System and methods for permitting open access to data objects and for securing data within the data objects
DC CAFCFirst Claim
1. A method for creating differential access to a digital signal, comprising:
- receiving a digital signal;
selecting at least one signal characteristic of the digital signal;
manipulating the at least one signal characteristic to degrade the digital signal;
associating at least one digital watermark with the degraded digital signal; and
creating differential access based on the manipulation step.
2 Assignments
Litigations
0 Petitions
Reexamination
Accused Products
Abstract
A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data. The additional steps of descrambling and decoding may be performed until a predetermined condition is met. The predetermined condition may include, for example, reaching a desired signal quality of the data object.
-
Citations
18 Claims
-
1. A method for creating differential access to a digital signal, comprising:
-
receiving a digital signal; selecting at least one signal characteristic of the digital signal; manipulating the at least one signal characteristic to degrade the digital signal; associating at least one digital watermark with the degraded digital signal; and creating differential access based on the manipulation step. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for distributing accessible digital content, comprising:
-
providing a digital content comprising digital data and file format information; selecting a scrambling technique to apply to the digital content; scrambling the digital content using a predetermined key resulting in perceptibly degraded digital content wherein the scrambling technique is based on a plurality of predetermined criteria including at least the criteria of reaching a desired signal quality level for the digital content; and distributing the scrambled digital content. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A device for creating differential access to an accessible data object, comprising:
-
a receiver for receiving a data object comprising digital data and file format information; an encoder for encoding independent data into the data object; a scrambler for manipulating the data object based on at least one signal characteristic of the data object wherein the scrambling is performed until at least one signal quality threshold is created for the data object; and a transmitter for transmitting the perceptibly manipulated data object wherein the manipulated data object is associated with at least one selected from the group comprising;
a digital watermark;
a key;
a device;
a subscriber;
a user;
a payment facility;a distribution channel;
authentication information;
or, combinations thereof.
-
-
12. A method for authorizing data objects, comprising:
-
embedding data into a data object; scrambling the data object where at least a portion of the embedded data can be authorized from the scrambled data object; distributing the scrambled data object; and distributing at least one key that enables authorization of the scrambled data object based on the embedded data.
-
-
13. A device for enabling differential access of distributable data objects comprising:
-
an encoder for encoding the data object with independent information; a scrambler for scrambling the data object to enable differential access with a scrambling technique selected from the group consisting of;
file format manipulation;
partial encryption;
threshold encryption; and
, probabilistic encryption, where at least a portion of the encoded independent information can be detected from the scrambled data object; anda key generator for generating a key based on a signal quality threshold that is adjustable in at least one of a time, a frequency, and a bit depth. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification