Methods and systems for encoding and protecting data using digital signature and watermarking techniques
First Claim
1. A tangible computer-readable medium storing computer-executable program instructions that when executed by a computer system, cause the computer system to perform a method comprising:
- receiving a request to copy an electronic file from a first computer system to a second computer system;
checking the file for the presence of a signature-containing watermark;
if the signature-containing watermark is detected;
retrieving the signature from the watermark,using the signature to verify the authenticity of at least a portion of the file,if the verification is successful, granting the request to copy the file to the second computer system, andif the verification is not successful, denying the request to copy the file to the second computer system; and
if the signature-containing watermark is not detected;
checking the file for the presence of another watermark,if the other watermark is found, denying the request to copy the file to the second computer system, andif the other watermark is not found, granting the request to copy the file to the second computer system.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The data signal is then stored and distributed on, e.g., a compact disc, a DVD, or the like. When a user attempts to access or use a portion of the data signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If the signature-containing watermark is not found, the signal is checked for the presence of the strong watermark. If the strong watermark is found, further use of the signal is inhibited, as the presence of the strong watermark, in combination with the absence or corruption of the signature-containing watermark, provides evidence that the signal has been improperly modified. If, on the other hand, the strong mark is not found, further use of the data signal can be allowed, as the absence of the strong mark indicates that the data signal was never registered with the signature-containing watermark.
-
Citations
22 Claims
-
1. A tangible computer-readable medium storing computer-executable program instructions that when executed by a computer system, cause the computer system to perform a method comprising:
-
receiving a request to copy an electronic file from a first computer system to a second computer system; checking the file for the presence of a signature-containing watermark; if the signature-containing watermark is detected; retrieving the signature from the watermark, using the signature to verify the authenticity of at least a portion of the file, if the verification is successful, granting the request to copy the file to the second computer system, and if the verification is not successful, denying the request to copy the file to the second computer system; and if the signature-containing watermark is not detected; checking the file for the presence of another watermark, if the other watermark is found, denying the request to copy the file to the second computer system, and if the other watermark is not found, granting the request to copy the file to the second computer system. - View Dependent Claims (2, 3)
-
-
4. A tangible computer-readable medium storing computer-executable program instructions that, when executed by a computer system, cause the computer system to perform a method comprising:
-
receiving a request to copy an electronic file from a first computer system to a second computer system; checking the file for the presence of a signature-containing watermark; if the signature-containing watermark is detected; retrieving the signature from the watermark, using the signature to verify the authenticity of at least a portion of the file, if the verification is successful, granting the request to copy the file to the second computer system, and if the verification is not successful, denying the request to copy the file to the second computer system; and if the signature-containing watermark is not detected; checking the file for the presence of another watermark, if the other watermark is found, granting the request to copy the file to the second computer system, and if the other watermark is not found, denying the request to copy the file to the second computer system. - View Dependent Claims (5, 6)
-
-
7. A tangible computer-readable medium storing computer-executable program instructions that, when executed by a computer system, cause the computer system to perform a method comprising:
-
receiving a request to use an electronic file in a predefined manner; checking the file for the presence of a signature-containing watermark; if the signature-containing watermark is detected; retrieving the signature from the watermark, using the signature to verify the authenticity of at least a portion of the file, if the verification is successful, granting the request to use the file in the predefined manner, and if the verification is not successful, denying the request to use the file in the predefined manner; and if the signature-containing watermark is not detected; checking the file for the presence of another watermark, if the other watermark is found, denying the request to use the file in the predefined manner, and if the other watermark is not found, granting the request to use the file in the predefined manner. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A tangible computer-readable medium storing computer-executable program instructions that, when executed by a computer system, cause the computer system to perform a method comprising:
-
receiving a request to use an electronic file in a predefined manner; checking the file for the presence of a signature-containing watermark; if the signature-containing watermark is detected; retrieving the signature from the watermark, using the signature to verify the authenticity of at least a portion of the file, if the verification is successful, granting the request to use the file in the predefined manner, and if the verification is not successful, denying the request to use the file in the predefined manner; and if the signature-containing watermark is not detected; checking the file for the presence of another watermark, if the other watermark is found, granting the request to use the file in the predefined manner, and if the other watermark is not found, denying the request to use the file in the predefined manner. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification