System and methods for permitting open access to data objects and for securing data within the data objects
First Claim
1. A method for securing a data object, comprising:
- providing a data object comprising digital data and file format information;
embedding independent data into the data object; and
scrambling the data object to degrade the data object to a predetermined signal quality level.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data. The additional steps of descrambling and decoding may be performed until a predetermined condition is met. The predetermined condition may include, for example, reaching a desired signal quality of the data object.
199 Citations
68 Claims
-
1. A method for securing a data object, comprising:
-
providing a data object comprising digital data and file format information;
embedding independent data into the data object; and
scrambling the data object to degrade the data object to a predetermined signal quality level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 17, 18, 19, 20, 32, 33)
-
-
14. A method for distributing a data signal, comprising:
-
providing a data signal comprising digital data and file format information;
selecting a first scrambling technique to apply to the data signal;
scrambling the data signal using the first scrambling technique, resulting in a first-level degraded data signal;
creating a first descrambling key for the first-level degraded data signal based on the first scrambling technique;
selecting a second scrambling technique to apply to the first-level degraded data signal;
scrambling the first-level degraded data signal using a second scrambling technique, resulting in a second-level degraded data signal; and
creating a second descrambling key for the second-level degraded data signal based on the second scrambling technique.
-
-
21. A method for distributing a data object, comprising:
-
providing a data object comprising digital data and file format information;
encoding independent authentication data into the data object; and
manipulating the file format information based on at least one signal characteristic of the data object. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for distributing data signals, comprising:
-
embedding independent data into a data object;
scrambling the data object;
distributing the scrambled data object;
distributing at least one predetermined key that enables access to the data object; and
descrambling the scrambled data object with the predetermined key. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
-
-
49. A method for data signal distribution comprising:
-
applying a steganographic technique for embedding independent data into the data signal;
applying a scrambling technique selected from the group consisting of file format manipulation and partial encryption; and
generating a predetermined key.
-
-
60. A method for bandwidth allocation, comprising:
-
presenting a plurality of data objects to a user, each data object having a security application;
linking at least a first data object to at least one second data object;
wherein a characteristic of the first data object causes a change in the second data object. - View Dependent Claims (61, 62, 63, 64, 65)
-
-
66. A system for securing data within a data object, comprising:
-
an embedder that embeds independent data into a data object; and
a scrambler that scrambles the data object to degrade the data object to a predetermined signal quality level. - View Dependent Claims (67)
-
-
68. A system for distributing a data signal, comprising:
-
a first selector that selects a first scrambling technique to apply to the data signal;
a first scrambler that scrambles the data signal using the first scrambling technique, resulting in a first-level degraded data signal;
a first key creator that creates a first descrambling key for the first-level degraded data signal based on the first scrambling technique;
a second selector that selects a second scrambling technique to apply to the first-level degraded data signal;
a second scrambler that scrambles the first-level degraded data signal using a second scrambling technique, resulting in a second-level degraded data signal; and
a second key creator that creates a second descrambling key for the second-level degraded data signal based on the second scrambling technique.
-
Specification