Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
First Claim
1. A method of provisioning/identifying content in/over/across a network, comprising:
- receiving digital content;
organizing the digital content into a packet flow comprising at least two packets;
generating a packet watermark associated with said packet flow;
combining said packet watermark with at least one packet of said packet to form a watermarked packet;
generating at least one packet flow history;
storing the packet flow history in a database in non transient form;
receiving said packet flow;
analyzing the received packet flow to determine if a packet of said flow is said watermarked packet; and
provisioning the content in/over/across the network based on heuristics/histories stored in the database and information associated with said packet watermark.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are methods and systems for transmitting streams of data. The present invention also relates to generating packet watermarks and packet watermark keys. The present invention also relates to a computerized system for packaging data for transmission to a user. The system may utilize computer code to generate a bandwidth rights certificate that may include: at least one cryptographic credential; routing information for the transmission; and, optionally, a digital signature of a certificate owner; a unique identification code of a certificate owner; a certificate validity period; and pricing information for use of bandwidth. The present invention also relates to an electronic method and system for purchasing good and services by establishing an account whereby a customer is credited with a predetermined amount of bandwidth usage, and then charges are assessed against the account in an amount of bandwidth usage which corresponds to the agreed upon purchase value for the selected item.
437 Citations
3 Claims
-
1. A method of provisioning/identifying content in/over/across a network, comprising:
-
receiving digital content; organizing the digital content into a packet flow comprising at least two packets; generating a packet watermark associated with said packet flow; combining said packet watermark with at least one packet of said packet to form a watermarked packet; generating at least one packet flow history; storing the packet flow history in a database in non transient form; receiving said packet flow; analyzing the received packet flow to determine if a packet of said flow is said watermarked packet; and provisioning the content in/over/across the network based on heuristics/histories stored in the database and information associated with said packet watermark.
-
-
2. A router for routing, monitoring, and classifying network traffic flow in a form of packets, comprising:
-
a processor, and a memory; wherein the memory stores code to perform the steps of; receiving digital content; organizing the digital content into a packet flow comprising at least two packets; generating a packet watermark associated with said packet flow; combining said packet watermark with at least one packet of said packet to form a watermarked packet; generating at least one packet flow history; storing the packet flow history in a database in non transient form; receiving said packet flow; analyzing the received packet flow to determine if a packet of said flow is said watermarked packet; and provisioning the content in/over/across the network based on heuristics/histories stored in the database and information associated with said packet watermark.
-
-
3. A computer program product storing instruction in non transient memory for programming a router to perform the steps of:
-
receiving digital content; organizing the digital content into a packet flow comprising at least two packets; generating a packet watermark associated with said packet flow; combining said packet watermark with at least one packet of said packet to form a watermarked packet; generating at least one packet flow history; storing the packet flow history in a database in non transient form; receiving said packet flow; analyzing the received packet flow to determine if a packet of said flow is said watermarked packet; and provisioning the content in/over/across the network based on heuristics/histories stored in the database and information associated with said packet watermark.
-
Specification