Method for combining transfer functions with predetermined key creation
First Claim
1. A method for copy protection of digital information, the digital information including a digital sample and format information, comprising the steps of:
- identifying a portion of the format information to be encoded;
generating encoded format information from the identified portion of the format information; and
generating encoded digital information, including the digital sample and the encoded format information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for combining transfer functions with predetermined key creation. In one embodiment, digital information, including a digital sample and format information, is protected by identifying and encoding a portion of the format information. Encoded digital information, including the digital sample and the encoded format information, is generated to protect the original digital information. In another embodiment, a digital signal, including digital samples in a file format having an inherent granularity, is protected by creating a predetermined key. The predetermined key is comprised of a transfer function-based mask set to manipulate data at the inherent granularity of the file format of the underlying digitized samples.
-
Citations
29 Claims
-
1. A method for copy protection of digital information, the digital information including a digital sample and format information, comprising the steps of:
-
identifying a portion of the format information to be encoded;
generating encoded format information from the identified portion of the format information; and
generating encoded digital information, including the digital sample and the encoded format information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for protecting a digital signal, the digital signal including digital samples in a file format having an inherent granularity, comprising the step of:
creating a predetermined key comprised of a transfer function-based mask set to manipulate data at the inherent granularity of the file format of the underlying digitized samples. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 25)
-
20. A method for protecting a digital signal, the digital signal including digital samples in a file format having an inherent granularity, comprising the steps of:
-
creating a predetermined key comprised of a transfer function-based mask set that can manipulate data at the inherent granularity of the file format of the underlying digitized samples;
authenticating the predetermined key containing the correct transfer function-based mask set during playback of the data; and
metering the playback of the data to monitor content. - View Dependent Claims (21)
-
-
22. A method to prepare for the scrambling of a sample stream of data, comprising the steps of:
-
generating a plurality of mask sets to be used for encoding, including a random primary mask, a random convolution mask and a random start of message delimiter;
obtaining a transfer function to be implemented;
generating a message bit stream to be encoded;
loading the message bit stream, a stega-cipher map truth table, the primary mask, the convolution mask and the start of message delimiter into memory;
initializing the state of a primary mask index, a convolution mask index, and a message bit index; and
setting a message size equal to the total number of bits in the message bit stream.
-
-
23. A method to prepare for the encoding of stega-cipher information into a sample stream of data, comprising the steps of:
-
generating a mask set to be used for encoding, the set including a random primary mask, a random convolution mask, and a random start of message delimiter;
obtaining a message to be encoded;
compressing and encrypting the message if desired;
generating a message bit stream to be encoded;
loading the message bit stream, a stega-cipher map truth table, the primary mask, the convolution mask and the start of message delimiter into memory;
initializing the state of a primary mask index, a convolution mask index, and a message bit index; and
setting the message size equal to the total number of bits in the message bit stream. - View Dependent Claims (24)
-
-
26. A method for copy protection of digital information, the digital information including a digital sample and format information, comprising the steps of:
-
identifying a portion of the digital sample to be encoded;
generating an encoded digital sample from the identified portion of the digital sample; and
generating encoded digital information, including the encoded digital sample and the format information. - View Dependent Claims (27, 28, 29)
-
Specification