Protecting content from illicit reproduction by proof of existence of a complete data set using security identifiers
First Claim
1. A method for discouraging a theft of content material comprising:
- collecting a plurality of data items comprising the content material to form a data set that is sized to be sufficiently large so as to discourage a subsequent transmission of the data set via a limited bandwidth communications channel,each of the plurality of data items having an associated security identifier that is configured such that a modification of the data item effects a modification of the security identifier,creating an entirety parameter based on a plurality of the security identifiers; and
including the entirety parameter in the data set to facilitate a preclusion of processing of a select data item of the plurality of data items in the absence of an entirety of the data set.
2 Assignments
0 Petitions
Accused Products
Abstract
A number of data items are selected for inclusion in a data set so as to discourage a transmission of the entire set over a limited bandwidth communications path, such as the Internet. The data set includes an entirety parameter that is used to determine whether the entirety of the data set is present. In a preferred embodiment, the entirety parameter is a hash value that is based on watermarks of each data item. When presented for rendering, the watermarks of the data items in the presented material are read and a hash value based on the presented watermarks is computed. A mis-match between the computed hash value and the entirety hash value contained in the data set indicates that less than the entirety of the data set is being presented, and the rendering is prohibited.
43 Citations
40 Claims
-
1. A method for discouraging a theft of content material comprising:
-
collecting a plurality of data items comprising the content material to form a data set that is sized to be sufficiently large so as to discourage a subsequent transmission of the data set via a limited bandwidth communications channel, each of the plurality of data items having an associated security identifier that is configured such that a modification of the data item effects a modification of the security identifier, creating an entirety parameter based on a plurality of the security identifiers; and including the entirety parameter in the data set to facilitate a preclusion of processing of a select data item of the plurality of data items in the absence of an entirety of the data set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of decoding content material from a source comprising:
-
reading an entirety parameter corresponding to the content material from the source, reading a plurality of security identifiers from the source, upon which the entirety parameter is based, each security identifier corresponding to a data item of the content material, determining an entirety value based on the plurality of security identifiers, rendering the content material from the source in dependence upon a correspondence between the entirety value and the entirety parameter. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A storage medium that is configured to contain content material, the storage medium comprising
a data structure that includes: -
a plurality of data items, each data item having an associated security identifier, and an entirety parameter that is dependent upon a plurality of the security identifiers; and wherein each security identifier of the plurality of security identifiers is configured such that a modification of the data item effects a modification of the security identifier, and the entirety parameter facilitates a determination of whether an entirety of the plurality of data items is present on a subsequent copy of at least a portion of the plurality of data items. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. An encoder of content material comprising:
-
a selector that is configured to select a plurality of data items comprising the content material to form a data set that is sized to be sufficiently large so as to discourage a subsequent transmission of the data set via a limited bandwidth communications channel, each of the plurality of data items having an associated security identifier that is configured such that a modification of the data item effects a modification of the security identifier, a binder that is configured to create an entirety parameter based on a plurality of the security identifiers that facilitates a determination of whether an entirety of the plurality of data items is present, and a recorder that is configured to combine the entirety parameter with the plurality of data items to form a self-referential data set that is stored on a recorded medium. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A decoder of content material comprising:
-
a renderer that is configured to receive; an entirety parameter corresponding to the content material, and a plurality of security identifiers upon which the entirety parameter is based, each security identifier corresponding to a data item of the content material, an entirety checker, operably coupled to the renderer, that is configured to determine an entirety value based on the plurality of security identifiers, and preclude a rendering of the content material from the source in dependence upon a correspondence between the entirety value and the entirety parameter. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
-
Specification