Methods and systems for encoding and protecting data using digital signature and watermarking techniques
First Claim
1. A method for detecting modifications to an electronic file, the method performed by a system comprising a processor and a non-transitory computer-readable-medium storing instructions that when executed by the processor, cause the system to perform the method, the method comprising:
- searching the electronic file for the presence of a signature-containing watermark;
if the signature-containing watermark is found;
retrieving a signature from the signature-containing watermark, andusing the signature to verify the authenticity of at least a portion of the electronic file;
if the signature-containing watermark is not found;
searching the electronic file for a second watermark;
if the second watermark is found, determining that that the electronic file has been modified;
if the second watermark is not found, granting a request to use the electronic file.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for protecting and managing electronic data signals. In one embodiment a strong watermark is inserted in a data signal that is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The signal is then stored and distributed. When attempts are made to use or access the signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If not found, the signal is checked for the presence of the strong watermark, which if found causes the system to inhibit further use of the signal, and if not found further use of the signal is allowed.
37 Citations
24 Claims
-
1. A method for detecting modifications to an electronic file, the method performed by a system comprising a processor and a non-transitory computer-readable-medium storing instructions that when executed by the processor, cause the system to perform the method, the method comprising:
-
searching the electronic file for the presence of a signature-containing watermark; if the signature-containing watermark is found; retrieving a signature from the signature-containing watermark, and using the signature to verify the authenticity of at least a portion of the electronic file; if the signature-containing watermark is not found; searching the electronic file for a second watermark; if the second watermark is found, determining that that the electronic file has been modified; if the second watermark is not found, granting a request to use the electronic file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for detecting modifications to an electronic file, the system comprising:
-
a processor; and a non-transitory computer-readable medium storing instructions that when executed by the processor, cause the system to; search the electronic file for the presence of a signature-containing watermark; if the signature-containing watermark is found; retrieve a signature from the signature-containing watermark, and use the signature to verify the authenticity of at least a portion of the electronic file; if the signature-containing watermark is not found; search the electronic file for a second watermark; if the second watermark is found, determine that that the electronic file has been modified; if the second watermark is not found, grant a request to use the electronic file. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause a computer system to perform a method for detecting modifications to an electronic file, the method comprising:
-
searching the electronic file for the presence of a signature-containing watermark; if the signature-containing watermark is found; retrieving a signature from the signature-containing watermark, and using the signature to verify the authenticity of at least a portion of the electronic file; if the signature-containing watermark is not found; searching the electronic file for a second watermark; if the second watermark is found, determining that that the electronic file has been modified; if the second watermark is not found, granting a request to use the electronic file. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification