client server communication
US5432928A (en) 1992-11-10 1995-07-11 Microsoft Corporation Updating objects stored in a permanent container while preserving logical contiguity
EP0820008A3 (en) 1992-12-01 2006-05-24 Microsoft Corporation A method and system for in-place interaction with embedded objects
US5341429A (en) 1992-12-04 1994-08-23 Testdrive Corporation Transformation of ephemeral material
US5509070A (en) 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5373561A (en) 1992-12-21 1994-12-13 Bell Communications Research, Inc. Method of extending the validity of a cryptographic certificate
US5497491A (en) 1993-01-26 1996-03-05 International Business Machines Corporation System and method for importing and exporting data between an object oriented computing environment and an external computing environment
US5369707A (en) 1993-01-27 1994-11-29 Tecsec Incorporated Secure network method and apparatus
US5351293A (en) 1993-02-01 1994-09-27 Wave Systems Corp. System method and apparatus for authenticating an encrypted signal
US5390330A (en) 1993-02-11 1995-02-14 Talati; Kirit K. Control system and method for direct execution of software application information models without code generation
US5640546A (en) 1993-02-23 1997-06-17 Network Programs, Inc. Composition of systems of objects by interlocking coordination, projection, and distribution
US5365587A (en) 1993-03-11 1994-11-15 International Business Machines Corporation Self modifying access code for altering capabilities
US5315448A (en) 1993-03-18 1994-05-24 Macrovision Corporation Copy protection for hybrid digital video tape recording and unprotected source material
FR2703800B1 (en) 1993-04-06 1995-05-24 Bull Cp8 Method for signing a computer file, and device for implementing it.
US5408501A (en) 1993-04-06 1995-04-18 Conner Peripherals, Inc. Data transfer system
JP3255754B2 (en) 1993-04-23 2002-02-12 富士通株式会社 Electronic trading system
US5422953A (en) 1993-05-05 1995-06-06 Fischer; Addison M. Personal date/time notary device
US5504837A (en) 1993-05-10 1996-04-02 Bell Communications Research, Inc. Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes
US5649099A (en) 1993-06-04 1997-07-15 Xerox Corporation Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
US5337357A (en) 1993-06-17 1994-08-09 Software Security, Inc. Method of software distribution protection
US5428606A (en) 1993-06-30 1995-06-27 Moskowitz; Scott A. Digital information commodities exchange
US5550971A (en) 1993-06-30 1996-08-27 U S West Technologies, Inc. Method and system for generating a user interface adaptable to various database management systems
US5603031A (en) 1993-07-08 1997-02-11 General Magic, Inc. System and method for distributed computation based upon the movement, execution, and interaction of processes in a network
US5418713A (en) 1993-08-05 1995-05-23 Allen; Richard Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials
AU683038B2 (en) 1993-08-10 1997-10-30 Addison M. Fischer A method for operating computers and for processing information among computers
US5458494A (en) 1993-08-23 1995-10-17 Edutech Research Labs, Ltd. Remotely operable teaching system and method therefor
IL110891A (en) 1993-09-14 1999-03-12 Spyrus System and method for data access control
JPH07175868A (en) 1993-10-15 1995-07-14 Internatl Business Mach Corp <Ibm> Method and system for output of digital information to medium
US5369702A (en) 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
CA2129075C (en) 1993-10-18 1999-04-20 Joseph J. Daniele Electronic copyright royalty accounting system using glyphs
US5432851A (en) 1993-10-21 1995-07-11 Tecsec Incorporated Personal computer access control system
US6135646A (en) 1993-10-22 2000-10-24 Corporation For National Research Initiatives System for uniquely and persistently identifying, managing, and tracking digital objects
US5343527A (en) 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components
US5463565A (en) 1993-10-29 1995-10-31 Time Warner Entertainment Co., L.P. Data block format for software carrier and player therefor
JPH07212712A (en) 1993-10-29 1995-08-11 Eastman Kodak Co Method and equipment for adding and deleting digital watermark in hierarchical picture memory and fetch system
US5455953A (en) 1993-11-03 1995-10-03 Wang Laboratories, Inc. Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket
US5537526A (en) 1993-11-12 1996-07-16 Taugent, Inc. Method and apparatus for processing a display document utilizing a system level document framework
