Network linking method using steganographically embedded data ob

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39518701, 395335, 380 4, 380 28, G06F 1300, H04L 900

Patent

active

058419780

ABSTRACT:
A given data object can effectively contain both a graphical representation to a network user and embedded information, such as the URL address of another network node, thereby to permit the object itself to serve as an automated hot link. The underlying development tools and web site browsers create and identify such an object for use in a manner similar to a hot link, as provided on the World Wide Web.

REFERENCES:
patent: 3569619 (1971-03-01), Simjian
patent: 3665162 (1972-05-01), Yamamoto et al.
patent: 3703628 (1972-11-01), Philipson, Jr.
patent: 3805238 (1974-04-01), Rothfjell
patent: 3838444 (1974-09-01), Loughlin et al.
patent: 3914877 (1975-10-01), Hines
patent: 3922074 (1975-11-01), Ikegami et al.
patent: 3984624 (1976-10-01), Waggener
patent: 4225967 (1980-09-01), Miwa et al.
patent: 4230990 (1980-10-01), Lert, Jr. et al.
patent: 4231113 (1980-10-01), Blasbalg
patent: 4238849 (1980-12-01), Gassmann
patent: 4252995 (1981-02-01), Schmidt et al.
patent: 4313197 (1982-01-01), Maxemchuk
patent: 4379947 (1983-04-01), Warner
patent: 4395600 (1983-07-01), Lundy et al.
patent: 4423415 (1983-12-01), Goldman
patent: 4425642 (1984-01-01), Moses et al.
patent: 4476468 (1984-10-01), Goldman
patent: 4528588 (1985-07-01), Lofberg
patent: 4532508 (1985-07-01), Ruell
patent: 4547804 (1985-10-01), Greenberg
patent: 4553261 (1985-11-01), Froessl
patent: 4590366 (1986-05-01), Rothfjell
patent: 4595950 (1986-06-01), Lofberg
patent: 4637051 (1987-01-01), Clark
patent: 4654867 (1987-03-01), Labedz et al.
patent: 4660221 (1987-04-01), Dlugos
patent: 4663518 (1987-05-01), Borror et al.
patent: 4665431 (1987-05-01), Cooper
patent: 4672605 (1987-06-01), Hustig et al.
patent: 4675746 (1987-06-01), Tetrick et al.
patent: 4677435 (1987-06-01), Causse D'Agraives et al.
patent: 4682794 (1987-07-01), Margolin
patent: 4703476 (1987-10-01), Howard
patent: 4712103 (1987-12-01), Gotanda
patent: 4718106 (1988-01-01), Weinblatt
patent: 4739377 (1988-04-01), Allen
patent: 4750173 (1988-06-01), Bluthgen
patent: 4765656 (1988-08-01), Becker et al.
patent: 4775901 (1988-10-01), Nakano
patent: 4776013 (1988-10-01), Kafri et al.
patent: 4805020 (1989-02-01), Greenberg
patent: 4807031 (1989-02-01), Broughton et al.
patent: 4811357 (1989-03-01), Betts et al.
patent: 4811408 (1989-03-01), Goldman
patent: 4820912 (1989-04-01), Samyn
patent: 4835517 (1989-05-01), van der Gracht et al.
patent: 4864618 (1989-09-01), Wright et al.
patent: 4866771 (1989-09-01), Bain
patent: 4876617 (1989-10-01), Best et al.
patent: 4879747 (1989-11-01), Leighton et al.
patent: 4884139 (1989-11-01), Pommier
patent: 4903301 (1990-02-01), Kondo et al.
patent: 4908836 (1990-03-01), Rushforth et al.
patent: 4908873 (1990-03-01), Philibert et al.
patent: 4921278 (1990-05-01), Shiang et al.
patent: 4939515 (1990-07-01), Adelson
patent: 4941150 (1990-07-01), Iwasaki
patent: 4943973 (1990-07-01), Werner
patent: 4943976 (1990-07-01), Ishigaki
patent: 4944036 (1990-07-01), Hyatt
patent: 4963998 (1990-10-01), Maufe
patent: 4965827 (1990-10-01), McDonald
patent: 4967273 (1990-10-01), Greenberg
patent: 4969041 (1990-11-01), O'Grady et al.
patent: 4972471 (1990-11-01), Gross et al.
patent: 4972476 (1990-11-01), Nathans
patent: 4979210 (1990-12-01), Nagata et al.
patent: 4993068 (1991-02-01), Piosenka et al.
patent: 4996530 (1991-02-01), Hilton
patent: 5010405 (1991-04-01), Schreiber et al.
patent: 5027401 (1991-06-01), Soltesz
patent: 5036513 (1991-07-01), Greenblatt
patent: 5063446 (1991-11-01), Gibson
patent: 5073899 (1991-12-01), Collier et al.
patent: 5079648 (1992-01-01), Maufe
patent: 5086469 (1992-02-01), Gupta et al.
patent: 5095196 (1992-03-01), Miyata
patent: 5148498 (1992-09-01), Resnikoff
patent: 5150409 (1992-09-01), Elsner
patent: 5161210 (1992-11-01), Druyvesteyn et al.
patent: 5166676 (1992-11-01), Milheiser
patent: 5181786 (1993-01-01), Hujink
patent: 5185736 (1993-02-01), Tyrrell et al.
patent: 5199081 (1993-03-01), Saito et al.
patent: 5200822 (1993-04-01), Bronfin et al.
patent: 5212551 (1993-05-01), Conanan
patent: 5213337 (1993-05-01), Sherman
patent: 5228056 (1993-07-01), Schilling
patent: 5243423 (1993-09-01), DeJean et al.
patent: 5245329 (1993-09-01), Gokcebay
patent: 5253078 (1993-10-01), Balkanski et al.
patent: 5258998 (1993-11-01), Koide
patent: 5259025 (1993-11-01), Monroe
patent: 5267334 (1993-11-01), Normille et al.
patent: 5280537 (1994-01-01), Sugiyama et al.
patent: 5293399 (1994-03-01), Hefti
patent: 5295203 (1994-03-01), Krause et al.
patent: 5299019 (1994-03-01), Pack et al.
patent: 5305400 (1994-04-01), Butera
patent: 5315098 (1994-05-01), Tow
patent: 5319453 (1994-06-01), Copriviza
patent: 5319724 (1994-06-01), Blonstein et al.
patent: 5319735 (1994-06-01), Preuss et al.
patent: 5325167 (1994-06-01), Melen
patent: 5351302 (1994-09-01), Leighton et al.
patent: 5379345 (1995-01-01), Greenberg
patent: 5394274 (1995-02-01), Kahn
patent: 5404377 (1995-04-01), Moses
patent: 5408542 (1995-04-01), Callahan
patent: 5422963 (1995-06-01), Chen et al.
patent: 5422995 (1995-06-01), Aoki et al.
patent: 5428607 (1995-06-01), Hiller et al.
patent: 5432870 (1995-07-01), Schwartz
patent: 5446273 (1995-08-01), Leslie
patent: 5450490 (1995-09-01), Jensen et al.
patent: 5469506 (1995-11-01), Berson et al.
patent: 5473631 (1995-12-01), Moses
patent: 5479168 (1995-12-01), Johnson et al.
patent: 5499294 (1996-03-01), Friedman
patent: 5515081 (1996-05-01), Vasilik
patent: 5530852 (1996-06-01), Meske, Jr. et al.
patent: 5613004 (1997-03-01), Cooperman et al.
Choudhury, et al., "Copyright Protection for Electronic Publishing over Computer Networks," IEEE Network Magazine, Jun. 1994, 18 pages.
Moller, et al., "Rechnergestutzte Steganographie: Wie sie Funktioniert und warum folglich jede Reglementierung von Verschlusselung unsinnig ist," DuD, Datenschutz und Datensicherung, 18/6 (1994) 318-326.
Pennebaker et al., JPEG Still Image Data Compression Standard, Chapter 3, "Aspects of the Human Visual System," pp. 23-27, 1993, Van Nostrand Reinhold, New York.
Castro et al., "Registration of Translated and Rotated Images Using Finite Fourier Transforms," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-9, No. 5, Sep. 1987, pp. 700-703.
Weber et al., "Correlative Image Registration," Seminars in Nuclear Medicine, vol XXIV, No. 4, Oct., 1994, pp. 311-323.
Toga et al., "Registration Revisited," Journal of Neuroscience Methods, 48 (1993), pp. 1-13.
Sheng et al., "Experiments on Pattern Recognition Using Invariant Fourier-Mellin Descriptors," Journal of Optical Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776.
Kurak et al., "A Cautionary Note On Image Downgrading," 1992 IEEE, pp. 153-159.
Wagner, "Fingerprinting," 1983 IEEE, pp. 18-22.
Hecht, "Embedded Data Glyph Technology for Hardcopy Digital Documents," SPIE vol. 2171, Feb. 1994, pp. 341-352.
Roberts, "Picture Coding Using Pseudorandom Noise," IRE Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp. 145-154.
Pitas et al., "Applying Signatures on Digital Images," IEEE Workshop on Nonlinear Image and Signal Processing, Neos Marmaras, Greece, pp. 460-463, Jun., 1995.
Rindfrey, "Towards an Equitable System for Access Control and Copyright Protection in Broadcast Image Services: The Equicrypt Approach," Intellectual Property Rights and New Technologies, Proc. of the Conference, R. Oldenbourg Verlag Wien Munchen 1995, 12 pages.
Komatsu et al., "A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature," Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990, pp. 22-33.
Schneier, "Digital Signatures, Cryptographic Algorithms Can Create Nonforgeable Signatures for Electronic Documents, Making Them Valid Legal Instruments" BYTE, Nov. 1993, pp. 309-312.
Komatsu et al., "Authentication System Using Concealed Image in Telematics," Memoirs of the School. of Science & Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.
Machado, "Announcing Stego 1.0a2, The First Steganography Tool for the Macintosh," Internet reference, Nov. 28, 1993, 3 pages.
Arachelian, "White Noise Storm," Apr. 11, 1994, Internet refer

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network linking method using steganographically embedded data ob does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network linking method using steganographically embedded data ob, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network linking method using steganographically embedded data ob will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1712843

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.