WO2005074597A2 - System and method for protecting digital works using a watermark gateway - Google Patents

System and method for protecting digital works using a watermark gateway Download PDF

Info

Publication number
WO2005074597A2
WO2005074597A2 PCT/US2005/003181 US2005003181W WO2005074597A2 WO 2005074597 A2 WO2005074597 A2 WO 2005074597A2 US 2005003181 W US2005003181 W US 2005003181W WO 2005074597 A2 WO2005074597 A2 WO 2005074597A2
Authority
WO
WIPO (PCT)
Prior art keywords
file
watermark
detector
protecting digital
digital transmissions
Prior art date
Application number
PCT/US2005/003181
Other languages
French (fr)
Other versions
WO2005074597A3 (en
Inventor
Mark Nair
Original Assignee
Mark Nair
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mark Nair filed Critical Mark Nair
Publication of WO2005074597A2 publication Critical patent/WO2005074597A2/en
Publication of WO2005074597A3 publication Critical patent/WO2005074597A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00002Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
    • H04N1/00005Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for relating to image data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00002Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00002Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
    • H04N1/00026Methods therefor
    • H04N1/00037Detecting, i.e. determining the occurrence of a predetermined state
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00002Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
    • H04N1/00071Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for characterised by the action taken
    • H04N1/00074Indicating or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00002Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
    • H04N1/00071Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for characterised by the action taken
    • H04N1/00082Adjusting or controlling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00912Arrangements for controlling a still picture apparatus or components thereof not otherwise provided for
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0086Image transceiver

Definitions

  • the invention relates generally to techniques for protecting digital data files from unauthorized use and piracy. More particularly, the invention relates to a digital watermark system and method for embedding watermark information within a file and a gateway system to block the transfer of illicit files while permitting transfer of authorized data.
  • the system and method of the present invention secures files from illicit copying and permits the transfer of authorized data by automatically recognizing watermarked files and employing electronic gateways to stop the transfer of unauthorized watermarked files.
  • FIGURE 1 illustrates a conventional network system
  • FIGURE 2 illustrates a networked system in accordance with the present invention
  • FIGURE 3 illustrates the steps of the method of blocking illicit file transfers in accordance with the present invention
  • FIGURE 4 illustrates a gateway detector in accordance with the present invention.
  • FIGURE 5 illustrates a process of adding a watermark and tracking the watermark through a network.
  • FIGURE 1 there is illustrated a general networking environment, designated generally by the reference numeral 100, in use by countless millions of users each day.
  • a user device 105 is connected to a provider 110, such as an Internet Service Provider (ISP), which connects the user to a network 115, such as the Internet.
  • ISP Internet Service Provider
  • data or information such as in an electronic file, are transmitted across the network 115 via routers 120a, 120b.
  • the user can send an email through provider 110 across the network 115 to another user.
  • die other user has a provider 125, which receives the transmission, and ports the information to the other user at their user device 130.
  • a song or other digital work can be attached to an email at user device 105, sent out to the network 115 and received and downloaded at user device 130, where the receiving user has a perfect copy of the digital work.
  • a provider 210 such as an ISP, which connects the user to a network 215, such as the Internet.
  • a watermark detector gateway 220 is employed by the provider 210 to detect the presence or absence of a valid watermark in the data or file to be released onto the network 215.
  • the watermark detector gateway 220 If the file to be transmitted or disseminated has no watermark therein, that is, the watermark detector gateway 220 has no indication of an inappropriate transfer, then the information passes to the other user across the network 215. However, should the watermark detector gateway 220 detect the presence of a valid watermark in the file in question, then the outbound transfer to the network 215 is blocked.
  • the software or hardware necessary to decode a watermark resides within the provider 210.
  • the software or hardware to decode a watermark is separate from, and communicates with, the provider 210.
  • a digital file that can be watermarked may be an audio file, such as a music file, or may be another digital media file, such as video or image. Any or all of these files and others can be watermarked.
  • Examples of methods of monitoring and decoding existing watermarks on digital files may be found in U.S. Patent No. 6, 647,128, "Method for monitoring internet dissemination of image, video, and/or audio files," to Rhoads and U.S. Patent No. 6,724,914, "Progressive watermark decoding on a distributed computing platform,” to Brundage, et al.
  • Examples of methods of adding watermarks to digital files may be found in U.S. Patent No. 6,643,386, “Method and apparatus for adding watermarks to images and/or video data streams," to Foster and U.S. Patent No. 6,584,210, “Digital watermark image processing method,” to Taguchi, et al.
  • the watermark detector gateway 220 when a file makes it past the watermark detector gateway 220, i.e., no watermark is present, the file transits across the network 215, such as the Internet, via routers 225a, 225b to another provider 230 servicing anottier user at user device 235.
  • provider 230 as with provider 210, has a watermark detector gateway 240 attached thereto to detect the presence or absence of a valid watermark in files coming and going through this gateway.
  • the watermark detector gateway 220, 240 also detects the presence or absence of a valid watermark on incoming transfers. That is, the watermark detector gateways operate bidirectionally.
  • An additional embodiment of the present invention includes a peer-to-peer network, as is known in the art. Rather than a provider connecting users to the Internet via a router, and passing all data files incoming or outgoing through a watermark detector gateway, in a peer-to-peer network, a provider would connect users directly one to another, passing all data files to be shared through a watermark detector gateway.
  • FIGURE 3 there is shown a methodology of operation for the watermark detector gateways 220, 240, generally designated in the figure by the reference numeral 300.
  • a message and/or attached file is queued at the gateway or threshold prior to release or reception of the information onto or from the network (step 305).
  • it may be necessary to disable watermark detection for example, for certain transfers deemed safe (such as legitimate copying between a user's own computers) or when the checking is otherwise disabled (pursuant to user transfer permissions). If watermark detection (step 310) is disabled, then the file is released and it is either transmitted or received (step 315).
  • the file is examined for watermarks (step 320). If no watermarks are detected, then the file is released (step 315). Where watermarks are present in the file, then any further transmission is blocked (step 330), whether going to or coming from the network. A message indicating that the file has been blocked (step 335) can also be generated, alerting the sender of the blockage. A message may also be sent to the intended recipient indicating the problem.
  • the watermark detection software preferably resides on a proprietary hardware unit that, through an Ethernet connection or fiber connection, will connect and ran inside the ISP's server structure. In time, speed of ISP proxy servers will make it a simple thing to run a software- only version of the watermarking detection system.
  • a watermark detector gateway such as the watermark detector gateway 220, 240, generally designated by the reference numeral 400.
  • the watermark detector gateway 400 is connected to an ISP infrastructure by a network connection 405 and acts as a conduit for ISP traffic and analyzes packets of data for any watermarks.
  • the watermark detection processing central processing unit (CPU) 410 analyzes the packets and, when it finds a watermark, it compares that watermark to a cached database 415 of watermarks.
  • CPU central processing unit
  • the watermark detector gateway 400 can reject the transfer 420 of the data by blocking, thereby preventing the file from going to any other peers on the file sharing network.
  • the watermark detector gateway 400 can pass-through the transfer of data 425.
  • the watermark detector gateway 400 can analyze it and send a diagnostic 430 of what files are being traded to a central forensic server for further study.
  • FIGURE 5 there is shown therein a network for watermark encoding and data tracking, generally designated by the reference numeral 500.
  • the mastering facility 505 embeds a watermark using a watermark insertion device 510, creating mastered content 515 that can be duplicated and distributed.
  • the nature of this watermark is determined by a pre-defined set of criteria.
  • a watermark can have a variety of information on it, e.g., content name, copyright owner and year, etc.
  • the information is pushed to the watermark encoding hardware by a secure internet connection to the central forensic server 520.
  • This central forensic server 520 distributes the final watermarks to the mastering facility 505 and then records that the specific content now has a watermark embedded within it.
  • the central forensic server 520 queries all children watermark servers 525 connected to the ISPs 530 through an encrypted connection across the Internet 535. Because the central forensic server 520 now has new watermarks for the watermark detection gateways 525 to monitor for, the central forensic server 520 distributes these warning flags to the watermark detection gateways' 525 local watermarking database cache. This, in turn, triggers the instructions on whether to block transmission of the file, flag the file for further forensic testing, or allow the transfer of die packets through the ISP 530.
  • a known method of tracking data with watermarks includes automated recognition, using a smart agent to crawl through the files on file sharing networks and sample a few seconds of available downloads.
  • the smart agent has a database list of files that the content owner has decided to investigate on file sharing networks, for example, the Billboard Top 100 music singles. Based on artist name, track name, or album name (these names can be any media descriptions that are usually searched on file sharing networks), the agent will automatically begin querying the specific file sharing protocols and determine a list of candidate files available to download. The agent then will begin downloading a sample of the files.
  • the agent will calculate the sample from the reported file size of the download, so that if a file is a five megabyte download, the agent will download a predetermined percentage of that file, which can be predetermined by configuration parameters. Some watermarks are noticeable within the first few seconds of a media file, so the agent will only necessarily download two or three percent of the available shared file. [0028]
  • This method of detection merely presents a diagnostic method for discovering watermarks, but it does not force any type of compliance on the user to stop distributing files, hi fact, recognizing a watermark does not, in itself, point to culpability, since it is difficult to say which Internet Protocol (IP) address matches which watermark with which user. All this functionality does is determine which files have watermarks and which do not. There are methodologies of matching IP addresses to a legitimate digital file, but since most IP addresses are dynamic, it is futile to always assume that a particular IP should always be linked to a particular watermark.
  • IP Internet Protocol
  • a watermark's strength is in determining the original owner of a file (this information is part of the watermark). If multiple identical files all share the same watermark, then it is likely that they have been distributed illegitimately. The content owner can then trace the file back to its origin and take whatever measures necessary. [0030] Yet this all assumes active participation on behalf of the content owner, which is not necessarily a good assumption. Hunting down watermarks through file sharing networks, although perfectly feasible with the intelligent agent mechanism described above, only adds to the burden that content owners currently face in stemming the use of file sharing.
  • the detection system of the present invention analyzes and detects a valid watermark, the system will block the transfer of that file from the ISP's gateway out to the Internet or to another user. Since the system will work at all ISP levels, the hardware can detect a file being sent as well as a file coming in to the ISP's network. The watermark detection system can detect and stop the transfer of the file both ways.
  • the watermark detection process sits between incoming and outgoing electronic traffic and, much like a spam filter piece of software, it checks incoming and outgoing files. Unlike spam filter software, the process does not run checks on any file name description of the content but instead runs a dedicated watermarking analysis on the structure of the file itself.

Abstract

A system (200) and method (300) for preventing the transfer of illicit digital files employs a digital watermark detector (410) and gateway (400) to control the transmission and delivery of electronic files. The system (200) blocks transmission and reception of a digital file upon detecting a watermark, where the presence of a watermark indicates that the digital file has been illegitimately copied or distributed in violation of a content owner's rights.

Description

SYSTEM AND METHOD FOR PROTECTING DIGITAL WORKS USING A WATERMARK GATEWAY
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This non-provisional application claims benefit of priority to provisional application serial number 60/541,057 filed on February 3, 2004. The disclosures of that application and others referenced are incorporated herein by reference.
FIELD OF THE INVENTION
[0002] The invention relates generally to techniques for protecting digital data files from unauthorized use and piracy. More particularly, the invention relates to a digital watermark system and method for embedding watermark information within a file and a gateway system to block the transfer of illicit files while permitting transfer of authorized data.
BACKGROUND OF THE INVENTION
[0003] The birth of the Internet and the ease of information exchange has created problems for owners of digital works, perfect copies of which can be transmitted to any number of people with ease. Pirated or unauthorized digital transactions occur with such frequency that it is nearly impossible to stop the millions of people who misappropriate and infringe upon copyright every day. This is especially true when dealing with new, anonymous peer-to-peer (PTP) networks that block or mask the identity of users, e.g., their Internet Protocol (IP) identification number.
[0004] Although digital watermarks embedded into the signal of electronic files are known, the usage of these watermarks is rare because of two problems. First, adding the watermarks to the underlying document has either corrupted or changed the original digital work in a way to make that work unusable or of lesser value than it had before the addition of the watermark. For instance, traditional methods of adding a digital watermark to an audio file distort the audio file enough so that its watermarked-representation is a pale imitation of the original. The second problem is forensic in nature. It has been difficult to track a personalized watermark on an illegally distributed file because of the lack of a mechanism, either through the Internet or some other network, for the file to contact home, check its status, and determine whether that particular file has or has not been copied legitimately. Plus, once a watermark is determined, there is an issue with enforcement of rights, i.e., the owner must actively enforce them.
[0005] Recent technological breakthroughs have substantially addressed the first concern. Indeed, today watermarking technology has progressed to a point where the watermark in a digital file does not adversely affect the performance or quality of the original file noticeably. Adding a watermark, of course, does change the original because a watermark is intrinsic to the file and does not act as a "wrapper" or any other non-additive change to the file, but recent advances in the technology can calm content owners' fears of a watermark unjustifiably corrupting, altering or destroying their original work.
[0006] Additionally, adding a watermark to a file has until recently required dedicated processor time and energy, but computational power and improvements in watermark algorithms have decreased the time needed to create and add a watermark to a digital file. These additions can now happen in real-time, so that once a file is requested for delivery, a watermark can be added by the distribution server with virtually no time penalty. [0007] Even with these improvements in watermarking technology, however, it is still difficult to use these teclinologies to solve the current problem of illegal media distribution through file sharing networks, chat networks, or any other of the various ways users can communicate and deliver illicit digital files to other users. The present invention offers a solution to this dilemma.
SUMMARY OF THE INVENTION [0008] The system and method of the present invention secures files from illicit copying and permits the transfer of authorized data by automatically recognizing watermarked files and employing electronic gateways to stop the transfer of unauthorized watermarked files.
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] The above-mentioned and other features of this invention and the manner of attaining them will become more apparent, and the invention itself will be better understood, by reference to the following description of embodiments of the invention taken in conjunction with the accompanying figures where:
[0010] FIGURE 1 illustrates a conventional network system;
[0011] FIGURE 2 illustrates a networked system in accordance with the present invention; [0012] FIGURE 3 illustrates the steps of the method of blocking illicit file transfers in accordance with the present invention;
[0013] FIGURE 4 illustrates a gateway detector in accordance with the present invention; and
[0014] FIGURE 5 illustrates a process of adding a watermark and tracking the watermark through a network.
DETAILED DESCRIPTION OF THE INVENTION
[0015] The following detailed description is presented to enable any person skilled in the art to make and use the invention. For purposes of explanation, specific nomenclature is set forth to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that these specific details are not required to practice the invention. Descriptions of specific applications are provided only as representative examples. Various modifications to the preferred embodiments will be readily apparent to one skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the scope of the invention. The present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest possible scope consistent with the principles and features disclosed herein.
[0016] With reference to FIGURE 1, there is illustrated a general networking environment, designated generally by the reference numeral 100, in use by countless millions of users each day. In this system, a user device 105 is connected to a provider 110, such as an Internet Service Provider (ISP), which connects the user to a network 115, such as the Internet. As is known in the art, data or information such as in an electronic file, are transmitted across the network 115 via routers 120a, 120b. Thus, the user can send an email through provider 110 across the network 115 to another user. At die other end, die other user has a provider 125, which receives the transmission, and ports the information to the other user at their user device 130. For example, a song or other digital work can be attached to an email at user device 105, sent out to the network 115 and received and downloaded at user device 130, where the receiving user has a perfect copy of the digital work. Although there are innumerable legitimate file transfers between users, there are also countless illegitimate and illegal downloads and transfers of copyright, trade secret, or otherwise protected information. [0017] With reference to FIGURE 2, there is illustrated an improved system in accordance with the principles of the present invention. In this system, designated generally by the reference numeral 200, a user device 205 is connected to a provider 210, such as an ISP, which connects the user to a network 215, such as the Internet. Unlike the system 100, however, which provides little or no control over the dissemination of information, proprietary or otherwise, across the network, the paradigm of the present invention does. In particular, a watermark detector gateway 220 is employed by the provider 210 to detect the presence or absence of a valid watermark in the data or file to be released onto the network 215.
[0018] If the file to be transmitted or disseminated has no watermark therein, that is, the watermark detector gateway 220 has no indication of an inappropriate transfer, then the information passes to the other user across the network 215. However, should the watermark detector gateway 220 detect the presence of a valid watermark in the file in question, then the outbound transfer to the network 215 is blocked. In a preferred embodiment of the present invention, the software or hardware necessary to decode a watermark resides within the provider 210. In another preferred embodiment of the present invention, the software or hardware to decode a watermark is separate from, and communicates with, the provider 210. [0019] A digital file that can be watermarked may be an audio file, such as a music file, or may be another digital media file, such as video or image. Any or all of these files and others can be watermarked. Examples of methods of monitoring and decoding existing watermarks on digital files may be found in U.S. Patent No. 6, 647,128, "Method for monitoring internet dissemination of image, video, and/or audio files," to Rhoads and U.S. Patent No. 6,724,914, "Progressive watermark decoding on a distributed computing platform," to Brundage, et al. Examples of methods of adding watermarks to digital files may be found in U.S. Patent No. 6,643,386, "Method and apparatus for adding watermarks to images and/or video data streams," to Foster and U.S. Patent No. 6,584,210, "Digital watermark image processing method," to Taguchi, et al.
[0020] With further reference to FIGURE 2, when a file makes it past the watermark detector gateway 220, i.e., no watermark is present, the file transits across the network 215, such as the Internet, via routers 225a, 225b to another provider 230 servicing anottier user at user device 235. As shown in FIGURE 2, provider 230, as with provider 210, has a watermark detector gateway 240 attached thereto to detect the presence or absence of a valid watermark in files coming and going through this gateway. Thus, in addition to detecting watermarks prior to release of a file onto a network, the watermark detector gateway 220, 240 also detects the presence or absence of a valid watermark on incoming transfers. That is, the watermark detector gateways operate bidirectionally.
[0021] Thus, if an incoming file from user device 205 or any other source has no watermark to indicate an inappropriate transfer, the watermark detector gateway 240 allows the incoming file to pass through and then on to the user device 235. However, should the watermark detector gateway 240 detect a valid watermark, then the transfer in is blocked. [0022] An additional embodiment of the present invention includes a peer-to-peer network, as is known in the art. Rather than a provider connecting users to the Internet via a router, and passing all data files incoming or outgoing through a watermark detector gateway, in a peer-to-peer network, a provider would connect users directly one to another, passing all data files to be shared through a watermark detector gateway.
[0023] With reference now to FIGURE 3, there is shown a methodology of operation for the watermark detector gateways 220, 240, generally designated in the figure by the reference numeral 300. At the provider or ISP level where the watermark detector gateways preferably operate, a message and/or attached file is queued at the gateway or threshold prior to release or reception of the information onto or from the network (step 305). In some situations, it may be necessary to disable watermark detection, for example, for certain transfers deemed safe (such as legitimate copying between a user's own computers) or when the checking is otherwise disabled (pursuant to user transfer permissions). If watermark detection (step 310) is disabled, then the file is released and it is either transmitted or received (step 315). Otherwise, the file is examined for watermarks (step 320). If no watermarks are detected, then the file is released (step 315). Where watermarks are present in the file, then any further transmission is blocked (step 330), whether going to or coming from the network. A message indicating that the file has been blocked (step 335) can also be generated, alerting the sender of the blockage. A message may also be sent to the intended recipient indicating the problem.
[0024] Because of the speed and power necessary to decode a watermark, the watermark detection software preferably resides on a proprietary hardware unit that, through an Ethernet connection or fiber connection, will connect and ran inside the ISP's server structure. In time, speed of ISP proxy servers will make it a simple thing to run a software- only version of the watermarking detection system.
[0025] With reference now to FIGURE 4, there is shown a watermark detector gateway, such as the watermark detector gateway 220, 240, generally designated by the reference numeral 400. The watermark detector gateway 400 is connected to an ISP infrastructure by a network connection 405 and acts as a conduit for ISP traffic and analyzes packets of data for any watermarks. The watermark detection processing central processing unit (CPU) 410 analyzes the packets and, when it finds a watermark, it compares that watermark to a cached database 415 of watermarks. There are several rules that the watermark detector gateway 400 can now follow, depending upon the rales and requirements of the content owners. The watermark detector gateway 400 can reject the transfer 420 of the data by blocking, thereby preventing the file from going to any other peers on the file sharing network. The watermark detector gateway 400 can pass-through the transfer of data 425. Depending on the data in the watermark, the watermark detector gateway 400 can analyze it and send a diagnostic 430 of what files are being traded to a central forensic server for further study.
[0026] With reference now to FIGURE 5, there is shown therein a network for watermark encoding and data tracking, generally designated by the reference numeral 500. During mastering, which can be done any type of media that can be transferred electronically, the mastering facility 505 embeds a watermark using a watermark insertion device 510, creating mastered content 515 that can be duplicated and distributed. The nature of this watermark is determined by a pre-defined set of criteria. A watermark can have a variety of information on it, e.g., content name, copyright owner and year, etc. The information is pushed to the watermark encoding hardware by a secure internet connection to the central forensic server 520. This central forensic server 520 distributes the final watermarks to the mastering facility 505 and then records that the specific content now has a watermark embedded within it. The central forensic server 520 then queries all children watermark servers 525 connected to the ISPs 530 through an encrypted connection across the Internet 535. Because the central forensic server 520 now has new watermarks for the watermark detection gateways 525 to monitor for, the central forensic server 520 distributes these warning flags to the watermark detection gateways' 525 local watermarking database cache. This, in turn, triggers the instructions on whether to block transmission of the file, flag the file for further forensic testing, or allow the transfer of die packets through the ISP 530. In this way, the ISPs 530 and the watermark detection gateways 525 are prepared for early file sharing and distribution before the mastered content 515 has gone through duplication. [0027] A known method of tracking data with watermarks includes automated recognition, using a smart agent to crawl through the files on file sharing networks and sample a few seconds of available downloads. The smart agent has a database list of files that the content owner has decided to investigate on file sharing networks, for example, the Billboard Top 100 music singles. Based on artist name, track name, or album name (these names can be any media descriptions that are usually searched on file sharing networks), the agent will automatically begin querying the specific file sharing protocols and determine a list of candidate files available to download. The agent then will begin downloading a sample of the files. The agent will calculate the sample from the reported file size of the download, so that if a file is a five megabyte download, the agent will download a predetermined percentage of that file, which can be predetermined by configuration parameters. Some watermarks are noticeable within the first few seconds of a media file, so the agent will only necessarily download two or three percent of the available shared file. [0028] This method of detection, however, merely presents a diagnostic method for discovering watermarks, but it does not force any type of compliance on the user to stop distributing files, hi fact, recognizing a watermark does not, in itself, point to culpability, since it is difficult to say which Internet Protocol (IP) address matches which watermark with which user. All this functionality does is determine which files have watermarks and which do not. There are methodologies of matching IP addresses to a legitimate digital file, but since most IP addresses are dynamic, it is futile to always assume that a particular IP should always be linked to a particular watermark.
[0029] Besides giving a global forensic outlook on the state of file sharing or illicit digital file distribution, a watermark's strength is in determining the original owner of a file (this information is part of the watermark). If multiple identical files all share the same watermark, then it is likely that they have been distributed illegitimately. The content owner can then trace the file back to its origin and take whatever measures necessary. [0030] Yet this all assumes active participation on behalf of the content owner, which is not necessarily a good assumption. Hunting down watermarks through file sharing networks, although perfectly feasible with the intelligent agent mechanism described above, only adds to the burden that content owners currently face in stemming the use of file sharing.
[0031] Once the detection system of the present invention analyzes and detects a valid watermark, the system will block the transfer of that file from the ISP's gateway out to the Internet or to another user. Since the system will work at all ISP levels, the hardware can detect a file being sent as well as a file coming in to the ISP's network. The watermark detection system can detect and stop the transfer of the file both ways.
[0032] There is a mechanism in the detection system to let a watermarked file travel through the gateway unimpeded (this is if users have legitimate files d ey would like to send from one computer they own to another computer they own). Here the watermark will have a flag that toggles on or off depending on file transfer permissions that the user has. [0033] What ti is invention claims is the ability of blocking a watermarked digital file at one of the points of distribution by a mechanism that sits at the ISP. This is the filtering agent that will analyze files flowing in and out of the ISP's gateway, check them for watermarks, and prevent them from moving any further on the network once a watermark has been detected. At the ISP server level, the watermark detection process sits between incoming and outgoing electronic traffic and, much like a spam filter piece of software, it checks incoming and outgoing files. Unlike spam filter software, the process does not run checks on any file name description of the content but instead runs a dedicated watermarking analysis on the structure of the file itself.
[0034] The foregoing description of the present invention provides illustration and description, but is not intended to be exhaustive or to limit the invention to the precise one disclosed. Modifications and variations are possible consistent with the above teachings or may be acquired from practice of the invention. Thus, it is noted that the scope of the invention is defined by the claims and their equivalents

Claims

THE CLAIMED INVENTION IS:
1. A system for protecting digital transmissions from piracy, said system (200) comprising: a watermark detector (220, 240), said watermark detector (220, 240) processing an incoming file automatically upon receipt and sampling said file for the presence of at least one watermark within said file; and a blocking device (220, 240) for blocking transmission of said file upon detection by said watermark detector (220, 240) of said at least one watermark within said file.
2. The system (200) for protecting digital transmissions of claim 1, further comprising a watermark insertion device (220, 240) for adding said watermark to said file.
3. The system (200)for protecting digital transmissions of claim 1, further comprising a smart agent to crawl through sharable files on a file sharing network to sample a portion of said sharable files.
4. The system (200) for protecting digital transmissions of claim 3, wherein said portion of said sharable file is determined by the size of said sharable file.
5. The system (200) for protecting digital transmissions of claim 1, wherein said blocking of said file upon detection of said at least one watermark indicates multiple identical files contain the same watermark.
6. The system (200) for protecting digital transmissions of claim 1, further comprising a blocking device bypass mechanism (220, 240) to allow a watermarked file to travel through said blocking device (220, 240) unimpeded.
7. A method (300) for protecting digital transmissions from piracy, said method comprising: receiving a file (305); detecting (320) the presence of at least one watermark within said file, said detecting step occurring automatically upon receipt of said file; and blocking transmission of said file upon detection of said at least one watermark within said file.
8. The method (300) for protecting digital transmissions of claim 7, wherein said detected at least one watermark is intrinsic to said file.
9. The method (300) for protecting digital transmissions of claim 8, wherein the step of detecting (320) the presence of said at least one watermark further comprises performing watermarking analysis on the structure of said file.
10. The method (300) for protecting digital transmissions of claim 9, further comprising allowing said file comprising at least one watermark to travel through a blocking device unimpeded (310).
11. The method (300) for protecting digital transmissions of claim 7, wherein said transmission of said file is an outgoing transmission.
12. The method (300) for protecting digital transmissions of claim 7, wherein said transmission of said file is an incoming transmission.
13. A watermark detector (400) comprising: a receiving means (405) for receiving a file; and a detector (410), said detector processing said file automatically upon receipt at said receiving means, and sampling said file for the presence of at least one watermark within said file.
14. The watermark detector (400) of claim 13, wherein said detector (400) runs within the structure of an Internet Service Provider server.
15. The watermark detector (400)of claim 14, wherein said detector (410) running within said structure of said Internet Service Provider server further comprises a proprietary hardware unit configured to run watermark detection software.
16. The watermark detector (400) of claim 15, wherein said at least one watermark comprises a flag that toggles depending upon a user's type of file transfer permission.
17. A watermark detector gateway (400) comprising: a receiving means (405) for receiving a file; a detector (410), said detector (410) processing said file automatically upon receipt at said receiving means, and sampling said file for the presence of at least one watermark within said file; and a blocking device (410) for blocking transmission of said file upon detection of said at least one watermark within said file.
18. The watermark detector gateway (400) of claim 17, wherein said detector (410) runs within the structure of an Internet Service Provider server.
19. The watermark detector gateway (400) of claim 18, wherein said detector (410) running within said structure of said Internet Service Provider server further comprises a proprietary hardware unit configured to ran watermark detection software.
20. The watermark detector gateway (400) of claim 19, wherein said at least one watermark comprises a flag that toggles depending upon a user's type of file transfer permission.
PCT/US2005/003181 2004-02-03 2005-02-03 System and method for protecting digital works using a watermark gateway WO2005074597A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US54105704P 2004-02-03 2004-02-03
US60/541,057 2004-02-03

Publications (2)

Publication Number Publication Date
WO2005074597A2 true WO2005074597A2 (en) 2005-08-18
WO2005074597A3 WO2005074597A3 (en) 2008-10-30

Family

ID=34837453

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/003181 WO2005074597A2 (en) 2004-02-03 2005-02-03 System and method for protecting digital works using a watermark gateway

Country Status (2)

Country Link
US (1) US20050251486A1 (en)
WO (1) WO2005074597A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007065757A1 (en) * 2005-12-05 2007-06-14 Siemens Aktiengesellschaft Method and peer network for ascertaining the peer network originating station for a file
EP2282473A1 (en) * 2009-06-04 2011-02-09 BAE Systems PLC System and method of analysing transfer of media over a network
US9294560B2 (en) 2009-06-04 2016-03-22 Bae Systems Plc System and method of analysing transfer of data over at least one network

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100571121C (en) * 2004-08-27 2009-12-16 国际商业机器公司 Tracing pirate in the wireless digital copyright management system and recognition methods
USRE47628E1 (en) 2005-04-12 2019-10-01 Kroll Information Assurance, Llc System for identifying the presence of peer-to-peer network software applications
CN101361054B (en) * 2005-11-15 2011-07-06 蒂弗萨公司 System for identifying the presence of peer-to-peer network software applications
US20070250715A1 (en) * 2006-04-19 2007-10-25 Yigang Cai File sharing control using digital watermarks
US7596137B2 (en) * 2006-05-05 2009-09-29 Broadcom Corporation Packet routing and vectoring based on payload comparison with spatially related templates
US8223965B2 (en) 2006-05-05 2012-07-17 Broadcom Corporation Switching network supporting media rights management
US7895657B2 (en) * 2006-05-05 2011-02-22 Broadcom Corporation Switching network employing virus detection
US7751397B2 (en) 2006-05-05 2010-07-06 Broadcom Corporation Switching network employing a user challenge mechanism to counter denial of service attacks
US7948977B2 (en) * 2006-05-05 2011-05-24 Broadcom Corporation Packet routing with payload analysis, encapsulation and service module vectoring
US8000474B1 (en) 2006-12-15 2011-08-16 Quiro Holdings, Inc. Client-side protection of broadcast or multicast content for non-real-time playback
US8135947B1 (en) 2007-03-21 2012-03-13 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US9191605B1 (en) 2007-03-26 2015-11-17 Qurio Holdings, Inc. Remote monitoring of media content that is associated with rights management restrictions
US9130974B2 (en) * 2007-04-18 2015-09-08 Mcafee, Inc. System and method for limiting spyware activity
US7895442B1 (en) * 2007-06-18 2011-02-22 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
EP2166725A1 (en) * 2008-08-28 2010-03-24 Alcatel, Lucent Control of delivery of digital content, and an apparatus therefor
JP7247583B2 (en) * 2018-12-28 2023-03-29 富士フイルムビジネスイノベーション株式会社 Control device and control program

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010051996A1 (en) * 2000-02-18 2001-12-13 Cooper Robin Ross Network-based content distribution system
US20040025024A1 (en) * 2002-07-22 2004-02-05 Jun Hirai Information processing apparatus and information processing method

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7171016B1 (en) * 1993-11-18 2007-01-30 Digimarc Corporation Method for monitoring internet dissemination of image, video and/or audio files
US7013021B2 (en) * 1999-03-19 2006-03-14 Digimarc Corporation Watermark detection utilizing regions with higher probability of success
US6785815B1 (en) * 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques
JP3973346B2 (en) * 2000-07-06 2007-09-12 株式会社日立製作所 CONTENT DISTRIBUTION SYSTEM, CONTENT REPRODUCTION DEVICE, CONTENT DISTRIBUTION DEVICE, AND STORAGE MEDIUM
US6643386B1 (en) * 2000-08-10 2003-11-04 Omnivision Technologies, Inc. Method and apparatus for adding watermarks to images and/or video data streams
US6512587B1 (en) * 2000-10-27 2003-01-28 Eastman Kodak Company Measurement method and apparatus of an external digital camera imager assembly
JP3682222B2 (en) * 2000-12-11 2005-08-10 株式会社東芝 Digital watermark detection apparatus, digital watermark detection method, and recording medium
EP1217591B1 (en) * 2000-12-21 2014-04-02 Nokia Corporation Improvements in and relating to the distribution of content
US6724914B2 (en) * 2001-10-16 2004-04-20 Digimarc Corporation Progressive watermark decoding on a distributed computing platform
JP4035383B2 (en) * 2001-10-22 2008-01-23 株式会社リコー Digital watermark code generation apparatus and code generation method, digital watermark decoding apparatus and decoding method, digital watermark code generation and decoding program, and recording medium recording the same
US20050165690A1 (en) * 2004-01-23 2005-07-28 Microsoft Corporation Watermarking via quantization of rational statistics of regions

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010051996A1 (en) * 2000-02-18 2001-12-13 Cooper Robin Ross Network-based content distribution system
US20040025024A1 (en) * 2002-07-22 2004-02-05 Jun Hirai Information processing apparatus and information processing method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007065757A1 (en) * 2005-12-05 2007-06-14 Siemens Aktiengesellschaft Method and peer network for ascertaining the peer network originating station for a file
US9160793B2 (en) 2005-12-05 2015-10-13 Siemens Aktiengesellschaft Method and peer network for ascertaining the peer network originating station for a file
EP2282473A1 (en) * 2009-06-04 2011-02-09 BAE Systems PLC System and method of analysing transfer of media over a network
US9294560B2 (en) 2009-06-04 2016-03-22 Bae Systems Plc System and method of analysing transfer of data over at least one network

Also Published As

Publication number Publication date
US20050251486A1 (en) 2005-11-10
WO2005074597A3 (en) 2008-10-30

Similar Documents

Publication Publication Date Title
US20050251486A1 (en) System and methods for protecting digital works using a watermark gateway
US8769296B2 (en) Software signature tracking
US20020069370A1 (en) System and method for tracking and preventing illegal distribution of proprietary material over computer networks
US20030105739A1 (en) Method and a system for identifying and verifying the content of multimedia documents
US7653940B2 (en) Tracing and identifying piracy in wireless digital rights management system
US20090316894A1 (en) Method and apparatus for checking consistency between digital contents
US20070250715A1 (en) File sharing control using digital watermarks
JP2002540540A (en) Server computer that guarantees file integrity
CA2644731A1 (en) Method and communication system for the computer-aided detection and identification of copyrighted contents
ZA200602696B (en) Limiting use of unauthorised digital content in a contentsharing peer-to-peer network
GB2358313A (en) Unique watermarking of web documents
US20040111604A1 (en) Method and system for protection against unauthorized distribution of copyrighted computer files over peer-to-peer networks
US20020065832A1 (en) System and method for controlling file distribution and transfer on a computer
JP2008305371A (en) Apparatus and method for checking huge amount of content by distributed processing, and content delivery system for controlling autonomous content distribution and content use among users according to content check result
US20080235808A1 (en) Method and Apparatus for Protection of Content Using Biometric Watermarks
CN1558303A (en) Digital watermarking infrastructure
US9385992B2 (en) Inline key-based peer-to-peer processing
US9064093B1 (en) Method and system for content detection and interception in communication networks
EP1362351B1 (en) Approach for tracking data
US20140053233A1 (en) Online media policy platform
KR100957195B1 (en) Method and system for license audit and management in DRM environment
Kwok et al. Intellectual property protection for electronic commerce applications.
JP2002016891A (en) Contents use condition inspecting method, its device, and recording medium storing the program
WO2015069134A1 (en) Method for protecting intellectual property in peer-to-peer networks
WO2009053948A2 (en) Network-based drm enforcement

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION UNDER RULE 69 EPC ( EPO FORM 1205A DATED 02/020/07 )

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 05712575

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 05712575

Country of ref document: EP

Kind code of ref document: A2