US5625690A (en) 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5832119C1 (en) * 1993-11-18 2002-03-05 Digimarc Corp Methods for controlling systems using control signals embedded in empirical data
US5710834A (en) 1995-05-08 1998-01-20 Digimarc Corporation Method and apparatus responsive to a code signal conveyed through a graphic image
US5748783A (en) 1995-05-08 1998-05-05 Digimarc Corporation Method and apparatus for robust information coding
US5862260A (en) * 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US5748763A (en) 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
US5768426A (en) 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US5636292C1 (en) 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5572673A (en) 1993-12-01 1996-11-05 Sybase, Inc. Secure multi-level system for executing stored procedures
WO1995016971A1 (en) 1993-12-16 1995-06-22 Open Market, Inc. Digital active advertising
US6086706A (en) 1993-12-20 2000-07-11 Lucent Technologies Inc. Document copying deterrent method
US5491800A (en) 1993-12-20 1996-02-13 Taligent, Inc. Object-oriented remote procedure call networking system
US5449896A (en) 1993-12-22 1995-09-12 Xerox Corporation Random access techniques for use with self-clocking glyph codes
US5453605A (en) 1993-12-22 1995-09-26 Xerox Corporation Global addressability for self-clocking glyph codes
US5449895A (en) 1993-12-22 1995-09-12 Xerox Corporation Explicit synchronization for self-clocking glyph codes
US5473687A (en) 1993-12-29 1995-12-05 Infosafe Systems, Inc. Method for retrieving secure information from a database
US5513261A (en) 1993-12-29 1996-04-30 At&T Corp. Key management scheme for use with electronic cards
US5450493A (en) 1993-12-29 1995-09-12 At&T Corp. Secure communication method and apparatus
US5457747A (en) 1994-01-14 1995-10-10 Drexler Technology Corporation Anti-fraud verification system using a data card
US5420927B1 (en) 1994-02-01 1997-02-04 Silvio Micali Method for certifying public keys in a digital signature scheme
US5422645A (en) 1994-02-14 1995-06-06 The United States Of America As Represented By The Secretary Of The Army Delayed laser retroreflector pulse technique and system
US5394469A (en) 1994-02-18 1995-02-28 Infosafe Systems, Inc. Method and apparatus for retrieving secure information from mass storage media
US5530752A (en) 1994-02-22 1996-06-25 Convex Computer Corporation Systems and methods for protecting software from unlicensed copying and use
JP2853727B2 (en) 1994-02-22 1999-02-03 日本ビクター株式会社 Reproduction protection method and protection reproduction device
WO1995023411A1 (en) 1994-02-28 1995-08-31 Sony Corporation Method and device for recording data, data recording medium, and method and device for reproducing data
US5499298A (en) 1994-03-17 1996-03-12 National University Of Singapore Controlled dissemination of digital information
CA2185990C (en) 1994-03-21 2002-07-23 Kirk M. Scott Document proxy framework
US5450490A (en) 1994-03-31 1995-09-12 The Arbitron Company Apparatus and methods for including codes in audio signals and decoding
DE4413451A1 (en) 1994-04-18 1995-12-14 Rolf Brugger Device for the distribution of music information in digital form
US5505461A (en) 1994-04-19 1996-04-09 Caesars World, Inc. Method for meeting IRS reporting requirements related to an electronic gaming machine
US5563946A (en) 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
US5644686A (en) 1994-04-29 1997-07-01 International Business Machines Corporation Expert system and method employing hierarchical knowledge base, and interactive multimedia/hypermedia applications
US5473692A (en) 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
US5539828A (en) 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
US5724425A (en) 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
US5533123A (en) 1994-06-28 1996-07-02 National Semiconductor Corporation Programmable distributed personal security
US5999711A (en) 1994-07-18 1999-12-07 Microsoft Corporation Method and system for providing certificates holding authentication and authorization information for users/machines
CA2128587A1 (en) 1994-07-21 1996-01-22 Ed Morson Method and arrangement for recognition of a coded transmitted signal
DE69534757T2 (en) 1994-09-15 2006-08-31 International Business Machines Corp. System and method for secure storage and distribution of data using digital signatures
US5606609A (en) 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
WO1996009585A1 (en) 1994-09-21 1996-03-28 Wang Laboratories, Inc. A link manager for managing links integrating data between application programs
