Method and apparatus for authenticating content
First Claim
Patent Images
1. A method for authenticating content, comprising:
- authenticating content, through use of a watermark screening operation;
if the content passes watermark screening, generating one or more signature certificates for the content that has been successfully watermark screened;
receiving a request for importation of some of the content into a secured domain;
searching for a signature certificate for the requested content; and
importing the requested content into the secured domain when a signature certificate among the one or more signature certificates authenticates successful watermark screening of the requested content.
1 Assignment
0 Petitions
Accused Products
Abstract
Content is authenticated by generating signature certificates for content that has been successfully watermark screened. When a request is received for importation of content into a secured domain, a search is made in a signature certificates cache for a signature certificate associated with that requested content. If an identified signature certificate authenticates the requested content, the content is imported into the secured domain. If no signature certificate is identified, the content is watermark screened. If the content successfully passes the watermark screening process, a new signature certificate is then added to the signature certificate cache.
57 Citations
23 Claims
-
1. A method for authenticating content, comprising:
-
authenticating content, through use of a watermark screening operation;
if the content passes watermark screening, generating one or more signature certificates for the content that has been successfully watermark screened;
receiving a request for importation of some of the content into a secured domain;
searching for a signature certificate for the requested content; and
importing the requested content into the secured domain when a signature certificate among the one or more signature certificates authenticates successful watermark screening of the requested content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
submitting the requested content for watermark screening only when no signature certificate for the requested content is found;
generating a signature certificate that uniquely identifies the requested content when the requested content successfully passes watermark screening; and
adding the signature certificate to a signature certificate cache.
-
-
3. A method according to claim 1 including:
-
receiving a second request to import the same content into the secured domain;
searching a signature certificate cache for the signature certificate for the requested content; and
importing the requested content into the secured domain without watermark screening when a signature certificate for the requested content is identified in the signature certificate cache.
-
-
4. A method according to claim 1 wherein the signature certificates are generated using a hash algorithm that uniquely identifies the content.
-
5. A method according to claim 1 where the secured domain comprises a device or application conforming with a Secure Digital Music Initiative.
-
6. A method according to claim 1 wherein watermark screening decompresses the content into Pulse Code Modulated digital audio data and detects authentication audio tones in the digital audio data.
-
7. A method according to claim 6 including generating the signature certificates from the content before the content is decompressed into the Pulse Code Modulated digital audio data.
-
8. A method according to claim 1 including:
-
identifying one or more signature certificates corresponding with the requested content;
applying the identified signature certificate to the requested content; and
accepting the identified signature certificate as authentication that the selected content has been successfully watermark screened when a sequence of bits in the requested content matches a sequence of bits used to generate the identified signature certificate.
-
-
9. A method according to claim 1 including:
-
generating a signature for the requested content;
searching for a signature certificate that matches the signature; and
authenticating the requested content as having been successfully watermark screened based on finding a signature certificate that matches the signature.
-
-
10. A method according to claim 1 including maintaining a value in the signature certificate that tracks a number of copies of the associated content that have been previously checked out and preventing importation of the associated content into the secured domain when the value in the signature certificate exceeds a checkout limit.
-
11. A system for authenticating content, comprising:
-
memory to retain content files; and
a processor to access the memory and to perform operations comprising;
authenticating content, through use of a watermark screening operation;
if the content passes watermark screening, generating one or more signature certificates for the content that has been successfully watermark screened;
receiving a request for importation of some of the content into a secured domain;
searching for a signature certificate for the requested content; and
importing the requested content into the secured domain when a signature certificate among the one or more signature certificates authenticates successful watermark screening of the requested content. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
the content includes content files;
the processor receives the content files from a compact an optical disk player or from a network, and the processor watermark screens the received content files when the received content files are first loaded into the memory.
-
-
17. A system according to claim 11 wherein the memory and processor are located in a computer.
-
18. A system according to claim 11 wherein the memory and processor are embedded in a stereo.
-
19. Software for authenticating content, comprising:
-
a machine-readable medium; and
instructions encoded in the machine-readable medium, wherein the instructions, when executed, cause the machine to perform operation comprising;
authenticating content, through use of a watermark screening operation;
if the content passes watermark screening, generating one or more signature certificates for the content that has been successfully watermark screened;
receiving a request for importation of some of the content into a secured domain;
searching for a signature certificate for the requested content; and
importing the requested content into the secured domain when a signature certificate among the one or more signature certificates authenticates successful watermark screening of the requested content. - View Dependent Claims (20, 21, 22, 23)
code to submit the requested content for watermark screening when no signature certificate is found for the requested content;
code to generate a signature certificate that uniquely identifies the requested content when the requested content successfully passes watermark screening; and
code to add the signature certificate to a signature certificate cache.
-
-
21. Software according to claim 19 wherein the instructions comprise:
-
code to receive additional requests to import the same content into the secured domain;
code to generate a content signature for the requested content;
code to search a signature certificate cache for a signature certificate matching the content signature; and
code to import the requested content into the secured domain without watermark screening the requested content when a signature certificate in the signature certificate cache matches the content signature.
-
-
22. Software according to claim 19 wherein the signature certificates and the content are stored on a computer hard disk drive and the code that authenticates the requested content with the signature certificates is located in computer local memory.
-
23. Software according to claim 19 wherein the instructions that generate the signature certificates comprise a hash algorithm.
Specification