Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Patent
1998-06-04
2000-10-10
Swann, Tod R.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
713170, 713181, 705 57, 380 28, 380 30, H04L 932, H04L 928, H04L 930
Patent
active
061311626
ABSTRACT:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts a content purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser system creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.
REFERENCES:
patent: 5530759 (1996-06-01), Braudaway et al.
patent: 5872848 (1999-02-01), Romney et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5898779 (1999-04-01), Squilla et al.
patent: 5960081 (1999-09-01), Vynne et al.
F. Rouaix, "A Web Navigator with Applets in Caml", 1996, Published by Elsevier Science B.V., Computer Networks and ISDN Systems 28, pp. 1365-1371.
S. Anderson, et al, "Sessioneer: Flexible Session Level Authentication with off the shelf servers and clients", 1995 Elsevier Science B.V., Computer Networks and ISDN Systems 27, pp. 1047-1053.
W. Bender, "Techniques for Data Hiding", IBM Systems Journal, vol. 35, No. 3 & 4, 1996, pp. 313-330.
N. Komatsu, et al, A Proposal on Digital Watermark in Document Image Communication and its Application to Realizing a Signature, Electronics and Communications in Japan 73(1990) May, No. 5, Part I, New York, US, pp. 22-33.
B. Schneier, Applied Cryptography 1996, John Wiley & Sons, US New York, pp. 39-41.
Sasaki, et al, Security Technology for Open Networks, Hitachi Review, JP, Hitachi, Ltd., Tokyo, vol. 46, No. 4, pp. 197-202.
M. Schneider et al, A Robust Content Based Digital Signature for Image Authentication, Proceedings of the International Conference on Image Processing, US, New York, IEEE, pp. 227-230.
W. Bender, Techniques for Data Hiding, IBM Systems Journal, vol. 35, No. 3 & 4, 1996, pp. 313-336.
Eiji Okamoto, Ango Riron Nyumon (Introduction to Cryptography), Kyoritsu Shuppan Co., Ltd., 1993, pp. 133-137.
Bruce Schneier, Applied Cryptography, 2.sup.nd Ed., John Wilsy & Sons, Inc., 1996, pp. 39-41.
Nikkei Electronics., No. 683, 1997, pp. 99-107.
Opendesign., Apr., 1996, pp. 4-22.
Opendesign., Apr. 1996, pp. 40-78.
Jyohoshori (Information Processing), Jyohoshori Gakkai (Information Processing Society of Japan), vol. 38, No. 9, 1997, pp. 752-810.
Saito Tsukasa
Sasaki Ryoichi
Susaki Seiichi
Takaragi Kazuo
Toyoshima Hisashi
Darrow Justin T.
Hitachi , Ltd.
Swann Tod R.
LandOfFree
Digital data authentication method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Digital data authentication method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital data authentication method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2263880