US5504757A (en) 1994-09-27 1996-04-02 International Business Machines Corporation Method for selecting transmission speeds for transmitting data packets over a serial bus
US5678170A (en) 1994-10-05 1997-10-14 Motorola, Inc. Method and apparatus for monitoring and limiting distribution of data
US5842173A (en) 1994-10-14 1998-11-24 Strum; David P. Computer-based surgical services management system
ZA958446B (en) 1994-10-19 1996-05-27 Intergame A method and system for cashless gaming machine operation
US5715314A (en) 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US5717923A (en) 1994-11-03 1998-02-10 Intel Corporation Method and apparatus for dynamically customizing electronic information to individual end users
US5629980A (en) 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5638443A (en) 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5715403A (en) 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US5634012A (en) 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
KR100332743B1 (en) 1994-11-26 2002-11-07 엘지전자주식회사 Device and method for preventing illegal copy or unauthorized watching of digital image
US5553282A (en) 1994-12-09 1996-09-03 Taligent, Inc. Software project history database and method of operation
US5655077A (en) 1994-12-13 1997-08-05 Microsoft Corporation Method and system for authenticating access to heterogeneous computing services
EP0717337B1 (en) 1994-12-13 2001-08-01 International Business Machines Corporation Method and system for the secured distribution of programs
US5802590A (en) 1994-12-13 1998-09-01 Microsoft Corporation Method and system for providing secure access to computer resources
US5646997A (en) 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
US7362775B1 (en) 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US5745569A (en) * 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
US5692180A (en) 1995-01-31 1997-11-25 International Business Machines Corporation Object-oriented cell directory database for a distributed computing environment
SE504085C2 (en) 1995-02-01 1996-11-04 Greg Benson Methods and systems for managing data objects in accordance with predetermined conditions for users
JPH08214281A (en) 1995-02-06 1996-08-20 Sony Corp Charging method and system
US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US7069451B1 (en) 1995-02-13 2006-06-27 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7095854B1 (en) 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7165174B1 (en) 1995-02-13 2007-01-16 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
CN100365535C (en) 1995-02-13 2008-01-30 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US7124302B2 (en) 1995-02-13 2006-10-17 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5530235A (en) 1995-02-16 1996-06-25 Xerox Corporation Interactive contents revealing storage device
US5774452A (en) * 1995-03-14 1998-06-30 Aris Technologies, Inc. Apparatus and method for encoding and decoding information in audio signals
US5774872A (en) 1995-03-31 1998-06-30 Richard Golden Automated taxable transaction reporting/collection system
US5534975A (en) 1995-05-26 1996-07-09 Xerox Corporation Document processing system utilizing document service cards to provide document processing services
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US5740549A (en) 1995-06-12 1998-04-14 Pointcast, Inc. Information and advertising distribution system and method
US5592549A (en) 1995-06-15 1997-01-07 Infosafe Systems, Inc. Method and apparatus for retrieving selected information from a secure information source
US5699427A (en) 1995-06-23 1997-12-16 International Business Machines Corporation Method to deter document and intellectual property piracy through individualization
US5689565A (en) 1995-06-29 1997-11-18 Microsoft Corporation Cryptography system and method for providing cryptographic services for a computer application
US5625693A (en) 1995-07-07 1997-04-29 Thomson Consumer Electronics, Inc. Apparatus and method for authenticating transmitting applications in an interactive TV system
US5878421A (en) 1995-07-17 1999-03-02 Microsoft Corporation Information map
JPH0944993A (en) * 1995-07-31 1997-02-14 Pioneer Electron Corp Information recording method and device therefor, function recording method and device therefor and information reproducing method and device therefor
JP4518574B2 (en) * 1995-08-11 2010-08-04 ソニー株式会社 Recording method and apparatus, recording medium, and reproducing method and apparatus
JP2904066B2 (en) 1995-08-31 1999-06-14 松下電器産業株式会社 Temperature sensor and method of manufacturing the same
KR0166923B1 (en) 1995-09-18 1999-03-20 구자홍 Method and apparatus of preventing an illegal watching and copying in a digital broadcasting system
US6047103A (en) 1995-10-09 2000-04-04 Matsushita Electric Industrial Co., Ltd. Data transmitter, data transmitting method, data receiver, information processor, and information recording medium
US5765152A (en) 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5689566A (en) 1995-10-24 1997-11-18 Nguyen; Minhtam C. Network with secure communications sessions
US5757914A (en) 1995-10-26 1998-05-26 Sun Microsystems, Inc. System and method for protecting use of dynamically linked executable modules
US5732398A (en) 1995-11-09 1998-03-24 Keyosk Corp. Self-service system for selling travel-related services or products
US5671279A (en) 1995-11-13 1997-09-23 Netscape Communications Corporation Electronic commerce using a secure courier system
JPH09160899A (en) 1995-12-06 1997-06-20 Matsushita Electric Ind Co Ltd Information service processor
US5692047A (en) 1995-12-08 1997-11-25 Sun Microsystems, Inc. System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
US5633932A (en) 1995-12-19 1997-05-27 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node
US5822432A (en) * 1996-01-17 1998-10-13 The Dice Company Method for human-assisted random key generation and application for digital watermark system
US5754849A (en) 1996-01-30 1998-05-19 Wayfarer Communications, Inc. Self-describing object providing dynamic manipulation of heterogeneous data values and semantic identity between memory and transmission representations
US5689587A (en) 1996-02-09 1997-11-18 Massachusetts Institute Of Technology Method and apparatus for data hiding in images
US5896454A (en) * 1996-03-08 1999-04-20 Time Warner Entertainment Co., L.P. System and method for controlling copying and playing of digital programs
JP3816571B2 (en) 1996-03-15 2006-08-30 パイオニア株式会社 Information recording apparatus, information recording method, information reproducing apparatus, and information reproducing method
US5991876A (en) 1996-04-01 1999-11-23 Copyright Clearance Center, Inc. Electronic rights management and authorization system
US6085238A (en) 1996-04-23 2000-07-04 Matsushita Electric Works, Ltd. Virtual LAN system
US5978484A (en) 1996-04-25 1999-11-02 Microsoft Corporation System and method for safety distributing executable objects
US5892899A (en) 1996-06-13 1999-04-06 Intel Corporation Tamper resistant methods and apparatus
US5889868A (en) * 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US5819263A (en) 1996-07-19 1998-10-06 American Express Financial Corporation Financial planning system incorporating relationship and group management
US6102965A (en) 1996-09-23 2000-08-15 National Instruments Corporation System and method for providing client/server access to graphical programs
US5832529A (en) 1996-10-11 1998-11-03 Sun Microsystems, Inc. Methods, apparatus, and product for distributed garbage collection
US5692980A (en) 1996-10-24 1997-12-02 Trotman; Stephenson E. Kick bag game and apparatus kit
US7062500B1 (en) 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
US5920861A (en) 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US5999949A (en) 1997-03-14 1999-12-07 Crandall; Gary E. Text file compression system utilizing word terminators
WO1999001815A1 (en) 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
DE19726027C2 (en) 1997-06-19 1999-05-06 Memminger Iro Gmbh Thread delivery device and coupling device
US6330549B1 (en) 1997-10-30 2001-12-11 Xerox Corporation Protected shareware
US6112181A (en) 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US7092914B1 (en) 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US7809138B2 (en) 1999-03-16 2010-10-05 Intertrust Technologies Corporation Methods and apparatus for persistent control and protection of content
US6477559B1 (en) 1998-08-21 2002-11-05 Aspect Communications Corporation Method and apparatus for remotely accessing an automatic transaction processing system
US6393484B1 (en) 1999-04-12 2002-05-21 International Business Machines Corp. System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks
US6785815B1 (en) 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques
US6959384B1 (en) 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data
AU6750700A (en) 1999-07-30 2001-02-19 Intertrust Technologies Corp. Methods and systems for transaction record delivery using thresholds and multi-stage protocol
US6832316B1 (en) 1999-12-22 2004-12-14 Intertrust Technologies, Corp. Systems and methods for protecting data secrecy and integrity
