Linking of computers using information steganographically...

Electrical computers and digital processing systems: multicomput – Remote data accessing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S241000, C380S001000, C380S028000, C345S215000

Reexamination Certificate

active

06324573

ABSTRACT:

TECHNICAL FIELD
The present invention relates to the field of computer network navigation, such as navigation and routing of instructions on the Internet. More particularly, the invention presents a new method for automatically linking from one computer site to another, also known as a “link” or “hot link” method.
BACKGROUND AND SUMMARY OF THE INVENTION
The World Wide Web (WWW) is a standardized graphic interface and network protocol to the Internal which is rapidly increasing in popularity and usage. Among many reasons for the growth in the WWW is the core feature that allows a user to immediately “link” from one given web site to another, merely by pointing to an object and clinking a button, where the object pointed to is usually a highlighted or otherwise clearly distinguished line of test or image. Computerized documents containing such links are often referred to as “hypertext.”
Generally speaking, creators of a web site set up a site or page using web site development tools, such as the WebForce tools sold by Silicon Graphics. At a more mundane level, programmers use a language called Hypertext Markup Language (HTML) to generate the instructions necessary for a web site to function properly. Currently, the basic manner with which a “hot link” from one site to another is implemented is by specifying within the programming language or the web site development tools which graphical object presented to a web site visitor will be the visual link to another web site. Once the object is specified, the programming tools associate with this object a URL address, which is the Internet or web address of the web site to which the object points. Summarizing in a very general way, the creation of a graphical “hot link” and its underlying URL address needs to be programmed in a non-automated manner.
Traditional methods of implementing hot links generally employ a “header file” that contains the URL address. The header file is attached to the graphical object. Alternatively, a database management systems is set up, whereby a graphical object has an index number attached and that a database of URL addresses can be searched using the index value. Both of these traditional approaches suffice in a well defined network system where everyone agress to abide by identical protocols and to use the same header files and/or database procedures. Moreover, these methods require agreement on how this information is transferred when going from one system to another.
In the case of the Internet, however, and the current World Wide Web, there is a huge range of graphical objects that are representable, and the ideal of a universal data file format is far from being realized. Instead, a multitude of file formats are used, and most of them do not have a simple means whereby a URL address could become attached in a way that would also facilitate, by not conflicting with, the continued development of standards to attach URL addresses.
It is desirable, therefore, to find a linking method whereby a given object can effectively comprise both a graphical representation to a user and the URL address, thereby to serve as a hot link. In such a way, a web site developer need only include a pointer to the object (often as object with which the developer is accustomed to using), and the underlying tools and web site browsers will recognize the object as a hot link. One way to provide such a system would be to associate URL addresses directly with a graphical object, and preferably, provide some indication that this object is in the hot link class. The steganographic linking method of the present invention addresses this goal. The invention provides a common sense method whereby all web browsers and web tools can easily attach (i.e., embed) URL addresses to graphical objects. The method easily integrates into the current system in a way that does not require sweeping changes to well-entrenched file formats and transmission protocols.
Once steganographic methods of “hot link” navigation take hold, then, as new file formats and transmission protocols develop, more traditional methods of “header-based” information attachment can enhance the basic system built by a steganographic-based system. In this way, steganographic implementation of the present invention pays due heed to the huge installed base of file formats existing today, paving the way toward simple attached information implementations. Steganographic methods will retain one differential property in that, at least for more robust forms of steganography, address and index information can survive going into and out of the digital and network domain.
Another aspect of this invention pertains to unauthorized use and outright piracy of proprietary source material which, since time immemorial, has been a source of lost revenue, confusion, and artistic corruption.
These historical problems have been compounded by the advent of digital technology. With it, the technology of copying materials and redistributing them in unauthorized manners has reached new heights of sophistication, and more importantly, omnipresence. Lacking objective means for comparing an alleged copy of material with the original, owners and litigation proceedings are left with a subjective opinion of whether the alleged copy is stolen, or has been used in an unauthorized manner. Furthermore, there is no simple means of tracing a path to an original purchaser of the material—something which can be valuable in tracing where a possible “leak” of the material first occurred.
A variety of methods for protecting commercial material have been attempted. One is to scramble signals via an encoding method prior to distribution, and descramble prior to use. The technique, however, is of little use in mass market audio and visual media, where even a few dollars extra cost causes a major reduction in market, and where the signal must eventually be descrambed to be perceived, and thus can be easily recorded.
Another class of techniques relies or modification of source audio or video signals to include a subliminal identification signal, which can be sensed by electronic means. Examples of such systems are found in U.S. Pat. No. 4,972,471 and European patent publication EP 441,702, as well as in Komatsu et al., “Authentication System Using Concealed Image in Telematics,” Memoirs of the School of Science & Engineering, Waseda University, No. 52, p. 45-60 (1988) (Komatsu uses the term “digital watermark” for this technique). These techniques have the common characteristic that deterministic signals with well defined patterns and sequences within the source material convey the identifications information. For certain applications this is not a drawback. But is general, this is an inefficient form of embedding identification information for a variety of reasons: (a) the whole of the source material is not used; (b) deterministic patterns have a higher likelihood of being discovered and removed by a would-be pirate; and (c) the signals are not generally ‘holographic’ in that identifications may be difficult to make given only sections of the whole. (‘Holographic’ is used herein to refer to the property that the identification information is distributed globally throughout the coded signal, and can be fully discerned from an examination of even a fraction of the coded signal. Coding of this type is sometimes termed “distributed” herein.)
Among the cited references are descriptions of several program which perform steganography described in one document as “. . . the ancient art of hiding information is some otherwise inconspicuous information.” These programs variously allow computer users to hide their own messages inside digital image files and digital audio files. All do so by toggling the least significant bit (the lower order bit of a single data sample) of a given audio data stream or rasterized image. Some of these programs embed messages quite directly into the least significant bit, while other “pre-encrypt” or scramble a message first and then embed the encrypted data into the least significant bit.
Our curr

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Linking of computers using information steganographically... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Linking of computers using information steganographically..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Linking of computers using information steganographically... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2595952

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.