Code generating method and unit thereof, code detecting...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07624273

ABSTRACT:
Residue calculating sections respectively obtain residues which take a plurality of integers as modulus, with respect to a user ID. The plurality of integers are stored in modulus storage sections and are prime to each other. Based on these residues and parameters stored in a coding parameter storage section, component codes constructed by continuous sequences of 1 and 0 using a predetermined number of bits as a unit are respectively generated by component code generating sections. These component codes are concatenated by a concatenating section, thereby to obtain a code to be embedded, which constructs watermark information.

REFERENCES:
patent: 5583941 (1996-12-01), Yoshida et al.
patent: 5664018 (1997-09-01), Leighton
patent: 5915027 (1999-06-01), Cox et al.
patent: 6603864 (2003-08-01), Matsunoshita
patent: 9-191394 (1997-07-01), None
patent: 11-288217 (1999-10-01), None
patent: 2000-3129 (2000-01-01), None
patent: WO 97/34391 (1997-09-01), None
Comer, Douglas E. “Internetworking with TCP/IP”, vol. I, Third Edition. © 1995 Prentice-Hall Inc. pp. 199, 200, 221, 326, 327, 578, and 579.
V.R.L. Shen et al. lEICE Trans. Fundamentals, vol. E80-A, No. 10, pp. 2035-2037, XP-000767254, “Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, Oct. 1, 1997.
Jun Yoshida, et al., “A Coding Method for Collusion-Secure Watermark and Less Decline,” The 1998 Symposium on Cryptography and Information Security (SCIS '98), 10.2.A, Jan. 28-31, 1998.
Dan Boneh, et al., “Collusion-Secure Fingerprinting for Digital Data,” CRYPTO '95, 1995, pp. 452,465.
Masahiro Suzuoki, et al., “A Scheme of Making Collusion-Secure Watermark,” The 1997 Symposium on Cryptography and Information Security (SCIS '97), Jan. 29-Feb. 1, 1997, pp. 1-10.
Tetsuya Yamamoto, et al., “A Method of Image Watermarking Which Can Detect All Illegal Users in Collusion,” The 1998 Symposim on Cryptography and Information Security (SCIS '98), 10.2 B., Jan. 28-31, 1998, pp. 1-8.
Neal R. Wagner, “Fingerprinting,”Proceedings of the 1983 Symposium on Security and Privacy, Apr. 1983, pp. 18-22.
G. R. Blakeley, et al., “Fingerprinting Long Forgiving Messages,” CRYPTO '85, pp. 180-189.
Ingemar J. Cox, et al., “Secure Spread Spectrum Watermarking for Multimedia,” NEC Research Institute Technical Report 95-10, 1995, pp. 1-33.
Hirofumi Muratani, “Collusion Resilience of Digital Watermarking,” The 2000 Symposium on Cryptography and Information Security (SCIS 2000), c06, Jan. 26-28, 2000, pp. 1-8.
Joe Kilian, et al., “Resistance of Digital Watermarks to Collusive Attacks,” Department of Computer Science TR-585-98, pp. 1-23.
V. R. L. Shen, et al., IEICE Trans. Fundamentals, vol. E80-A, No. 10, pp. 2035-2037, XP-000767254. “Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, Oct. 1, 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Code generating method and unit thereof, code detecting... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Code generating method and unit thereof, code detecting..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Code generating method and unit thereof, code detecting... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4119705

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.