US7085839B1 (en) 2000-04-07 2006-08-01 Intertrust Technologies Corporation Network content management
US6973499B1 (en) 2000-04-07 2005-12-06 Intertrust Technologies Corp. Ticketing and keying for orchestrating distribution of network content
US7313692B2 (en) 2000-05-19 2007-12-25 Intertrust Technologies Corp. Trust management systems and methods
US7050586B1 (en) 2000-06-19 2006-05-23 Intertrust Technologies Corporation Systems and methods for retrofitting electronic appliances to accept different content formats
US7580988B2 (en) 2001-04-05 2009-08-25 Intertrust Technologies Corporation System and methods for managing the distribution of electronic content
US7136840B2 (en) 2001-04-20 2006-11-14 Intertrust Technologies Corp. Systems and methods for conducting transactions and communications using a trusted third party
US7581103B2 (en) 2001-06-13 2009-08-25 Intertrust Technologies Corporation Software self-checking systems and methods
US7149899B2 (en) 2002-04-25 2006-12-12 Intertrust Technologies Corp. Establishing a secure channel with a human user
US7383570B2 (en) 2002-04-25 2008-06-03 Intertrust Technologies, Corp. Secure authentication systems and methods
EP2280524A3 (en) 2003-06-05 2012-08-08 Intertrust Technologies Corporation Interoperable systems and methods for peer-to-peer service orchestration

Cited By (113)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8391541B2 (en) 1993-11-18 2013-03-05 Digimarc Corporation Steganographic encoding and detecting for video signals
US7035427B2 (en) 1993-11-18 2006-04-25 Digimarc Corporation Method and system for managing, accessing and paying for the use of copyrighted electronic media
US8094949B1 (en) 1994-10-21 2012-01-10 Digimarc Corporation Music methods and systems
US8009893B2 (en) 1995-05-08 2011-08-30 Digimarc Corporation Security document carrying machine readable pattern
US7805500B2 (en) 1995-05-08 2010-09-28 Digimarc Corporation Network linking methods and apparatus
US20100163629A1 (en) * 1995-05-08 2010-07-01 Rhoads Geoffrey B Security Document Carrying Machine Readable Pattern
US8429205B2 (en) 1995-07-27 2013-04-23 Digimarc Corporation Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals
US7006661B2 (en) 1995-07-27 2006-02-28 Digimarc Corp Digital watermarking systems and methods
US7986845B2 (en) 1995-07-27 2011-07-26 Digimarc Corporation Steganographic systems and methods
US20030138127A1 (en) * 1995-07-27 2003-07-24 Miller Marc D. Digital watermarking systems and methods
US8341424B2 (en) 1995-10-13 2012-12-25 Trustees Of Dartmouth College Methods for playing protected content
US7047241B1 (en) 1995-10-13 2006-05-16 Digimarc Corporation System and methods for managing digital creative works
US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US20040210765A1 (en) * 1995-10-13 2004-10-21 Erickson John S. Methods for playing protected content
US7587601B2 (en) 1996-04-25 2009-09-08 Digimarc Corporation Digital watermarking methods and apparatus for use with audio and video content
US20040128514A1 (en) * 1996-04-25 2004-07-01 Rhoads Geoffrey B. Method for increasing the functionality of a media player/recorder device or an application program
US8103879B2 (en) 1996-04-25 2012-01-24 Digimarc Corporation Processing audio or video content with multiple watermark layers
US8769297B2 (en) 1996-04-25 2014-07-01 Digimarc Corporation Method for increasing the functionality of a media player/recorder device or an application program
US7778442B2 (en) 1996-05-16 2010-08-17 Digimarc Corporation Variable message coding protocols for encoding auxiliary data in media signals
US20110081041A1 (en) * 1996-05-16 2011-04-07 Sharma Ravi K Variable Message Coding Protocols For Encoding Auxiliary Data in Media Signals
US20090060264A1 (en) * 1996-05-16 2009-03-05 Sharma Ravi K Variable Message Coding Protocols for Encoding Auxiliary Data in Media Signals
US7412072B2 (en) 1996-05-16 2008-08-12 Digimarc Corporation Variable message coding protocols for encoding auxiliary data in media signals
US8094877B2 (en) 1996-05-16 2012-01-10 Digimarc Corporation Variable message coding protocols for encoding auxiliary data in media signals
US20030033530A1 (en) * 1996-05-16 2003-02-13 Sharma Ravi K. Variable message coding protocols for encoding auxiliary data in media signals
US7751596B2 (en) 1996-11-12 2010-07-06 Digimarc Corporation Methods and arrangements employing digital content items
US7953270B2 (en) 1996-11-12 2011-05-31 Digimarc Corporation Methods and arrangements employing digital content items
