CN1381047A - Protecting content from illicit reproduction - Google Patents

Protecting content from illicit reproduction Download PDF

Info

Publication number
CN1381047A
CN1381047A CN01800849.6A CN01800849A CN1381047A CN 1381047 A CN1381047 A CN 1381047A CN 01800849 A CN01800849 A CN 01800849A CN 1381047 A CN1381047 A CN 1381047A
Authority
CN
China
Prior art keywords
section
sections
data
data set
linked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN01800849.6A
Other languages
Chinese (zh)
Other versions
CN1214383C (en
Inventor
A·A·M·斯塔林
M·A·埃普斯坦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/537,079 external-priority patent/US6865676B1/en
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of CN1381047A publication Critical patent/CN1381047A/en
Application granted granted Critical
Publication of CN1214383C publication Critical patent/CN1214383C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00166Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00681Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access
    • G11B20/00695Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access said measures preventing that data are read from the recording medium
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0064Image watermarking for copy protection or copy management, e.g. CGMS, copy only once, one-time copy

Abstract

A sufficient number of data items are selected (112) for inclusion in a data set so as to discourage a transmission of the entire set over a limited bandwidth communications path (130), such as the Internet. Each data item comprises one or more sections, which taken together constitute the complete data set. Each section of the data set is linked to another section of the data set, and each section's link is bound to the section via the use of one or more watermarks. Upon presentation of material for rendering, the presence of the entirety of the data set is verified (126) by ascertaining the presence of linked-to sections. For further security, the links between sections is formed by a random selection of each linked-to section. To verify that each linked-to section corresponds to the original section that was linked-to, each link contains an identifier of the linked-to section that can be used to determine that a retrieval of a linked-to section corresponds to the originally assigned linked-to section. If the identifier associated with the linked-to section does not properly match the presented linked-to section, a rendering of the data items of the data set is prevented. In a preferred embodiment, a closed linked list is formed, so that every section of the data set can be included in the verification process, if desired.

