Data application method

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S026000, C725S008000

Reexamination Certificate

active

07925882

ABSTRACT:
Data application method enabling evaluations to be properly received while content is being protected, enabling content users to use only what they want to use in the amount they want to use it, and enabling advertising providers in certainty to have users use ads. The method includes: a step of converting first data for permitting use based on predetermined conditions, into encrypted first data by means of a predetermined encryption key; a step of generating watermarked second data in which the encryption key is embedded, as an invisible electronic watermark, into second data for permitting use unconditionally; and a step of compositing and distributing the encrypted first data and the watermarked second data.

REFERENCES:
patent: 5530759 (1996-06-01), Braudaway et al.
patent: 5940504 (1999-08-01), Griswold
patent: 6185733 (2001-02-01), Breslau et al.
patent: 6802077 (2004-10-01), Schlarb
patent: 2001/0004736 (2001-06-01), Hirano et al.
patent: 2001/0054150 (2001-12-01), Levy
patent: 2002/0016776 (2002-02-01), Chu et al.
patent: 2002/0184158 (2002-12-01), Tadayon et al.
patent: 2003/0103645 (2003-06-01), Levy et al.
patent: 2003/0138101 (2003-07-01), Stransky
patent: 1 079 627 (2001-02-01), None
patent: 08-241403 (1996-09-01), None
patent: 2000-268497 (2000-09-01), None
patent: 2000-339227 (2000-12-01), None
patent: 2001-78007 (2001-03-01), None
patent: 2001-177816 (2001-06-01), None
patent: 2001-332019 (2001-11-01), None
patent: 02/073616 (2002-09-01), None
Hideyuki Hirano et al., “Concept and prototype system of copy management and protection method with proper rights”, Information Processing Society of Japan Report, Feb. 21, 2001, vol. 2001, No. 15, pp. 97-102.
Hideyuki Hirano et al., “Concept and prototype system of copy management and protection method with convenience”, Information Processing Society of Japan Report, Jan. 21, 2000, vol. 2000, No. 9, pp. 31-36.
Katani, Seigo et al., “Internet Security”, Fujitsu, Fujitsu Limted, Jul. 13, 2001, vol. 52, No. 4, pp. 329-337.
Japanese Office Action issued Jun. 29, 2010 in corresponding Japanese Patent Application 2002-337998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data application method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data application method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data application method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2654247

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.