US20090125607A1 (en) * 1996-11-12 2009-05-14 Rhoads Geoffrey B Methods and Arrangements Employing Digital Content Items
US7532740B2 (en) 1998-09-25 2009-05-12 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US20010044899A1 (en) * 1998-09-25 2001-11-22 Levy Kenneth L. Transmarking of multimedia signals
US7373513B2 (en) 1998-09-25 2008-05-13 Digimarc Corporation Transmarking of multimedia signals
US20070136597A1 (en) * 1998-09-25 2007-06-14 Levy Kenneth L Methods and Apparatus for Robust Embedded Data
US7055034B1 (en) 1998-09-25 2006-05-30 Digimarc Corporation Method and apparatus for robust embedded data
US8027507B2 (en) 1998-09-25 2011-09-27 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US8611589B2 (en) 1998-09-25 2013-12-17 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US7197156B1 (en) 1998-09-25 2007-03-27 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US8095795B2 (en) * 1998-09-25 2012-01-10 Digimarc Corporation Methods and apparatus for robust embedded data
US8290202B2 (en) 1998-11-03 2012-10-16 Digimarc Corporation Methods utilizing steganography
US7555785B2 (en) 1999-03-10 2009-06-30 Digimarc Corporation Method and apparatus for content management
US6868497B1 (en) 1999-03-10 2005-03-15 Digimarc Corporation Method and apparatus for automatic ID management
US8185967B2 (en) 1999-03-10 2012-05-22 Digimarc Corporation Method and apparatus for content management
US20100169984A1 (en) * 1999-03-10 2010-07-01 Levy Kenneth L Method and apparatus for content management
US8719958B2 (en) 1999-03-10 2014-05-06 Digimarc Corporation Method and apparatus for content management
US20070277247A1 (en) * 1999-03-10 2007-11-29 Levy Kenneth L Method and Apparatus for Content Management
US8095796B2 (en) 1999-05-19 2012-01-10 Digimarc Corporation Content identifiers
US10713340B2 (en) 1999-05-19 2020-07-14 Digimarc Corporation Connected audio and other media objects
US20020032864A1 (en) * 1999-05-19 2002-03-14 Rhoads Geoffrey B. Content identifiers triggering corresponding responses
US7185201B2 (en) 1999-05-19 2007-02-27 Digimarc Corporation Content identifiers triggering corresponding responses
US20020001395A1 (en) * 2000-01-13 2002-01-03 Davis Bruce L. Authenticating metadata and embedding metadata in watermarks of media signals
US7209571B2 (en) 2000-01-13 2007-04-24 Digimarc Corporation Authenticating metadata and embedding metadata in watermarks of media signals
US8121342B2 (en) 2000-01-13 2012-02-21 Digimarc Corporation Associating metadata with media signals, and searching for media signals using metadata
US6829368B2 (en) 2000-01-26 2004-12-07 Digimarc Corporation Establishing and interacting with on-line media collections using identifiers in media signals
US6823075B2 (en) 2000-07-25 2004-11-23 Digimarc Corporation Authentication watermarks for printed objects and related applications
US20060072785A1 (en) * 2000-09-11 2006-04-06 Davidson Clayton L Watermark encoding and decoding
US8055899B2 (en) 2000-12-18 2011-11-08 Digimarc Corporation Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities
US8488836B2 (en) 2000-12-21 2013-07-16 Digimarc Corporation Methods, apparatus and programs for generating and utilizing content signatures
US8542870B2 (en) 2000-12-21 2013-09-24 Digimarc Corporation Methods, apparatus and programs for generating and utilizing content signatures
US7974436B2 (en) 2000-12-21 2011-07-05 Digimarc Corporation Methods, apparatus and programs for generating and utilizing content signatures
US8023773B2 (en) 2000-12-21 2011-09-20 Digimarc Corporation Methods, apparatus and programs for generating and utilizing content signatures
US8077911B2 (en) 2000-12-21 2011-12-13 Digimarc Corporation Methods, apparatus and programs for generating and utilizing content signatures
US20020162118A1 (en) * 2001-01-30 2002-10-31 Levy Kenneth L. Efficient interactive TV
US8140437B2 (en) 2001-03-12 2012-03-20 Lg Electronics Inc. Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
US20080162359A1 (en) * 2001-03-12 2008-07-03 Hyung Sun Kim Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
US20060294015A1 (en) * 2001-03-12 2006-12-28 Kim Hyung S Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
US20060294014A1 (en) * 2001-03-13 2006-12-28 Kim Hyung S Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
US7650311B2 (en) * 2001-03-13 2010-01-19 Lg Electronics Inc. Read-only recording medium containing sample data and reproducing method thereof
US7680740B2 (en) * 2001-03-13 2010-03-16 Lg Electronics Inc. Managing copy protecting information of encrypted data
US20060294010A1 (en) * 2001-03-13 2006-12-28 Kim Hyung S Read-only recording medium containing sample data and reproducing method thereof
US7634447B2 (en) 2001-03-13 2009-12-15 Lg Electronics Inc. Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
US20030105717A1 (en) * 2001-03-13 2003-06-05 Kim Hyung Sun Read-only recording medium containing sample data and reproducing method thereof
US20060294009A1 (en) * 2001-03-13 2006-12-28 Kim Hyung S Read-only recording medium containing sample data and reproducing method thereof
US20080240442A1 (en) * 2001-03-13 2008-10-02 Hyung Sun Kim Managing copy protecting information of encrypted data
US20080222180A1 (en) * 2001-03-13 2008-09-11 Hyung Bun Kim Recording medium containing sample data and reproducing thereof
US7225162B2 (en) * 2001-03-13 2007-05-29 Lg Electronics Inc. Read-only recording medium containing sample data and reproducing method thereof
US7788178B2 (en) 2001-03-13 2010-08-31 Lg Electronics Inc. Recording medium containing sample data and reproducing thereof
US7920702B2 (en) 2001-03-28 2011-04-05 Nds Limited Digital rights management system and method
US20090154697A1 (en) * 2001-03-28 2009-06-18 Nds Limited Digital rights management system and method
US7512986B2 (en) 2001-03-28 2009-03-31 Nds Limited Digital rights management system and method
US8085979B2 (en) 2001-07-05 2011-12-27 Digimarc Corporation Methods employing stored preference data to identify video of interest to a consumer
US8036421B2 (en) 2001-07-05 2011-10-11 Digimarc Corporation Methods employing topical subject criteria in video processing
US20030039464A1 (en) * 2001-07-05 2003-02-27 Davis Bruce L. Watermarking to control video recording
US8122465B2 (en) 2001-07-05 2012-02-21 Digimarc Corporation Watermarking to set video usage permissions
US7263202B2 (en) 2001-07-05 2007-08-28 Digimarc Corporation Watermarking to control video recording
US7778441B2 (en) 2001-07-05 2010-08-17 Digimarc Corporation Methods employing topical subject criteria in video processing
US8032909B2 (en) 2001-07-05 2011-10-04 Digimarc Corporation Watermarking and electronic program guides
US20080008352A1 (en) * 2001-07-05 2008-01-10 Davis Bruce L Methods Employing Topical Subject Criteria in Video Processing
US7697718B2 (en) 2001-07-05 2010-04-13 Digimarc Corporation Methods employing topical subject criteria in video processing
US20030028882A1 (en) * 2001-07-05 2003-02-06 Davis Bruce L. Watermarking and electronic program guides
US20080008351A1 (en) * 2001-07-05 2008-01-10 Davis Bruce L Methods Employing Topical Subject Criteria in Video Processing
WO2003065723A2 (en) * 2002-02-01 2003-08-07 Koninklijke Philips Electronics N.V. Watermark-based access control method and device
JP2005516321A (en) * 2002-02-01 2005-06-02 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Digital watermark based access control method and apparatus
CN100431348C (en) * 2002-02-01 2008-11-05 皇家飞利浦电子股份有限公司 Watermark-based access control method and device
WO2003065723A3 (en) * 2002-02-01 2003-11-13 Koninkl Philips Electronics Nv Watermark-based access control method and device
US7376624B2 (en) 2002-02-27 2008-05-20 Imagineer Software, Inc. Secure communication and real-time watermarking using mutating identifiers
US20060195402A1 (en) * 2002-02-27 2006-08-31 Imagineer Software, Inc. Secure data transmission using undiscoverable or black data
US20060031175A1 (en) * 2002-02-27 2006-02-09 Imagineer Software, Inc. Multiple party content distribution system and method with rights management features
US20030187799A1 (en) * 2002-02-27 2003-10-02 William Sellars Multiple party content distribution system and method with rights management features
US6996544B2 (en) 2002-02-27 2006-02-07 Imagineer Software, Inc. Multiple party content distribution system and method with rights management features
US20060173794A1 (en) * 2002-02-27 2006-08-03 Imagineer Software, Inc. Secure electronic commerce using mutating identifiers
US20050010536A1 (en) * 2002-02-27 2005-01-13 Imagineer Software, Inc. Secure communication and real-time watermarking using mutating identifiers
US7725404B2 (en) 2002-02-27 2010-05-25 Imagineer Software, Inc. Secure electronic commerce using mutating identifiers
US9349411B2 (en) 2002-07-16 2016-05-24 Digimarc Corporation Digital watermarking and fingerprinting applications for copy protection
US20040059933A1 (en) * 2002-07-16 2004-03-25 Levy Kenneth L. Digital watermarking and fingerprinting applications for copy protection
EP1590908A2 (en) * 2003-01-09 2005-11-02 Kaleidescape, Inc. Bookmarks and watchpoints for selection and presentation of media streams
