Methods and systems for encoding and protecting data using digital signature and watermarking techniques
First Claim
1. A system for protecting an electronic file from unauthorized use, the system comprising:
- a processor; and
a non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising;
receiving a request to copy the electronic file from the system to a remote computer system;
checking the electronic file for the presence of a signature-containing watermark;
if the signature-containing watermark is detected;
retrieving the signature from the watermark,using the signature to verify the authenticity of at least a portion of the electronic file,if the verification is successful, granting the request to copy the electronic file to the remote computer system, andif the verification is not successful, denying the request to copy the electronic file to the remote computer system;
anif the signature-containing watermark is not detected;
checking the electronic file for the presence of another watermark,if the other watermark is found, denying the request to copy the electronic file to the remote computer system, andif the other watermark is not found, granting the request to copy the electronic file to the remote computer system.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The data signal is then stored and distributed on, e.g., a compact disc, a DVD, or the like. When a user attempts to access or use a portion of the data signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If the signature-containing watermark is not found, the signal is checked for the presence of the strong watermark. If the strong watermark is found, further use of the signal is inhibited, as the presence of the strong watermark, in combination with the absence or corruption of the signature-containing watermark, provides evidence that the signal has been improperly modified. If, on the other hand, the strong mark is not found, further use of the data signal can be allowed, as the absence of the strong mark indicates that the data signal was never registered with the signature-containing watermark.
-
Citations
20 Claims
-
1. A system for protecting an electronic file from unauthorized use, the system comprising:
-
a processor; and a non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising; receiving a request to copy the electronic file from the system to a remote computer system; checking the electronic file for the presence of a signature-containing watermark; if the signature-containing watermark is detected; retrieving the signature from the watermark, using the signature to verify the authenticity of at least a portion of the electronic file, if the verification is successful, granting the request to copy the electronic file to the remote computer system, and if the verification is not successful, denying the request to copy the electronic file to the remote computer system;
anif the signature-containing watermark is not detected; checking the electronic file for the presence of another watermark, if the other watermark is found, denying the request to copy the electronic file to the remote computer system, and if the other watermark is not found, granting the request to copy the electronic file to the remote computer system. - View Dependent Claims (2, 3)
-
-
4. A system for protecting an electronic file from unauthorized use, the system comprising:
-
a processor; and a non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising; receiving a request to copy the electronic file from the system to a remote computer system; checking the electronic file for the presence of a signature-containing watermark; if the signature-containing watermark detected; retrieving the signature from the watermark, using the signature to verify the authenticity of at least a portion of the electronic file, if the verification is successful, granting the request to copy the electronic file to the remote computer system, and if the verification is not successful, denying the request to copy the electronic file to the remote computer system; and if the signature-containing watermark is not detected; checking the electronic file for the presence of another watermark, if the other watermark is found, granting the request to copy the electronic file to the remote computer system, and if the other watermark is not found, denying the request to copy the electronic file to the remote computer system. - View Dependent Claims (5, 6)
-
-
7. A system for protecting an electronic file from unauthorized use, the system comprising:
-
a processor; and a non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising; receiving a request to use the electronic file in a predefined manner; checking the electronic file for the presence of a signature-containing watermark; if the signature-containing watermark is detected; retrieving the signature from the watermark, using the signature to verify the authenticity of at least a portion of the electronic file, if the verification is successful, granting the request to use the electronic file in the predefined manner, and if the verification is not successful, denying the request to use the electronic file in the predefined manner; and if the signature-containing watermark is not detected; checking the electronic file for the presence of another watermark; if the other watermark is found, denying the request to use the electronic file in the predefined manner, and if the other watermark is not found, granting the request to use the electronic file in the predefined manner. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system for protecting an electronic file from unauthorized use, the system comprising:
-
a processor; and a non-transitory computer-readable medium storing instructions that when executed by the processor, cause the processor to perform a method comprising; receiving a request to use the electronic file in a predefined manner; checking the electronic file for the presence of a signature-containing watermark; if the signature-containing watermark is detected; retrieving the signature from the watermark, using the signature to verify the authenticity of at least a portion of the electronic file, if the verification is successful, granting the request to use the electronic file in the predefined manner, and if the verification is not successful, denying the request to use the electronic file in the predefined manner; and if the signature-containing watermark is not detected; checking the electronic file for the presence of another watermark, if the other watermark is found, granting the request to use the electronic file in the predefined manner, and if the other watermark is not found, denying the request to use the electronic file in the predefined manner. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification