Tools and techniques for original digital files
First Claim
1. A method of analyzing authenticity based in part on one or more physical locations, the method comprising the steps of:
- a calling program causing a self-extracting executable program to run;
the self-extracting executable program attempting to authenticate data by steps which include;
reading a claimed physical location identifier associated with the data;
ascertaining an actual physical location of the data;
comparing the claimed physical location identifier to the actual physical location of the data; and
deeming the data authentic only if the claimed physical location identifier associated with the data matches the actual physical location of the data;
the self-extracting executable program attempting to authenticate the calling program by steps which include;
reading a claimed physical location identifier associated with the calling program;
ascertaining an actual physical location of the calling program;
comparing the claimed physical location identifier to the actual physical location of the calling program; and
deeming the calling program authentic only if the claimed physical location identifier associated with the calling program matches the actual physical location of the calling program; and
associating at least one claimed physical location identifier by performing at least one of;
placing the claimed physical location identifier within a file, the file containing at least one of;
the calling program, the data;
placing the claimed physical location identifier in a supplementary document and creating a bridge between a file and the supplementary document without requiring in either document an embedded link to the other document, the file containing at least one of;
the calling program, the data;
placing the claimed physical location identifier in a database containing claimed physical location identifiers;
placing the claimed physical location identifier in a directory containing claimed physical location identifiers.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides tools and techniques for distinguishing a file from any or all copies of the file that may exist. One method ascertains (204) the actual physical location of the file (512) and associates (214) that physical location with the file as the claimed physical location (516) of the file. The file'"'"'s originality status may then be determined (104) by finding (304) the location claim, reading (306) from it the claimed physical location associated with the file, ascertaining (308) the actual physical location of the file, and comparing (310) the locations. If the claimed and actual locations are identical, then the file is the original file it claims to be. If there is disparity between the claimed physical location recited for or by the file and the actual physical location of the file, then it is not the original file it claims to be.
17 Citations
6 Claims
-
1. A method of analyzing authenticity based in part on one or more physical locations, the method comprising the steps of:
-
a calling program causing a self-extracting executable program to run; the self-extracting executable program attempting to authenticate data by steps which include; reading a claimed physical location identifier associated with the data; ascertaining an actual physical location of the data; comparing the claimed physical location identifier to the actual physical location of the data; and deeming the data authentic only if the claimed physical location identifier associated with the data matches the actual physical location of the data; the self-extracting executable program attempting to authenticate the calling program by steps which include; reading a claimed physical location identifier associated with the calling program; ascertaining an actual physical location of the calling program; comparing the claimed physical location identifier to the actual physical location of the calling program; and deeming the calling program authentic only if the claimed physical location identifier associated with the calling program matches the actual physical location of the calling program; and associating at least one claimed physical location identifier by performing at least one of; placing the claimed physical location identifier within a file, the file containing at least one of;
the calling program, the data;placing the claimed physical location identifier in a supplementary document and creating a bridge between a file and the supplementary document without requiring in either document an embedded link to the other document, the file containing at least one of;
the calling program, the data;placing the claimed physical location identifier in a database containing claimed physical location identifiers; placing the claimed physical location identifier in a directory containing claimed physical location identifiers. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification