Method for stega-cipher protection of computer code

Cryptography – Cryptanalysis

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 23, 380 25, 380 28, 380 49, 380 50, 380 54, H04L 900

Patent

active

057455694

ABSTRACT:
A method for protecting computer code copyrights by encoding the code into a data resource with a digital watermark. The digital watermark contains licensing information interwoven with essential code resources encoded into data resources. The result is that while an application program can be copied in an uninhibited manner, only the licensed user having the license code can access essential code resources to operate the program and any descendant copies bear the required license code.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4908873 (1990-03-01), Philibert et al.
patent: 4979210 (1990-12-01), Nagata et al.
patent: 4980782 (1990-12-01), Ginkel
patent: 5073925 (1991-12-01), Nagata et al.
patent: 5287407 (1994-02-01), Holmes
patent: 5319735 (1994-06-01), Preuss et al.
patent: 5365586 (1994-11-01), Indeck et al.
patent: 5379345 (1995-01-01), Greenberg
patent: 5408505 (1995-04-01), Indeck et al.
patent: 5412718 (1995-05-01), Narasimhalu et al.
patent: 5428606 (1995-06-01), Moskowitz
patent: 5488664 (1996-01-01), Shamir
patent: 5530759 (1996-06-01), Braudaway et al.
patent: 5606609 (1997-02-01), Houser et al.
Press, Flannery, Teukolsky and Vetterling, "Numerical Recipes in C", Cambridge University Press, 1988, 12. Fourier Transform Spectral Methods, pp. 398-470.
Pohlmann, Ken C., "Principles of Digital Audio", Third Edition, 1995, pp. 32-37, 40-48, 138, 147-149, 332, 333, 364, 499-501, 508-509, 564-571.
Pohlman, Ken C., "Principles of Digital Audio", Second Edition, 1991, pp. 1-9, 19-25, 30-33, 41-48, 54-57, 86-107, 375-387.
Schneier, B., "Applied Cryptography", John Wiley & Sons, Inc., New York 1994, particularly the following sections for steganography: 4.1 Subliminal Channel, pp. 66-68, 16.6 Subliminal Channel, pp. 387-392, particularly the following sections for cryptography Chapter 1: Foundations, pp. 1-16, Chapter 2: Protocol Building Blocks, pp. 17-41, Chapter 3: Basic Protocols, pp. 42-57. Chapter 12.1: Public-Key Algorithms Background, pp. 273-275, Chapter 14.1: One-Way Hash Functions, Background, pp. 321-324.
Kahn, D., "The Code Breakers", The Macmillan Company, 1969, particularly the following sections on steganography pp. xiii, 81-83, 513, 515, 522-526, 873.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for stega-cipher protection of computer code does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for stega-cipher protection of computer code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for stega-cipher protection of computer code will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1540580

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.