Description

The protection content from illicit reproduction
Background of invention
1. invention field
The present invention relates generally to consumer electronics field, and relates in particular to the protection to the content material of duplicating secure.
2. description of Related Art
The illicit distributions of copyright material has been seized the legitimate royalties of copyright ownerL copyrighted material's owner to this material, and encourages it to proceed illicit distributions for supplier's offer of advantages of this material of illicit distributions.Because the Internet can provide information transfer flexibly, so will be carried out the content material of copy protection, art recurring or other material of limited circulation right for example is easily by large-scale illicit distributions.The MP3 format that is used for storing and shift the audio file of compression has made the distribution on a large scale of audio sound-recording practical, because the digital audio recordings of 30 or 40 megabyte of a first song can be compressed into the mp3 file of 3 or 4 megabyte.Use the general 56kbps dial-up connection to the Internet, this mp3 file just can download on the user's computer in a few minutes.Therefore a malice clique can read song from a legal CD of master, and this song is encoded into MP3 format, and the song behind the MP3 coding is put into carries out large-scale illicit distributions on the Internet.Perhaps malice clique can provide one directly to dial in service and be used for downloading song behind the MP3 coding.The illegal copies of this song behind the MP3 coding can be subsequently by software or hardware device regeneration, and maybe can being extracted contracts is stored in recordable CD upward so that reset on common CD player.
The duplicating of content material that a plurality of schemes limit duplicating secure proposed.Secure Digital Music Initiative advocates (SDMI) and other scheme is advocated the content material that mandate is discerned in use " digital watermarking ".The EP 0981901 " Embedding auxiliary data ina signal (embedding auxiliary data in signal) " that announces on March 1st, 2000 discloses a kind of technology of watermark electronic material.Be similar to its paper watermark copy, digital watermarking is embedded in the content material so that detect, but it is unshowy.For example an audio playback that comprises the digital musical recordings of watermark will can't be distinguished basically with a playback that does not comprise the identical disc of watermark.Yet a watermark detection equipment can be based on having or not watermark to distinguish this two discs.Since some content material may not be duplicating secure and therefore may not comprise watermark, so there is not watermark can not be used to distinguish legal and illegal material.Otherwise, do not have watermark to represent that content material can be copied legally by freedom.
Other duplicating secure scheme also can obtain.For example be published in the European patent EP 0906700 " Method and system for transferring contentinformation and supplemental information related thereto (shifting the method and system that content information reaches relevant side information) " on April 7th, 1999, propose a kind of technology of protecting copyright material by the watermark " ticket " of using the protected material regeneration number of times of may command.
Adding accurately duplicating of watermark material can make this watermark be replicated in this adds the copy of watermark material.Yet adding in the out of true of watermark material or the lossy lossy copy that is replicated in this material to provide duplicating of this watermark.Those a plurality of protection schemes that comprise SDMI have utilized lossy feature of duplicating to come based on having or not correct watermark to go to distinguish legal and illegal material.In the situation of SDMI, two kinds of watermarks have been defined: " robust " watermark and " fragility " watermark.Robust watermarking is meant to be estimated afford to stand lossy a kind of watermark of duplicating, and it is designed to keep the essential part of original content material, for example the MP3 of audio record coding.In other words, this original disc if the sufficient information of duplicate reservation allows reasonably to regenerate, this robust watermarking also will remain so.On the other hand, fragile watermark is meant that the expectation meeting duplicated or watermark that other illegal infringement is destroyed by lossy.
In the SDMI scheme, have robust watermarking just to represent that this content material is a duplicating secure, and when robust watermarking, corresponding fragile watermark does not exist or suffers to destroy and just represent that this duplicating secure material is damaged in some way.The SDMI compatible equipment can be configured to refuse to containing the watermark or have the material of can detected robust watermarking but lacking fragile watermark to regenerate of going to pot; unless prove the destruction of watermark or do not exist to be well-founded by " SDMI-evaluation " process, the SDMI compression of the duplicating secure material that for example on portable player, uses.For ease of reference and understanding, here the term of Shi Yonging " regeneration " comprises any processing or the transfer of the content material that resembles broadcast, recording, conversion, checking, storage, loading or the like.This scheme is used to limit the distribution through the content material of MP3 or other compress technique, but can not influence the distribution of the forgery of content material, change (compression) duplicate.This limited protection be considered to commercial be feasible can stop because download cost and the inconvenience that an extremely big file obtains a first song the not theft of compressed content material.
Summary of the invention
The objective of the invention is and to expand to comprise the not protection of compressed content material the protection of duplicating secure material.For this reason, the invention provides as what define in the independent claims and a kind ofly be used to find the method for stealing, a kind of coding method, a kind of storage medium, a kind of encoder.Advantageous embodiment is defined in the independent claims.
Being used to be included in data by the data item of selecting enough numbers concentrates and can stop whole data set to transmit on the band-limited communication path of for example the Internet.Each data item comprises one or more sections, and all sections are formed this complete data set.Each of data set section is linked to another section of this data set, by using one or more watermarks the link of each section is bundled on this section.When providing material and be used to regenerate, the existence of check data collection integrality by the existence of confirming the section of being linked to.For further safety, form intersegmental link by selecting each section of being linked at random.In order to check each section of being linked to corresponding with the original segment that is linked to, each link comprises that is linked to a segment identifier, is used to judge that the reproduction of the section of being linked to is corresponding with the section of being linked to of initial allocation.If the identifier that is associated with the section of being linked to can not correctly mate the current section of being linked to, then the regeneration of the data item of data set is prevented from.Each of data set in a preferred embodiment, if desired, then form a closed lists of links, so that section can be comprised in the checkout procedure.
The accompanying drawing summary
By example and with reference to the accompanying drawings, will be further explained in detail the present invention, wherein:
Fig. 1 shows one according to the example system that is used to protect the duplicating secure content material of the present invention;
Fig. 2 shows one and is convenient to the sample data structure whether decision data collection integrality exists according to of the present invention;
Fig. 3 shows one and is convenient to whether decision data collection integrality exists and check data is concentrated the example optional data structure of section according to of the present invention;
Fig. 4 shows one according to the example optional data structure of being convenient to according to the existence of statistics degree of certainty decision data collection integrality of the present invention.
In these accompanying drawings, characteristic same reference number TYP or corresponding or function.
Detailed Description Of The Invention
For the ease of understanding, the present invention herein provides in the environment of the song of digital recording.As conspicuous to a technician in this area, the present invention is applicable to that any expectation will be by the recorded information of band-limited path transmission.For example, single content material item can be a data recording in the big database, rather than a song book.
The value of usurping by the time ratio that makes theft consume is more or make it more inconvenient, can stop the theft to an item.For example, (bolted-down) proof box of bolt often is used to protect little value article, usually will be above stealing the income that this proof box expectation obtains because steal the needed effort of this proof box.Micheal Epstein submitted to March 28 calendar year 2001; sequence number is 09/537; 815; attorney docket is the common unsettled U.S. Patent application " Protecting Content from IllicitReproduction by Proof of Existence of a Complete Data Set (content from illicit reproduction is protected in the existence by the checking complete data set) " of US000035 (disclosure 709999B); data item is selected and bundled to instruction to the enough big data set of size, transmits by the band-limited communication system of for example the Internet to stop this data set.The binding of this common pending application instruction data centralization data item will comprise the watermark of data set integrity parameter and this watermark is embedded in each section of each data item and carry out by creating one.This common pending application also is taught in the specific parameter (for a random number of each section distribution) of the section of comprising in the watermark.
The information that the common pending application instruction of this reference uses " being with outer data " to go to comprise this integrity parameters or can be used for judging integrity parameters.Duan Shuiyin is compared with this integrity parameters to guarantee that they are the same sections that are used to create data set and this integrity parameters.In order to make the possibility minimum of forgery, the hash that the integrity parameters section of being based on unique identifier is synthetic.The common pending application of this reference is also instructed and is used digital signature and other to depend on the technology of cryptographic technique, as hashing etc.
According to the present invention, be used at this data set that refers to certainly so that judges the integrality that whether has data set, be with outer data and cipher function and do not use, as hash function.If data set integrity does not exist, then the processing to the data set data item subsequently is terminated.In the environment of digital audio frequency recording, under the condition that lacks complete CD content, the playback of a compatibility or sound pick-up outfit are configured to refuse to regenerate an independent song.Download on the CD the not required time of full songs collection of compressed digital form, even with the speed of DSL and cable modem, estimating also can be greater than one hour, and this depends on the load and the other factors of network.Therefore, by requiring to provide the complete content of CD, be download " cost " to surpass one hour, the theft song has reduced basically by the possibility of the Internet widespread distribution.