EP1590908A4 (en) * 2003-01-09 2008-05-21 Kaleidescape Inc Bookmarks and watchpoints for selection and presentation of media streams
US8627193B2 (en) 2003-01-09 2014-01-07 Kaleidescape, Inc. Bookmarks and watchpoints for selection and presentation of media streams
US8225194B2 (en) 2003-01-09 2012-07-17 Kaleidescape, Inc. Bookmarks and watchpoints for selection and presentation of media streams
US20040139047A1 (en) * 2003-01-09 2004-07-15 Kaleidescape Bookmarks and watchpoints for selection and presentation of media streams
US7587749B2 (en) 2003-06-02 2009-09-08 Liquid Machines, Inc. Computer method and apparatus for managing data objects in a distributed context
US20050028006A1 (en) * 2003-06-02 2005-02-03 Liquid Machines, Inc. Computer method and apparatus for managing data objects in a distributed context
US20050008163A1 (en) * 2003-06-02 2005-01-13 Liquid Machines, Inc. Computer method and apparatus for securely managing data objects in a distributed context
US9804747B2 (en) 2008-09-30 2017-10-31 Microsoft Technology Licensing, Llc Techniques to manage access to organizational information of an entity
US10943030B2 (en) 2008-12-15 2021-03-09 Ibailbonding.Com Securable independent electronic document
US10257177B2 (en) 2014-09-01 2019-04-09 Samsung Electronics Co., Ltd Electronic device and method for managing re-enrollment

Also Published As

Publication number Publication date
US20090113200A1 (en) 2009-04-30
US8307212B2 (en) 2012-11-06
US20130298249A1 (en) 2013-11-07
US5943422A (en) 1999-08-24
AU3681697A (en) 1998-02-19
US20060120525A1 (en) 2006-06-08
US6618484B2 (en) 2003-09-09
AU739300B2 (en) 2001-10-11
US6240185B1 (en) 2001-05-29
US6449367B2 (en) 2002-09-10
US20030002673A1 (en) 2003-01-02

Similar Documents

Publication Publication Date Title
US8307212B2 (en) Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6530021B1 (en) Method and system for preventing unauthorized playback of broadcasted digital data streams
JP4491069B2 (en) Time shift limited access
US6523113B1 (en) Method and apparatus for copy protection
Eskicioglu et al. An overview of multimedia content protection in consumer electronics devices
US7336784B2 (en) Multimedia decoder method and system with authentication and enhanced digital rights management (DRM) where each received signal is unique and where the missing signal is cached inside the storage memory of each receiver
US6222924B1 (en) Scrambling of digital media objects in connection with transmission and storage
EP0899688B1 (en) Generating, detecting, recording, and reproducing a watermarked moving image
EP1062812B1 (en) Streaming media player with continuous control and protection of media content
US6985591B2 (en) Method and apparatus for distributing keys for decrypting and re-encrypting publicly distributed media
KR100718598B1 (en) Method of and apparatus for providing secure communication of digital data between devices
JP4810752B2 (en) DATA RECORDING MEDIUM, DATA RECORDING METHOD AND DEVICE, DATA REPRODUCTION METHOD AND DEVICE, DATA TRANSMISSION METHOD AND DEVICE, AND DATA RECEPTION METHOD AND DEVICE
US20030051153A1 (en) Device for reading, recording and restoring digital data in a copy-protection system for said data
US20020083324A1 (en) Information embedding apparatus and method, information processing apparatus and method, content processing apparatus and method, monitoring apparatus and method, and storage media
KR20020075568A (en) Method for controlling transmission and reception of data including ciphered data stream
US7298849B2 (en) Method and apparatus for simultaneous encryption and decryption of publicly distributed media
US9058837B2 (en) Method and apparatus for managing contents
JP2003122938A (en) Material delivery device
Eskicioglu et al. Overview of multimedia content protection in consumer electronics devices
KR100667775B1 (en) Apparatus and Method for reproducing image
WO2004034705A1 (en) System for secure distribution, storage and conditional retrieval of multimedia content
DRM AND CONTENT SECURITY
MXPA00002473A (en) Use of a watermark for the purpose of copy protection

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: ORIGIN FUTURE ENERGY PTY LTD, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:INTERTRUST TECHNOLOGIES CORPORATION;REEL/FRAME:052189/0343

Effective date: 20200313

AS Assignment

Owner name: INTERTRUST TECHNOLOGIES CORPORATION, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:ORIGIN FUTURE ENERGY PTY LTD.;REEL/FRAME:062747/0742

Effective date: 20220908