Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
First Claim
1. A rights management method comprising:
- (a) receiving an information signal;
(b) steganographically decoding the received information signal to recover digital rights management control information packaged within at least one secure digital container; and
(c) performing at least one rights management operation based at least in part on the recovered digital rights management control information.
3 Assignments
0 Petitions
Accused Products
Abstract
Electronic steganographic techniques can be used to encode a rights management control signal onto an information signal carried over an insecure communications channel. Steganographic techniques ensure that the digital control information is substantially invisibly and substantially indelibly carried by the information signal. These techniques can provide end-to-end rights management protection of an information signal irrespective of transformations between analog and digital. An electronic appliance can recover the control information and use it for electronic rights management to provide compatibility with a Virtual Distribution Environment. In one example, the system encodes low data rate pointers within high bandwidth time periods of the content signal to improve overall control information read/seek times.
1615 Citations
348 Claims
-
1. A rights management method comprising:
-
(a) receiving an information signal; (b) steganographically decoding the received information signal to recover digital rights management control information packaged within at least one secure digital container; and (c) performing at least one rights management operation based at least in part on the recovered digital rights management control information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An electronic appliance comprising:
-
decoding means for steganographically decoding a signal to provide control information packaged within at least one secure digital container; and rights management means coupled to the decoding means for performing at least one rights management operation based at least in part on the control information. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An electronic appliance comprising:
-
a steganographic decoder that steganographically decode a signal to provide control information packaged within at least one secure digital container; and rights management component coupled to the decoder, the rights management component performing at least one rights management operation based at least in part on the control information. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A rights management method comprising:
-
(a) receiving a signal comprising governed information and a first rule steganographically incorporated into said signal; (b) steganographically decoding said signal to recover said first rule; and (c) at a first apparatus, performing at least one operation on said governed information, said operation governed, at least in part, by said first rule, said at least one operation comprising at least; identifying at least one attribute of a user or viewer of said governed information, and allowing said user or viewer to gain access to said information based on said identification. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A rights management method comprising:
-
(a) at a first apparatus, receiving a signal comprising governed information and at first rule steganographically incorporated into said signal; (b) at said first apparatus, steganographically decoding said signal to recover said first rule; and (c) at said first apparatus, performing at least one operation on at least a portion of said governed information, said operation governed, at least in part, by said first rule, said at least one operation comprising at least; determining whether said governed information has been accessed or used more than a specified number of times, and allowing access or use of said governed information if said number of accesses or uses is less than or equal to said specified number, or blocking access or use if said number of accesses or uses is greater than said specified number. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 347, 348)
-
-
51. A rights management method, comprising:
-
(a) at a first apparatus, receiving a signal comprising governed information and a first rule steganographically incorporated into said signal, said first rule specifying a time; (b) at said first apparatus, steganographically decoding said signal to recover said first rule; (c) at said first apparatus, attempting to access said governed information; (d) at said first apparatus, checking to determine if said time has been reached or exceeded; and (e) at said first apparatus, allowing said access to complete if said time has not been reached or exceeded, but blocking said access if said time has not been reached. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A rights management method operating at least in part on a first apparatus, said first apparatus including a communications port and means for accessing information on a removable memory device, said method comprising:
-
(a) at said first apparatus, receiving a removable memory device containing a signal, said signal comprising governed information and a first rule steganographically incorporated into said signal, (b) at said first apparatus, steganographically decoding said signal to recover said first rule; (c) at said first apparatus, using said communications port to initiate communication with a second apparatus remote from said first apparatus; (d) at said first apparatus, receiving at least a second rule from said second apparatus; (e) at said first apparatus, using said first rule or said second rule to govern at least one aspect of access to or use of said governed information. - View Dependent Claims (66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79)
-
-
