Systems and Methods for Watermarking Software and Other Media
First Claim
1. A method for watermarking computer code, the method comprising:
- inserting one or more encrypted marks into the computer code, each of the one or more encrypted marks being formed bycreating a copy of a mark;
combining extra information with the copy of the mark to create a modified mark; and
encrypting the modified mark to create one of the one or more encrypted marks.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content'"'"'s source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
-
Citations
10 Claims
-
1. A method for watermarking computer code, the method comprising:
inserting one or more encrypted marks into the computer code, each of the one or more encrypted marks being formed by creating a copy of a mark; combining extra information with the copy of the mark to create a modified mark; and encrypting the modified mark to create one of the one or more encrypted marks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
Specification