Information security – Prevention of unauthorized use of data including prevention... – Copy detection
Reexamination Certificate
2011-07-05
2011-07-05
Homayounmehr, Farid (Department: 2434)
Information security
Prevention of unauthorized use of data including prevention...
Copy detection
C380S200000, C380S201000, C380S202000, C726S026000
Reexamination Certificate
active
07975313
ABSTRACT:
A system and method is provided for identifying the source of an unauthorized copy of content. The method includes embedding a unique user fingerprint code to into each of a plurality of authorized copies of content and identifying an unknown fingerprint code in an unauthorized copy of the content. Each member of the unknown fingerprint code is compared to each corresponding member in each of the user fingerprint codes. A score is assigned to each of the user fingerprint codes based on the comparison and users associated with scores exceeding a threshold are identified as a source of the unauthorized copy.
REFERENCES:
patent: 5349655 (1994-09-01), Mann
patent: 5408642 (1995-04-01), Mann
patent: 6076165 (2000-06-01), Maenza
patent: 7082537 (2006-07-01), Muratani
patent: 2002/0133701 (2002-09-01), Lotspiech et al.
patent: 2003/0220921 (2003-11-01), Fagin et al.
patent: 2004/0098593 (2004-05-01), Muratani
patent: 2004/0153941 (2004-08-01), Muratani
patent: 2006/0056695 (2006-03-01), Wu et al.
patent: 2006/0085343 (2006-04-01), Lisanke et al.
patent: 2006/0239503 (2006-10-01), Petrovic et al.
patent: 2006/0259783 (2006-11-01), Work et al.
patent: 2006/0282676 (2006-12-01), Serret-Avila et al.
patent: 2007/0067242 (2007-03-01), Lotspiech et al.
patent: 2007/0180537 (2007-08-01), He et al.
arXiv:cs/0607131v1 Tardos fingerprinting is better than we thought B. Skoric, T.U. Vladimirova, M. Celik, J.C. Talstra Jul. 27, 2006.
Boneh et al., “Fully collusion resistant traitor tracing with short ciphertexts and private keys”,Eurocrypt '06, 2006, http://citeseer.ist.psu.edu./boneh06fully.html.
Hagiwara et al., “A short random fingerprinting code against a small number of pirates”, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. 16th International Symposium, AAECC-16. Proceedings (Lecture Notes in Computer Science vol. 3857) pp. 193-202 (Feb. 20-24, 2006).
Seol, et al., “A scalable fingerprinting scheme for tracing traitors/colluders in large scale contents distribution environments”, Intelligent Systems Design and Applications, 2005. ISDA '05. Proceedings. 5th International Conference Sep. 8-10, 2005 pp. 228-233.
Celik et al., “Collusion-resilient fingerprinting using random prewarping” Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference vol. 1, Sep. 14-17, 2003 p. I-509-12 vol. 1.
Tardos, G, “Optimal probabilistic fingerprint codes” Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003, pp. 116-125.
Homayounmehr Farid
International Business Machines - Corporation
Kaplan Benjamin A
Kashef Mohammed
Wenskay Donald L.
LandOfFree
System and method for tracing Tardos fingerprint codes does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for tracing Tardos fingerprint codes, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for tracing Tardos fingerprint codes will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2686150