Fig. 1 shows the example block diagram according to protection system 100 of the present invention.This protection system 100 comprises a scrambler 110 that content material is encoded to medium 130; Demoder 120 from medium 130 these content materials of regeneration.Scrambler 110 comprises that 112, one of the selector switchs of a chosen content material from the SRC of source are used to set up the bundled device 116 of integrity check structure, and one records register 114 on the medium 130 with content material.Selector switch 112 for example possible configuration is selection and the corresponding content material of song of having compiled a song book.Convenient for reference, each selected content material item is known as " data item ", and the integral body of data item forms one " data set ".Each data item comprises the one or more data segments that form this data item, all formation " data set " again of this data segment.Bundled device 116 is created a data structure of being made up of " data set " intersegmental link, but the integrality by its check data collection.Preferably, by using one or more watermarks, each section link is bound to this section.Use the ordinary skill in this area, register 114 just can be suitably this information format, encode and store on the medium 130.
According to the present invention, selector switch 112 selects to be added into the data item of data set, is considered to enough greatly up to the size of this data set, can stop this data set afterwards by band-limited traffic channel.This " prevention size " is the numerical value of a subjectivity, and will depend on the available communication bandwidth of hypothesis, loss that transmission causes or the like.Also can use other standard to determine whether increasing extra data item to this data centralization.For example, if data item corresponding to the song in the existing song book, then no matter whether the size of this data set has surpassed determined prevention size, and is typically added all songs to this data centralization.If all songs in this song book are selected and do not reach the standard that stops size, then other data item is selected reaches required prevention size with accumulation.For example, in order to increase length, the data item that comprises the random data bit may be added into data centralization.These random bits as the outer data of band, CD-ROM data or the like storage, are regenerated as audible sounds by common CD player to prevent it usually.Perhaps, other the sample song that provides for the sale of encouraging other song book relevant with this record content material, picture and video fragment may be provided this data item.Equally, other promote material, and for example the Internet inserts pre-booking process and also can be included in the recorded information on the recording medium.According to the present invention, make data set increase these or alternate manner of size, be conspicuous for the those of ordinary skill of this area.
According to the present invention, demoder 120 comprises a regenerator 122 and the door 124 by integrity checker 126 controls.This regenerator 122 is configured to read equipment from medium, for example retrieve data in the CD reader 132.As more common ground in this area, regenerator 122 comes retrieving information by specifying a location index, and to its response, reader 132 provides the data that are positioned at assigned address index place on the medium 130.The one-tenth piece of data reads the influence that is subjected to appointed positions index and block size on the continuous position of medium 130.
Dotted line among Fig. 1 has illustrated the song extraction apparatus 142 of an example, and it extracts songs from medium 130, and it is passed to the CD imitator 144 of example, and the latter represents the possible the Internet illegal download song of passing through.These CD imitator 144 typical examples are as a software program, and it provides information in response to common CD read command.In addition, the information that receives from the song extraction apparatus can be written into the CD medium and offer traditional CD reader 132.Emphasize that as top because the large scale content that hypothesis is had a mind in the medium 130 makes the transmission of whole contents of medium 130 be prevented from, so this song extraction apparatus 142 is used probably.
According to the present invention, integrity checker 126 is configured to typically obtain data to judge whether whole data set exists from medium 130 by regenerator 122.
Fig. 2 has illustrated and has been used for the sample data structure 200 of store data items in data centralization that it is convenient to judge whether the integrality of raw data set exists.The structure of track 210 and section 220 is illustrated, and this storage organization with traditional CD and other storage medium is consistent.As shown in, each track T210 comprise varying number the section S220.In this sample data structure 200, each section S220 comprises the link 230 of another section S in the data structure 220.In preferred embodiments, the link 230 of each section 220 is based on the selection at random of available other link.First of track T0 place section S (0,0) for example, promptly section S (0,0) 220a has one " link " section S (1,1) to track T1 place, i.e. the associated link La230a of section S (1,1) 220f.This section 220f has an associated link Lf230f who is linked to the section (m, 0) at track Tm place.In preferred embodiments, link forms a closed lists of links, makes to run through closed loop of data set formation from being linked to link.When selection course at random when each section of being linked to advances past data set, first section of the reception section of being linked at random (in this example, section S (0,0) 220a) is held standby and distributes obtainable a section of selection at random to each section of being linked to.When all sections were assigned with as the section of being linked to, first section was assigned with the section of being linked to as back segment.For example, (1, n1) last section of being linked to of 220h representative data collection 200, and its section of being linked to Lh230h is first section S (0 to section S in the sample data structure 200 shown in Figure 2,0) 220a, thus constitute the closed lists of links of all sections 220 of this data set 200.To advance past the integrality of data set 200 and the mode check data collection 200 of checking each section of being linked to exist through link L230.Increased by the difficulty that a Random Links tabulation is provided, creates the forgery shortening tabulation that comprises a first full songs.In order to prevent to link substituting of distribution, the link L230 of each section 220 preferably is encoded to the mixing of robust and crisp fragile watermark, for example be linked to orbit number and be encoded into robust watermarking, and the section of being linked in this track is encoded into fragile watermark.As noted above, robust watermarking is exactly that its removal can cause the basic infringement of the data that it is embedded or the watermark of destruction, and embedded data are modified or delete the watermark that (as being compressed) can cause its infringement or destruction if fragile watermark is exactly it.
