Electronic Files Digital Rights Management.
First Claim
1. A method of controlling distribution and use of a digital file, the method comprising:
- defining a database of known file hash signatures;
determining a hash signature for a digital file; and
comparing the said signature with signatures contained in said database to determine if there is a match.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention uses file hash signatures, including but not limited to those generated from MD5, MD2, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 and FIPS 180-2 files, and various file comparison and matching technologies in a real time or near real time solution to determine if digital content has been stolen or otherwise illegally, opened, transferred, viewed, played or copied. Once digital content has been analyzed (match or no match) one or more follow-on actions can be taken with respect to the content based on preferences established by the owner/authorized agent of the digital content. These include blocking the copy or playback process, preventing transferring of files over a network or between systems, notification to one or more users about the theft of illegal use and/or instruction(s) to the unauthorized user. Digital content includes but is not limited to digital audio, digital picture and video, and digital documentation.
60 Citations
110 Claims
-
1. A method of controlling distribution and use of a digital file, the method comprising:
-
defining a database of known file hash signatures;
determining a hash signature for a digital file; and
comparing the said signature with signatures contained in said database to determine if there is a match. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110)
-
-
15. Apparatus for determining and comparing the hash signature of a file, the apparatus comprising:
-
a memory storing a database of known file signatures; and
a data processor arranged to compare said file signatures to determine whether or not the signature matches one of the signatures contained in said database.
-
-
16. A computer memory encoded with executable instructions representing a computer program for causing computer system to:
-
maintain a database of known file signatures; and
determine whether or not a file has a signature matching one of the signatures contained in said database.
-
-
17. A network firewall connected through one or more network interfaces to one or more networks, each of the networks connected to one or more clients, the firewall having one or more memories and one or more central processing units (CPUs) and further comprising:
-
one or more applications executed by one or more of the CPUs, each application using one or more sockets connected to the networks to communicate over the networks; and
one or more rule sets containing one or more rules; and
one or more databases. - View Dependent Claims (18, 19, 20, 21)
-
Specification