Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-09-13
2005-09-13
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S176000, C713S152000, C380S201000, C380S202000, C380S203000, C380S204000, C380S221000, C380S229000, C380S255000, C380S028000, C382S164000, C382S173000, C382S190000, C382S232000, C382S254000, C705S051000
Reexamination Certificate
active
06944771
ABSTRACT:
To overcome a watermark security system that is based on a limited set of possible watermark values, a collection of authentic watermarked material is created, and a substitution system provides material from this collection in lieu of the content material that the watermark verification system is intended to verify. In security systems that are designed to verify the existence of authentic watermarked material, without regard to the actual content of the material, this substitution scheme will be successful. In security systems that are designed to verify the existence of an entirety of a data set in order to authorize the presentation of select material from the data set, the substitution of authentic watermarked material for the non-selected material will also be successful. A dictionary of expected watermarks for the data set is provided. When the security system requests the watermarked segments of the selected material, the selected material is presented; when the security system requests watermarked segments of the non-selected material, the dictionary of expected watermarks is accessed, and the appropriate authentic watermarked material is presented from the stored collection.
REFERENCES:
patent: 4228348 (1980-10-01), Lee
patent: 5598526 (1997-01-01), Daniel et al.
patent: 5636362 (1997-06-01), Stone et al.
patent: 5666412 (1997-09-01), Handelman et al.
patent: 5734811 (1998-03-01), Croslin
patent: 5825892 (1998-10-01), Braudaway et al.
patent: 5915027 (1999-06-01), Cox et al.
patent: 6104826 (2000-08-01), Nakagawa et al.
patent: 6219634 (2001-04-01), Levine
patent: 6256736 (2001-07-01), Coppersmith et al.
patent: 6272634 (2001-08-01), Tewfik et al.
patent: 6282299 (2001-08-01), Tewfik et al.
patent: 6411725 (2002-06-01), Rhoads
patent: 6546397 (2003-04-01), Rempell
patent: 6631198 (2003-10-01), Hannigan et al.
patent: 6633654 (2003-10-01), Hannigan et al.
patent: 6674876 (2004-01-01), Hannigan et al.
patent: 6728408 (2004-04-01), Echizen et al.
patent: 6728414 (2004-04-01), Chang et al.
patent: 6751359 (2004-06-01), Handley
patent: 6766056 (2004-07-01), Huang et al.
patent: 6771812 (2004-08-01), Ikenoue
patent: 6785815 (2004-08-01), Serret-Avila et al.
patent: 6836549 (2004-12-01), Quan et al.
patent: 6839462 (2005-01-01), Kitney et al.
patent: 6850619 (2005-02-01), Hirai
patent: 6853726 (2005-02-01), Moskowitz et al.
patent: 6859790 (2005-02-01), Nonaka et al.
patent: 6885748 (2005-04-01), Wang
patent: 1215624 (2002-01-01), None
patent: WO 01362/0 (1888-12-01), None
Garofalakis et al, Digital Data Processing for intellectual Property Rights Preservation Over World Wide Web, 1977, IEEE, pp. 833-836.
Arnold, Michael, Computer Science; Digital Data provide invisible proof of copyright, Mar. 2003, Science Letter, p. 19.
Mobasseri, Bijan, Direct Sequence watermarking of Digital Video using m-frames, 1998, IEEE, pp. 399-403.
Thanos et al, Broadcasting Copyrighted Video, 2002, Broadcasting Engineering, pp. 6-7.
Mizrachi et al, Parameter Identification of a Classof Nonlinear Systems for Robust Audio Watermarking Verification, 2002, IEEE, pp. 13-15.
US 000040 filed on Mar. 28, 2000, Ser. No. 09/5436,944, Inventors: Antonius A. Staring et al., Entitled: Protecting Content Form Illicit Reproduction by Proof of Existence of a Complete Data Set via Self-Referencing Sections.
Craver et al: “Reading between the lines: Lessons from the SDMI challenge” PRoceedings of the USenix Security Symposium, Aug. 13, 2001, pp. 1-12.
Kirovski et al: “Replacement attack on arbitrary watermark systems” 2002 IEEE International Conference on Acoustics, Speech, and signal processing. Proceedings. ((IGASSP), May 18, 2002, vol. 4 of 4, pp IV3740-IV3743.
Halajian Dicran
Koninklijke Philips Electronics , N.V.
Moorthy Aravind K
Sheikh Ayaz
LandOfFree
Method and apparatus for overcoming a watermark security system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for overcoming a watermark security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for overcoming a watermark security system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3402620