Fig. 3 shows the example optional data structure 300 being convenient to further to check lists of links and each section of being linked to also not to be modified or substituting.In data structure 300, a random number R (T, S) 332 each section S220 that are assigned to each track T210, as in the common pending application of this reference, and the random number of the section of being linked to of each section R (L) 336 also is assigned to each section S220.When linking 230 when running through at random closed lists of links through what be associated with section 220, (T S) 332 compares with random number R that the section of being linked to is located with the random number R (L) 336 of the section of being linked to of this distribution.These random numbers also are encoded as the watermark that embeds section 220.Preferably, these numbers are encoded as fragile watermark, because the resource that fragile watermark consumes lacks than robust watermarking, and fragile watermark is to modification (as the compression) sensitivity of its embedded segment data.For the present invention, it is conspicuous that other of robust and fragile watermark arranged a those of ordinary skill for this area.Similarly, can use in each section other method of creating identifier, as a number is put in the section, and the functional value that will count is put into its section of being linked to.
At this, embodiment comes into question and is used to create the sample data structure 300 of Fig. 3.The data item accumulation, is for example downloaded from the Internet to such an extent as to can stop through band-limited traffic channel data set to form enough big data set.When each data item was selected, each section of forming this data item was assigned to a random number that is used to identify this section, and its size is added to the accumulated size of this data set.Behind the data set of a sufficient size of accumulation, as discussed above, the closed at random lists of links of the section of this data set is created.Create one or more watermarks for each data segment, comprise random number, the section of being linked to of distributing to this section and the random number of distributing to the section of being linked to.As mentioned above, the combination of robust and fragile watermark is preferably used for the information coding to related each section.This section and its embed watermark are recorded to recording medium, on a CD.
At this, the embodiment that the existence that depends on data set integrity comes the data item of playback of data collection is discussed, use the existence of the sample data structure 300 decision data collection integralities of Fig. 3.For example suppose the watermark of material or other mark after testing, reclaim equiment has detected the existence of duplicating secure material.Beginning section S is preferably selected at random.The watermark of beginning section S is read.This watermark comprises the chained address of a track designation and another section segment number, and comprises the random number that is associated with the section at place, chained address.The watermark of the section of being linked to is read.This watermark comprises the random number that is assigned to the section of being linked to, and its chained address and the random number that is associated.Be comprised in making comparisons in the beginning section with related random number of the section of being linked to and the random number that is comprised in the section of being linked to.If random number is unequal, then the regeneration with aftertreatment such as song of data centralization data item is terminated.As above mentioned, other link identifiers technology also can be used, and as random number being deposited in the section, and the function that will count such as hash function deposit in this section of being linked to.If use an alternative encoding scheme, then relatively will make corresponding modification.
If segment identifier is found to be of equal value, then handles by advancing to the section of being linked to and continue.Above-mentioned segment identifier coupling continues as each section of being linked to subsequently carries out, up to obtaining the enough assurance that relevant data collection integrality exists.In the present embodiment, absolute belief can obtain for initial beginning section up to the section of being linked to by continuation, and this shows that the all-links in the closed lists of links is processed.Yet it is consuming time reading each watermark, and a large amount of time-delays before the first song of regenerating are difficult to accept to the consumer.In a preferred embodiment, after successfully mating, some random numbers get started the regeneration song.Thereafter, if regenerative system can require to read information from medium quickly than this material of regeneration, then the Fu Jia section of being linked to watermark is read out and checks, and if and when an erroneous matching is found then stop regenerating.
For the present invention, other structure and respective coding and decoding processing are conspicuous to a those of ordinary skill of this area.Fig. 4 shows the optional data structure 600 that the use section of being linked at random comes check data collection integrality to exist.In Fig. 4, each section 620 has the section of being linked to that an is associated L634 and a random number R that is associated 636.In the optional embodiment of this example, the section of being linked to 620 ' has a finger to get back to by the be linked to section L634 ' of link from section 620.Just, being linked to address L634,634 ', to form the link of section 620,620 ' right.In the notebook data structure, public random number R 636 sections of being assigned to 620,620 ' link each right section.For whether decision data collection integrality exists, equal the mode of random number at its section of being linked to place with the random number of checking each section, the section that test is selected at random.Scope or approximate range in this supposition sector address can determine that making first " select section at random " is the section implemented on the recording medium.For example, the Media Contents table can be used for judging can implement the track address, supposes that this contents table has the fragile watermark of an embedding, or other safety equipment, and then they are used to judge the legitimacy of contents table.If scope can not determine, then first at random the section of selection will from track, be selected be used for regeneration.By this way, if a malice clique uses song extraction apparatus 142 (Fig. 1) " to tear " a first song from CD, and through the Internet with the compression or incompressible form transmit it, then link check will cause: concentrate any link in the song section of another first song inner segment for being linked to raw data, do not respond from be " track-section is found " of CD reader 132 or CD imitator 144.If respond this check request, imitator 144 substitutes forges section, and then this forgery section will not comprise suitable random digit watermark, and integrity checker 126 is torn prevention the further regeneration of song.
No matter whether selected song is used to produce first section that is used to check, can obtain the absolute of all sections existence and determine by keeping one tested section tabulation, and check continues up to all sections-to through test.The scope of this method hypothesis sector address can be determined or estimate, to such an extent as to blocking of data set can be detected.Be used to start under the situation of check in selected song, the scope of sector address is supposed continuously by the chained address scope in the selected song.For example, if one of them chained address section of being 9, track 10, then will to track 10 0 to 9 each the section test, and the check track 0 to 10 the section 0.For present disclosure, the technology that these and those are used to fill in the region of search is conspicuous to a those of ordinary skill of this area.
In preferred embodiments, influence relevant data collection integrality and exist to judge the required time in order to minimize, random section to tested up to obtaining enough assurance to prove this judgement in conjunction with basic reliability of statistics.Just, for example, only when half data set physical presence, in the overall range of all sections, select first section at random, may detect that this section does not exist in 50% time; If this section exists, then the possibility of its section of being linked to existence is 50%.Therefore, the pairwise testing of a success can provide 75% the assurance that at least one half data collection is existed.Each continuous test increases degree of confidence or increases the desired proportion that data set exists, and perhaps the both increases.Statistical test can be used for usually judging that the pairwise testing of suitable number is to obtain the expectation degree of confidence that relevant given data set partly exists.In typical embodiments, select right check to be considered to be enough to the existence of decision data collection integrality or do not exist at random at least 5.
The front only shows bright principle of the present invention.Therefore be appreciated that those skilled in the art can design various arrangements, although do not describe clearly or show these arrangements at this, their imbodies principle of the present invention and thereby within the spirit and scope of the present invention.For example, to be recorded each part of material be the part of data set to the explanation of the above-mentioned example.In optional embodiment, for the purpose of efficient, selection can be used to form the data item or the data item part of data set.For example, the song afterbody is not the part of " data set " that define here, because for each redundant copies of each watermark or watermark, watermark processing may be based on a fixing piece size.For example, if watermark or other parameter need a record of 10 seconds reliably to embed, then the remainder of ((length of song) mould (10 seconds)) will record on the medium, but not be included in " data set " of having checked integrality.In a similar manner, the material of some promotion may be included in the recording medium, but deliberately gets rid of from data centralization, and it just can arbitrarily be copied and regenerate elsewhere like this.The process flow diagram that also is noted that example provides for the ease of understanding, and specific equipment and sequence of steps are used for explanation.For example, simply equate to be illustrated in the conforming decision block determining, but rely on the particular technology of this parameter that is used to encode or decode, about whether reading and being determined the assessment that item conforms to and comprising various pilot process.These processes may comprise, for example, decode to determine whether " enough approaching " arrives consistent degree of meaning or the like to two values based on the item of particular key, fuzzy logic or statistical test.For the present invention, be conspicuous such as a those of ordinary skill in the transfer pair this area of these and other, and they are included in the scope of following claim.In the claims, any reference symbol of placing in round bracket will not be considered to limit this claim.Word " comprises " other element do not got rid of outside listing in the claim or the existence of step.Enforcement of the present invention can be carried out by means of the hardware that comprises several independent elements, also can carry out by means of programmed computer suitably.In enumerating the equipment claim of several devices, can with same hardware branch realize these the device in several.The fact of narrating in the dependent claims that differs from one another does not show and cannot benefit with the combination of these methods someway.

Claims (25)

  1. A kind of method of stealing content material that stops comprises:
    1. a plurality of data item (210) of this content material of gathering composition make to stop the subsequent transmission of this data set by band-limited communication channel to form a data set that size is enough big,
    Each data item of this data item (210) comprises one or more sections (220), forms a plurality of sections (220) forming this data set thus,
    A chained address (230) is distributed to each section of a plurality of sections (220), this chained address (230) is associated with another section of these a plurality of sections (220), so that detect not existing of this data set integrity subsequently according to not existing of the section of being linked to, this section of being linked to is corresponding with the chained address (230) of one or more select segments of a plurality of sections (220).
  2. 2. the method for claim 1 further comprises:
    Encode the chained address (230) of each section as the one or more watermarks that embed this section.
  3. 3. the method for claim 2, wherein:
    One or more watermarks comprise:
    A robust watermarking, it is configured to the feasible destruction that this robust watermarking can cause the data that this section comprises of removing, and
    A fragile watermark, it is configured to make to revise the destruction that data that this section comprise can cause this fragile watermark.
  4. 4. the process of claim 1 wherein and distribute chained address (230) to comprise for each section:
    Establishment is through a closed lists of links of all sections of the chained address (230) of each section link.
  5. 5. the method for claim 4 is wherein created closed lists of links and is comprised that one is selected at random.
  6. 6. the process of claim 1 wherein and distribute chained address (230) to comprise for each section:
    Select other section at random so that (230) are linked to this section through the chained address.
  7. 7. the method for claim 1 further comprises:
    Distribute inspection parameter (332) to give each section of a plurality of sections (220), so that each section of corresponding each chained address of check (230) is effective section subsequently.
  8. 8. the method for claim 7 further comprises:
    Encode the chained address (230) of each section and inspection parameter (332) as the one or more watermarks that embed this section.
  9. 9. the method for claim 8, wherein:
    These one or more watermarks comprise:
    A robust watermarking, it is configured to the feasible destruction that this robust watermarking can cause the data that this section comprises of removing, and
    A fragile watermark, it is configured to make to revise the destruction that data that this section comprise can cause this fragile watermark.
  10. 10. one kind comprises the method for decoding from the content material in the source:
    Read one or more first integrity parameters (230,332,336) that are associated with first section (220) of data set,
    These one or more first integrity parameters (230,332,336) are included in one second section chained address (230) of this data set,
    Read one or more second integrity parameters (230,332,336) that are associated with second section (220) of this data set, and
    Depend on the subsequent segment that reads this data set of decoding of these one or more second integrity parameters (230,332,336).
  11. 11. the method for claim 10, wherein:
    One or more second integrity parameters (230,332,336) comprise a section inspection parameter (332), and
    The decode successive section will depend on this section inspection parameter (332).
  12. 12. the method for claim 11, wherein
    Section inspection parameter (332) is included in a random number that is associated with second section when data set is created.
  13. 13. the method for claim 10 further comprises
    Based on reading of second integrity parameters (230,332,336), read the follow-up integrity parameters (230,332,336) that is associated with other section of this data set,
    Wherein
    The decoding of data set subsequent segment further depends on reading of integrity parameters (230,332,336) subsequently.
  14. 14. the method for claim 13 further comprises
    Judge when reading of follow-up integrity parameters (230,332,336) comprises that reading of all sections of data set finish.
  15. 15. the method for claim 10 further comprises
    The content material of regeneration corresponding data collection subsequent segment.
  16. 16. the method for claim 10, wherein
    These one or more second integrity parameters (230,332,336) are embedded in second section as one or more watermarks.
  17. 17. the method for claim 16, wherein
    These one or more watermarks comprise:
    A robust watermarking, it is configured to the feasible destruction that this robust watermarking can cause second section data that comprise of removing, and
    A fragile watermark, it is configured to the feasible second section destruction that the data that comprise can cause this fragile watermark of revising.
  18. 18. a storage medium (130) that is configured to the content material, this storage medium (130) comprising:
    A data structure (200,300) comprising:
    A plurality of sections (220), and
    The integrity parameters (230,332,336) of one or more each sections corresponding to these a plurality of sections (220),
    Wherein
    These one or more integrity parameters (230,332,336) comprise a chained address, the corresponding section of its link is to another section of these a plurality of sections (220), so that judge the integrality that whether has these a plurality of sections (220) on the copy subsequently of these a plurality of sections (220) at least a portion.
  19. 19. a scrambler (110) comprising:
    A selector switch (112), it is configured to select to form the data item (210) of a data set, makes the accumulated size of data set be enough to stop through this data set of band-limited traffic channel,
    Each data item of this data item (210) comprises one or more sections (220),
    A bundled device (116) that is configured to chained address (230) are associated with each section of the data item (210) of forming data set, this chained address (230) be corresponding to another section of the data item (210) of forming data set, and
    A register (114), it is configured to write down each section and medium (130) is arrived in each chained address that is associated (230), so that according to the existence of one or more other sections of this data item (210) and this data item (210) of regenerating subsequently, described one or more other sections are corresponding to the chained address (230) of one or more sections (220) of this data set.
  20. 20. the scrambler of claim 19 (110), wherein
    Bundled device (116) is further configured through random processing chained address (230) is associated with each section.
  21. 21. the scrambler of claim 19 (110), wherein
    Bundled device (116) is further configured a section inspection parameter (332) is associated with each section, and
    Register (114) is further configured into the section inspection parameter (332) of each section of record, so that there is this section in check in the regeneration subsequently of data item (210).
  22. 22. the scrambler of claim 19 (110), wherein
    Bundled device (116) is associated with each section based on random processing with this section inspection parameter (332).
  23. 23. a demoder (120) comprising:
    A regenerator (122), it is configured to receive the data item (210) of corresponding data collection, and the regeneration that from then on produces the corresponding selection data item,
    Each data item of this data item (210) comprises one or more sections (220), forms a plurality of sections (220) forming this data set thus,
    Each section of a plurality of sections (220) comprises the chained address (230) of another section of corresponding data collection, and
    An integrity checker (126), operationally be coupled to regenerator (122), be configured to get rid of based on the existence of one or more other sections the regeneration of corresponding selection data item, described one or more other sections are corresponding to the chained address (230) of one or more sections (220) of a plurality of sections (220).
  24. 24. the demoder of claim 23 (120), wherein
    This integrity checker (126) is further configured into the existence of all other sections of all sections chained address (230) of judgement corresponding a plurality of sections (220).
  25. 25. the demoder of claim 23 (120), wherein
    This integrity checker (126) is further configured the existence of checking one or more other sections based on the inspection parameter (332) of related each section.
CN01800849.6A 2000-02-07 2001-02-05 Protecting content from illicit reproduction Expired - Fee Related CN1214383C (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US18083800P 2000-02-07 2000-02-07
US60/180,838 2000-02-07
US09/537,079 US6865676B1 (en) 2000-03-28 2000-03-28 Protecting content from illicit reproduction by proof of existence of a complete data set via a linked list
US09/537,079 2000-03-28

Publications (2)

Publication Number Publication Date
CN1381047A true CN1381047A (en) 2002-11-20
CN1214383C CN1214383C (en) 2005-08-10

Family

ID=26876679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN01800849.6A Expired - Fee Related CN1214383C (en) 2000-02-07 2001-02-05 Protecting content from illicit reproduction

Country Status (4)

Country Link
EP (1) EP1218884A2 (en)
JP (1) JP2003521791A (en)
CN (1) CN1214383C (en)
WO (1) WO2001057867A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9361313B2 (en) 2003-03-27 2016-06-07 Microsoft Technology Licensing, Llc System and method for filtering and organizing items based on common elements

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001057869A2 (en) * 2000-02-01 2001-08-09 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set
US20030031317A1 (en) * 2001-08-13 2003-02-13 Michael Epstein Increasing the size of a data-set and watermarking
US7194617B2 (en) * 2001-11-05 2007-03-20 Koninklijke Philips Electronics N.V. Method and apparatus to prevent the unauthorized copying of digital information
US7636440B2 (en) * 2003-01-31 2009-12-22 Hewlett-Packard Development Company, L.P. Digital watermark with variable location
US7421438B2 (en) 2004-04-29 2008-09-02 Microsoft Corporation Metadata editing control
US7665028B2 (en) 2005-07-13 2010-02-16 Microsoft Corporation Rich drag drop user interface

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US6971011B1 (en) * 1998-03-04 2005-11-29 Koninklijke Philips Electronics N.V. Watermark detection
US6748533B1 (en) * 1998-12-23 2004-06-08 Kent Ridge Digital Labs Method and apparatus for protecting the legitimacy of an article

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9361313B2 (en) 2003-03-27 2016-06-07 Microsoft Technology Licensing, Llc System and method for filtering and organizing items based on common elements
US9361312B2 (en) 2003-03-27 2016-06-07 Microsoft Technology Licensing, Llc System and method for filtering and organizing items based on metadata

Also Published As

Publication number Publication date
JP2003521791A (en) 2003-07-15
WO2001057867A3 (en) 2002-04-18
CN1214383C (en) 2005-08-10
WO2001057867A2 (en) 2001-08-09
EP1218884A2 (en) 2002-07-03

Similar Documents

Publication Publication Date Title
US7587603B2 (en) Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
CN1185653C (en) Protecting content from illicit reproduction by proof of existence of complete data set using security identifiers
US20010054144A1 (en) Confirming the existence of a complete data set under multiple control scenarios
US6865676B1 (en) Protecting content from illicit reproduction by proof of existence of a complete data set via a linked list
CN1214383C (en) Protecting content from illicit reproduction
US20020144130A1 (en) Apparatus and methods for detecting illicit content that has been imported into a secure domain
AU784650B2 (en) Protecting content from illicit reproduction by proof of existence of a complete data set
US20020152172A1 (en) Apparatus and methods for attacking a screening algorithm based on partitioning of content
US6976173B2 (en) Methods of attack on a content screening algorithm based on adulteration of marked content
MXPA01010005A (en) Protecting content from illicit reproduction by proof ofexistence of a complete data set

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee