Tools and techniques for original digital files
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides tools and techniques for distinguishing a file from any or all copies of the file that may exist. One method ascertains (204) the actual physical location of the file (512) and associates (214) that physical location with the file as the claimed physical location (516) of the file. The file'"'"'s originality status may then be determined (104) by finding (304) the location claim, reading (306) from it the claimed physical location associated with the file, ascertaining (308) the actual physical location of the file, and comparing (310) the locations. If the claimed and actual locations are identical, then the file is the original file it claims to be. If there is disparity between the claimed physical location recited for or by the file and the actual physical location of the file, then it is not the original file it claims to be.
20 Citations
26 Claims
-
1-6. -6. (canceled)
-
7. A method of analyzing authenticity and originality based in part on a physically embedded medium identifier, the method comprising the steps of automatically:
-
obtaining an unmodifiable medium identifier from a computer-readable storage medium in which the unmodifiable medium identifier is physically embedded; reading additional data from the computer-readable storage medium; reading from the computer-readable storage medium a stored hash which is associated with the additional data; calculating a test hash based on at least the additional data and the unmodifiable medium identifier; and comparing the test hash to the stored hash. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of facilitating analysis of authenticity and originality based in part on a physically embedded medium identifier, the method comprising the steps of automatically:
-
physically embedding an unmodifiable medium identifier in a computer-readable storage medium; storing user-designated data in the computer-readable storage medium; calculating a hash based on at least the user-designated data and the unmodifiable medium identifier; and writing the hash to the computer-readable storage medium. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method of analyzing authenticity based in part on one or more physical locations, the method comprising the steps of:
-
a calling program causing a self-extracting executable program to run; the self-extracting executable program attempting to authenticate data by steps which include; reading a claimed physical location identifier associated with the data; ascertaining an actual physical location of the data; comparing the claimed physical location identifier to the actual physical location of the data; and deeming the data authentic only if the claimed physical location identifier associated with the data matches the actual physical location of the data; and the self-extracting executable program attempting to authenticate the calling program by steps which include; reading a claimed physical location identifier associated with the calling program; ascertaining an actual physical location of the calling program; comparing the claimed physical location identifier to the actual physical location of the calling program; and deeming the calling program authentic only if the claimed physical location identifier associated with the calling program matches the actual physical location of the calling program. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification