Cryptography – Cryptanalysis
Patent
1996-01-17
1998-04-28
Gregory, Bernarr E.
Cryptography
Cryptanalysis
380 23, 380 25, 380 28, 380 49, 380 50, 380 54, H04L 900
Patent
active
057455694
ABSTRACT:
A method for protecting computer code copyrights by encoding the code into a data resource with a digital watermark. The digital watermark contains licensing information interwoven with essential code resources encoded into data resources. The result is that while an application program can be copied in an uninhibited manner, only the licensed user having the license code can access essential code resources to operate the program and any descendant copies bear the required license code.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4908873 (1990-03-01), Philibert et al.
patent: 4979210 (1990-12-01), Nagata et al.
patent: 4980782 (1990-12-01), Ginkel
patent: 5073925 (1991-12-01), Nagata et al.
patent: 5287407 (1994-02-01), Holmes
patent: 5319735 (1994-06-01), Preuss et al.
patent: 5365586 (1994-11-01), Indeck et al.
patent: 5379345 (1995-01-01), Greenberg
patent: 5408505 (1995-04-01), Indeck et al.
patent: 5412718 (1995-05-01), Narasimhalu et al.
patent: 5428606 (1995-06-01), Moskowitz
patent: 5488664 (1996-01-01), Shamir
patent: 5530759 (1996-06-01), Braudaway et al.
patent: 5606609 (1997-02-01), Houser et al.
Press, Flannery, Teukolsky and Vetterling, "Numerical Recipes in C", Cambridge University Press, 1988, 12. Fourier Transform Spectral Methods, pp. 398-470.
Pohlmann, Ken C., "Principles of Digital Audio", Third Edition, 1995, pp. 32-37, 40-48, 138, 147-149, 332, 333, 364, 499-501, 508-509, 564-571.
Pohlman, Ken C., "Principles of Digital Audio", Second Edition, 1991, pp. 1-9, 19-25, 30-33, 41-48, 54-57, 86-107, 375-387.
Schneier, B., "Applied Cryptography", John Wiley & Sons, Inc., New York 1994, particularly the following sections for steganography: 4.1 Subliminal Channel, pp. 66-68, 16.6 Subliminal Channel, pp. 387-392, particularly the following sections for cryptography Chapter 1: Foundations, pp. 1-16, Chapter 2: Protocol Building Blocks, pp. 17-41, Chapter 3: Basic Protocols, pp. 42-57. Chapter 12.1: Public-Key Algorithms Background, pp. 273-275, Chapter 14.1: One-Way Hash Functions, Background, pp. 321-324.
Kahn, D., "The Code Breakers", The Macmillan Company, 1969, particularly the following sections on steganography pp. xiii, 81-83, 513, 515, 522-526, 873.
Cooperman Marc
Moskowitz Scott A.
Gregory Bernarr E.
The Dice Company
LandOfFree
Method for stega-cipher protection of computer code does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for stega-cipher protection of computer code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for stega-cipher protection of computer code will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1540580