80. A rights management method operating at least in part on a first apparatus, said first apparatus including a communications port and means for accessing information on a removable memory device, said method comprising:
-
(a) at said first apparatus, receiving a removable memory device containing a signal, said signal comprising governed information and a first rule steganographically incorporated into said signal, said first rule requiring that payment be made at a remote site in return for use of or access to at least a portion of said governed information; (b) at said first apparatus, steganographically decoding said signal to recover said first rule; (c) at said first apparatus, initiating at least one access to or use of at least a portion of said governed information; (d) at said first apparatus, initiating communication, through said communications port, with a second apparatus remote from said first apparatus; (e) providing information from said first apparatus to said second apparatus, said information comprising or enabling payment for said at least one access or use. - View Dependent Claims (81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93)
-
-
94. A rights management method comprising:
-
(a) at a first apparatus, receiving a signal comprising governed information and a first rule steganographically incorporated into said signal; (b) at said first apparatus, steganographically decoding said signal to recover said first rule; and (c) at said first apparatus, performing at least one operation on said governed information, said operation governed, at least in part, by said first rule, said at least one operation comprising at least; requiring a payment prior to releasing said information for access by a user or viewer; (d) applying a watermark or fingerprint to at least a portion of said governed information, said application occurring at least in part under the control of at least one rule; and (e) releasing said watermarked or fingerprinted governed information to a second apparatus. - View Dependent Claims (95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106)
-
-
107. A rights management method comprising:
-
(a) at a first apparatus, receiving a signal comprising governed information and an organizational structure incorporated into said signal, said organizational structure including a first rule governing at least one aspect of access to or use of said governed information; said organizational structure comprising a secure container containing said first rule; (b) at said first apparatus, steganographically decoding said signal to recover said organizational structure; (c) at said first apparatus, accessing said first rule; and (d) at said first apparatus, using said first rule to govern at least one aspect of access to or use of said governed information. - View Dependent Claims (108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126)
-
-
127. A rights management method, comprising:
-
(a) at a first apparatus, receiving a signal comprising governed information and at least a first and a second rule steganographically incorporated into said signal, (b) at said first apparatus, determining whether to use said first rule or said second rule to govern at least one operation on said governed information; said determination based, at least in part, on information regarding the nature or identification of said first apparatus; and (c) at said first apparatus, using said first rule or said second rule to govern said at least one operation. - View Dependent Claims (128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140)
-
-
141. A rights management method operating at least in part on a first apparatus, said first apparatus including a communications port, means for accessing information on a removable memory device, and steganographic encoding circuitry said method comprising:
-
(a) at said first apparatus, receiving a removable memory device containing a signal, said signal comprising governed information and a first rule steganographically incorporated into said signal, said first rule requiring that payment be made at a remote site in return for use of or access to at least a portion of said governed information; (b) at said first apparatus, steganographically decoding said signal to recover said first rule; (c) at said first apparatus, initiating at least one access to or use of at least a portion of said governed information; (d) at said first apparatus, making an analog copy of at least a portion of said governed information; and (e) at said first apparatus, steganographically incorporating at least one rule into said analog copy, said rule governing at least one aspect of access to or use of said analog copy. - View Dependent Claims (142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154)
-
-
155. A steganographic encoding method comprising:
-
(a) receiving information; (b) transforming said information into a signal; (c) selecting a first and a second location in said signal for the incorporation of steganographically encoded information, said selection being governed at least in part by an analysis of the bandwidth available at such location for such encoding; (d) steganographically encoding a first rule in said first location, said first rule at least in part governing at least one aspect of use of at least a portion of said information; (e) steganographically encoding a second rule in said second location, said second rule at least in part governing at least one aspect of use of at least a portion of said information. - View Dependent Claims (156, 157, 158, 159)
-
-
160. A rights management method operating at least in part on a first apparatus, said method comprising:
-
(a) receiving a signal comprising governed information and an organizational structure incorporated into said signal, said organizational structure including a pointer to a first rule governing at least one aspect of access to or use of said governed information; (b) steganographically decoding said signal to recover said organizational structure; (c) accessing said pointer; (d) using said pointer to locate said first rule; and (e) using said first rule to govern at least one aspect of access to or use of said governed information. - View Dependent Claims (161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, 181, 182, 183, 184)
-
-
185. A rights management method operating at least in part on a first apparatus, said first apparatus including a communications port, said method comprising:
-
(a) at said first apparatus, receiving a signal, said signal comprising governed information and a first rule steganographically incorporated into said signal, said first rule controlling whether said governed information may be transmitted through said communications port; (b) at said first apparatus, steganographically decoding said signal to recover said at least one rule; (c) at said first apparatus attempting to initiate a transfer of said governed information through said communications port; (d) at said first apparatus, invoking said first rule, (e) at said first apparatus determining, based on said first rule, whether said transfer is authorized; and (f) completing said transfer if said transfer is authorized, otherwise aborting said transfer. - View Dependent Claims (186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, 201)
-
-
202. A rights management method operating at least in part on a first apparatus, said first apparatus including a communications port and means for accessing information on a removable memory device, said method comprising:
-
(a) at said first apparatus, receiving a removable memory device containing a signal, said signal comprising governed information and a first rule steganographically incorporated into said signal, said first rule requiring that payment be made at a remote site in return for use of or access to at least a portion of said governed information; (b) at said first apparatus, steganographically decoding said signal to recover said first rule; (c) at said first apparatus, initiating at least one access to or use of at least a portion of said governed information; (d) at said first apparatus, initiating communication, through said communications port, with a second apparatus remote from said first apparatus; (e) providing payment from said first apparatus to said second apparatus; (f) checking to determine whether said payment has been provided; and (g) allowing said at least one access to or use of at least a portion of said governed information to complete if said check reveals that said payment has been provided. - View Dependent Claims (203, 204, 205, 206, 207, 208, 209, 210, 211, 212, 213, 214, 215, 216, 217, 218, 219, 220, 221, 222)
-
-
223. A rights management method comprising:
-
(a) at a first apparatus, receiving a signal comprising governed information and a first rule steganographically incorporated into said signal; (b) at said first apparatus, steganographically decoding said signal to recover said first rule, said rule acting to prohibit conversion of said governed information from a first format to a second format; and (c) at said first apparatus, performing at least one operation on said governed information, said operation governed, at least in part, by said first rule. - View Dependent Claims (224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 238)
-
-
239. A rights management method operating at least in part on a first apparatus, comprising:
-
(a) receiving a signal comprising first governed information, second governed information, and at least a first and a second rule steganographically incorporated into said signal, (b) steganographically decoding said signal to recover at least one of said rules; (c) using said first rule to govern at least in part govern a first operation on said first governed information; and (d) using said second rule to at least in part govern a second operation on said second governed information. - View Dependent Claims (240, 241, 242, 243, 244, 245, 246, 247, 248, 249, 250, 251, 252, 253, 254, 255, 256, 257)
-
-
258. A rights management method comprising:
-
(a) at a first apparatus, receiving a signal comprising governed information and a first rule steganographically incorporated into said signal, said first rule at least controlling the circumstances under which said governed information may be transferred to a second apparatus; (b) steganographically decoding said signal to recover said first rule; and (c) performing at least a first operation on said governed information, said first operation governed, at least in part, by said first rule, said first operation comprising at least; initiating an attempt to transfer said governed information to a second apparatus; checking to determine whether said transfer is allowed by said first rule; and completing said transfer if said transfer is allowed by said first rule, or failing to transfer said governed information if said transfer is not allowed by said first rule. - View Dependent Claims (259, 260, 261, 262, 263, 264, 265, 266, 267, 268, 269, 270, 271, 272)
-
-
273. A steganographic encoding method comprising:
-
(a) receiving information; (b) transforming said information into a signal; (c) selecting a first location in said signal for the incorporation of steganographically encoded information, said selection being governed at least in part by an analysis of the bandwidth available at such location for such encoding; said first location being selected at least in part because it has a relatively high degree of available bandwidth for such encoding; (d) steganographically encoding a first rule in said first location, said first rule at least in part governing at least one aspect of use of at least a portion of said information; (e) selecting a second location in said signal for the incorporation of steganographically encoded information; (f) analyzing said second location to determine the bandwidth available at said second location for steganographic encoding; (g) determining that said second location has relatively less bandwidth available for such encoding; and (h) steganographically encoding a pointer to a rule at said second location. - View Dependent Claims (274, 275, 276)
-
-
277. A steganographic encoding method comprising:
-
(a) receiving information; (b) transforming said information into a signal; (c) commencing the steganographical encoding of a first rule beginning at a first location in said signal, said first rule at least in part governing at least one aspect of use of at least a portion of said information; (d) following said commencement, steganographically encoding said first rule in said signal at a variable rate, said variable rate being determined, at least in part, by an analysis of the bandwidth available for said encoding; (e) commencing the steganographical encoding of a second rule beginning at a second location in said signal, said second rule at least in part governing at least one aspect of use of at least a portion of said information; (f) following said commencement step (e), steganographically encoding said second rule in said signal at a variable rate, said variable rate being determined, at least in part, by an analysis of the bandwidth available for said encoding. - View Dependent Claims (278, 279, 280, 281, 282)
-
-
283. A method comprising the following steps:
-
(a) receiving information; (b) transforming said information into a signal; (c) selecting a first location in said signal for the incorporation of steganographic encoding, said selection being governed at least in part by an analysis of the bandwidth available at such location for such encoding; said first location being selected at least in part because it has a relatively high degree of available bandwidth for such encoding; (d) steganographically encoding a first rule in said first location, said first rule at least in part governing at least one aspect of use of at least a portion of said information; (e) selecting a second location in said signal for the incorporation of steganographically encoding; (f) analyzing said second location to determine the bandwidth available at said second location for steganographic encoding; (g) determining that said second location has relatively less bandwidth available for such encoding; and (h) steganographically encoding a pointer to said first rule at said second location; (i) storing said signal, including said steganographically encoded information, on a portable memory; (j) inserting said portable memory into a first appliance; (k) said first apparatus reading from said second location prior to reading from said first location; (l) following reading from said second location, said first apparatus following said pointer in order to read from said first location; (m) said first apparatus retrieving said first rule from said first location; and (n) said first apparatus using said first rule to govern at least one aspect of access to or use of said information. - View Dependent Claims (284, 285, 286, 287, 288, 289, 290, 291, 292, 293, 294, 295, 296, 297)
-
-
298. A method comprising the following steps:
-
(a) receiving information; (b) transforming said information into a signal; (c) steganographically encoding a first rule at a first location in said signal, said first rule at least in part governing at least one aspect of use of at least a portion of said information; (d) following said step (c), selecting a second location in said signal, said second location being selected at least in part based on its offset from said first location; (e) steganographically encoding said first rule in said second location; (f) repeating said location selection and steganographic encoding steps at least two additional times, in each case selecting the location for said steganographic encoding being based at least in part on an offset from at least one previously selected location; (g) storing said signal, including said steganographically encoded information, on a portable memory; (h) inserting said portable memory into a first apparatus; (i) said first apparatus beginning reading from said portable memory at a point between said locations; (j) said first apparatus continuing to read until one of said locations is encountered; (k) said first apparatus retrieving said first rule from said encountered location; and (l) said first apparatus using said first rule to govern at least one aspect of use of said information. - View Dependent Claims (299, 300, 301, 302, 303, 304, 305, 306, 307, 308, 309, 310)
-
-
311. A method comprising:
-
receiving a first signal comprising first information, said first signal being encoded in a first format; steganographically encoding a first rule in said first signal, said first rule governing at least one aspect of access to or use of said first information; transforming said first signal into a second signal, said second signal being encoded in a second format, said second signal containing said first information and said steganographically encoded first rule; and at a first apparatus designed to use signals encoded in said second format; steganographically decoding said second signal to obtain said first rule; and using said first rule to govern at least one aspect of access to or use of said first information at said first apparatus; said first apparatus including rights management functionality designed to interpret and execute rules, including said first rule. - View Dependent Claims (312, 313, 314, 315, 316, 317, 318, 319, 320, 321)
-
-
322. A method comprising:
-
(a) at a first apparatus, receiving a signal comprising governed information and a first rule steganographically incorporated into said signal; (b) at said first apparatus, steganographically decoding said signal and recovering said first rule; (c) at said first apparatus, using said first rule to govern at least one aspect of access to or use of at least a portion of said governed information; (d) at said first apparatus, making a copy of at least a portion of said governed information; and (e) at said first apparatus, steganographically encoding at least a second rule into said copy, said second rule differing in at least one respect from said first rule. - View Dependent Claims (323, 324, 325, 326, 327, 328)
