Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-08-21
2007-08-21
Zand, Kambiz (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S202000, C713S160000
Reexamination Certificate
active
10028727
ABSTRACT:
A system and method for communicating a device's capabilities uses a digital watermark embedded in content data. The watermark includes parameters concerning a source unit's communications capabilities. The watermark is embedded within content data, such as multimedia data, of a data packet. A destination unit, upon receiving the data packet detects if a watermark is present, and if so extracts the source's capability parameters from the watermark. The destination unit then negotiates with the source unit to use certain capabilities based on the source capability information contained in the watermark.
REFERENCES:
patent: 353666 (1886-12-01), Crane, Jr.
patent: 5826227 (1998-10-01), Jayant
patent: 5862260 (1999-01-01), Rhoads
patent: 5915027 (1999-06-01), Cox et al.
patent: 5930369 (1999-07-01), Cox et al.
patent: 5940134 (1999-08-01), Wirtz
patent: 6031914 (2000-02-01), Tewfik et al.
patent: 6145081 (2000-11-01), Winograd et al.
patent: 6731776 (2004-05-01), Fujiwara
patent: 2001/0044899 (2001-11-01), Levy
patent: 2001/0054150 (2001-12-01), Levy
patent: 1098522 (2001-05-01), None
patent: 1326422 (2003-07-01), None
patent: 2001052072 (2001-02-01), None
patent: 2001052072 (2001-02-01), None
patent: 9748212 (1997-12-01), None
patent: WO9748212 (1997-12-01), None
patent: WO99/63443 (1999-12-01), None
Negotiate (defined), Dictionary.com retrieved online <URL:http://dictionary.reference.com/search?q=negotiate>, pp. 1-2.
Transport Layer Security, Wikipedia.org, Jan. 1999 <URL:http://en.wikipedia.org/w/index.php?title=Transport—Layer—Security&printable=yes> retrieved online Jul. 24, 2006.
Dierks et al, The TLS Protocol rfc 2246, Jan. 1999, <URL:http://tools.ietf.org/html/2246> retrieved online Jul. 24, 2006.
Internet Protocol Suite, Wikipedia.org, <URL:http://en.wikipedia.org/w/index.php?title=Internet—protocol—suite&printable=yes>retrieved online Jul. 24, 2006.
Negotiate (defined), Dictionary.com retrieved online on Apr. 26, 2006 <URL:http://dictionary.reference.com/search?q=negotiate>, pp. 1-2.
European Search Report dated Mar. 5, 2004.
Cox et al.,Secure Spread Spectrum Watermarking for Multimedia, NEC Research Institute, Technical Report 95-10, pp. 1-33, 1997.
Cox et al.,Watermarking as communications with side information, Proceedings of the IEEE, 87, 7, 1127-1141, (pp. 1-26), 1999.
Miller et al.,A review of watermarking principles and practices, Digital Signal Processing in Multimedia Systems, Ed. K.K. Parhi and T. Nishitani, Marcell Dekker Inc., 461-485, (pp. 1-32), 1999.
Forstrom Howard Scott
Phadke Madhav Shridhar
Wojciechowski Edward
Edell Shapiro & Finnan LLC
ITT Manufacturing Enterprises Inc.
Szymanski Thomas
LandOfFree
Digital multimedia watermarking for source identification does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Digital multimedia watermarking for source identification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital multimedia watermarking for source identification will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3887740