Digital data authentication method

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

713170, 713181, 705 57, 380 28, 380 30, H04L 932, H04L 928, H04L 930

Patent

active

061311626

ABSTRACT:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts a content purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser system creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.

REFERENCES:
patent: 5530759 (1996-06-01), Braudaway et al.
patent: 5872848 (1999-02-01), Romney et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5898779 (1999-04-01), Squilla et al.
patent: 5960081 (1999-09-01), Vynne et al.
F. Rouaix, "A Web Navigator with Applets in Caml", 1996, Published by Elsevier Science B.V., Computer Networks and ISDN Systems 28, pp. 1365-1371.
S. Anderson, et al, "Sessioneer: Flexible Session Level Authentication with off the shelf servers and clients", 1995 Elsevier Science B.V., Computer Networks and ISDN Systems 27, pp. 1047-1053.
W. Bender, "Techniques for Data Hiding", IBM Systems Journal, vol. 35, No. 3 & 4, 1996, pp. 313-330.
N. Komatsu, et al, A Proposal on Digital Watermark in Document Image Communication and its Application to Realizing a Signature, Electronics and Communications in Japan 73(1990) May, No. 5, Part I, New York, US, pp. 22-33.
B. Schneier, Applied Cryptography 1996, John Wiley & Sons, US New York, pp. 39-41.
Sasaki, et al, Security Technology for Open Networks, Hitachi Review, JP, Hitachi, Ltd., Tokyo, vol. 46, No. 4, pp. 197-202.
M. Schneider et al, A Robust Content Based Digital Signature for Image Authentication, Proceedings of the International Conference on Image Processing, US, New York, IEEE, pp. 227-230.
W. Bender, Techniques for Data Hiding, IBM Systems Journal, vol. 35, No. 3 & 4, 1996, pp. 313-336.
Eiji Okamoto, Ango Riron Nyumon (Introduction to Cryptography), Kyoritsu Shuppan Co., Ltd., 1993, pp. 133-137.
Bruce Schneier, Applied Cryptography, 2.sup.nd Ed., John Wilsy & Sons, Inc., 1996, pp. 39-41.
Nikkei Electronics., No. 683, 1997, pp. 99-107.
Opendesign., Apr., 1996, pp. 4-22.
Opendesign., Apr. 1996, pp. 40-78.
Jyohoshori (Information Processing), Jyohoshori Gakkai (Information Processing Society of Japan), vol. 38, No. 9, 1997, pp. 752-810.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Digital data authentication method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Digital data authentication method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital data authentication method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2263880

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.