-
-
329. A method comprising:
-
(a) at a first apparatus, receiving a signal comprising; governed information and a first rule steganographically incorporated into said signal; (b) at said first apparatus, steganographically decoding said signal and recovering said first rule; (c) at said first apparatus, using said first rule to govern at least one aspect of access to or use of at least a portion of said governed information; (d) at said first apparatus, making a copy of at least a portion of said governed information, said copy not including any steganographically encoded information; and (e) transferring said copy to a second apparatus. - View Dependent Claims (330)
-
-
331. A method comprising:
-
(a) at a first apparatus, receiving a signal comprising; governed information; a first rule steganographically incorporated into said signal; and a copy indicator steganographically incorporated into said signal; (b) at said first apparatus, steganographically decoding said signal and recovering said first rule and said copy indicator; (c) at said first apparatus, using said first rule to govern at least one aspect of access to or use of at least a portion of said governed information; (d) at said first apparatus, making a copy of at least a portion of said governed information; (e) at said first apparatus, altering said copy indicator to indicate that a copy has been made; (f) at said first apparatus, steganographically encoding said altered copy indicator and at least one rule into said copied governed information portion; and (e) transferring said copy, including said steganographic encoding, to a second apparatus. - View Dependent Claims (332)
-
-
333. A method comprising:
-
(a) at a first apparatus, receiving a signal comprising first governed information and control information steganographically encoded in said first governed information; said control information including a first rule and error correction information; (b) at said first apparatus, steganographically decoding said signal to recover said control information; (c) at said first apparatus, using said error correction information to analyze said recovered first rule to determine whether said recovered first rule contains errors; (d) at said first apparatus, using said error correction information to correct at least one error in said first rule; and (e) at said first apparatus, steganographically encoding said corrected first rule and error correction information in said first governed information. - View Dependent Claims (334)
-
-
335. An apparatus comprising:
-
means for receiving a first signal, said first signal comprising governed information and a steganographically encoded first rule; means for steganographically decoding said signal to recover said first rule; means for using said first rule to at least in part govern at least one operation on said governed information; means for inserting a watermark into at least a portion of said first signal, said watermark including identification information; and means for transmitting said watermarked signal to a remote apparatus. - View Dependent Claims (336, 337)
-
-
338. An apparatus comprising:
-
means for receiving a first signal, said first signal comprising governed information and a steganographically encoded first rule; means for steganographically decoding said signal to recover said first rule; means for using said first rule to at least in part govern at least one operation on said governed information; means for generating a second signal comprising at least a portion of said first governed information and a steganographically encoded second rule; and means for transmitting said second signal to a remote apparatus. - View Dependent Claims (339, 340, 341, 342, 343)
-
-
344. An apparatus comprising:
means for receiving a first signal, said first signal comprising; governed information and steganographic encoding comprising a first rule and error correction information; means for steganographically decoding said signal to recover said first rule and said error correction information; means for using said error correction information to correct at least one error in said received first rule; means for steganographically encoding said corrected first rule into said first signal, said corrected first rule replacing said originally received erroneous first rule; and means for transmitting said first signal containing said corrected first rule to a remote apparatus.
-
345. An apparatus comprising:
-
means for receiving a first signal, said first signal comprising; governed information and steganographic encoding comprising a first rule and error correction information; means for steganographically decoding said signal to recover said first rule and said error correction information; means for using said error correction information to correct at least one error in said received first rule; means for steganographically encoding said corrected first rule into said first signal, said corrected first rule replacing said originally received erroneous first rule; means for steganographically encoding a watermark into said first signal, said watermark including identification information; and means for transmitting said first signal containing said corrected first rule to a remote apparatus.
-
-
346. An apparatus comprising:
-
means for receiving a first signal, said first signal comprising governed information and a steganographically encoded first rule; means for steganographically decoding said signal to recover said first rule; means for using said first rule to at least in part govern at least one operation on said governed information; means for making a copy of said governed information; means for steganographically encoding a copy indicator in said copy of said governed information; and means for transmitting said governed information copy, including said copy indicator, to a remote apparatus.
-
Specification