CA2375575A1 - Copyright protection method using multi-media security token - Google Patents

Copyright protection method using multi-media security token Download PDF

Info

Publication number
CA2375575A1
CA2375575A1 CA002375575A CA2375575A CA2375575A1 CA 2375575 A1 CA2375575 A1 CA 2375575A1 CA 002375575 A CA002375575 A CA 002375575A CA 2375575 A CA2375575 A CA 2375575A CA 2375575 A1 CA2375575 A1 CA 2375575A1
Authority
CA
Canada
Prior art keywords
file
mmst
digital
vst
audio
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002375575A
Other languages
French (fr)
Inventor
James Craig
Andrew Osburn
Carter Cockerill
Jeremy Bernard
Mark Boyle
David Burns
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Diaphonics Inc
Original Assignee
Diaphonics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Diaphonics Inc filed Critical Diaphonics Inc
Priority to CA002375575A priority Critical patent/CA2375575A1/en
Publication of CA2375575A1 publication Critical patent/CA2375575A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • G11B20/00123Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0071Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a purchase action

Abstract

A method of protecting a copyright for audio or video media by using a multi-media security token (MMST) is disclosed. The method comprises steps of: sampling a file at a network hub of a communications networks; determining whether or not the sampled file is an audio or visual file; if not, passing the file; if yes, creating an MMST for the sampled file; checking the MMST in a master database whether or not the MMST matches anyone of the database; if no, passing the file; if yes, preventing the distribution of the file from which the sampled file is taken.

Description

Copyright Protection Method Using Multi-Media Security Token Field of the Invention The present invention relates to a method of protecting a copyright for audio or visual media by using a multi-media security token (MMST) technology that is based in voice biometrics. The MMST can be created from any audio or visual digital file regardless of format or time of creation. The MMST is created by signal processing the digital audio or visual file and extracting a small digital representation based upon the voice biometrics within the file. Because the MMST originates as a voice biometric it is as unique as a fingerprint.
Furthermore, because the token is created from the file it can be recreated at any time and can definitively identify any digital audio or visual file regardless of format or when the file was created.
Background and Summary of the Invention Copyright protection of digital files, and the problems associated with deterring the copying and distribution of electronic media, is a significant issue for owners of digital media. In particular, most digital recordings of music and video, in the form of MP3 and DVD files, are copyright protected and therefore require methods for protection from copyright infringement. Copyright violations of these types of media through illegal copying (pirating) and distribution are rampant. Distribution of pirated electronic media has been made simpler through the advent of the Internet and Peer-to-Peer networks.
In Canada alone last year there were an estimated 6-8 billion exchanges of pirated audio files. Additionally, Canadian sales of music CDs were down 6%
last year. This decline in new music CD sales and the huge success of Napster-like Peer-to-Peer network exchanges pose a significant problem for the music industry. The same issues are equally important to the video and movie industry.
Copyright protection methods for digital audio and visual media have typically entailed the following methods:
Creation of a 'digital watermark' or tag that is embedded in the file at the time of creation. This is a unique identifier that is buried or hidden in the file in order to allow identification of the file through a means other than external file characteristics that can be easily manipulated.
- Copyright protection methods that deter the ability to copy or reproduce the digital media. These methods hamper the ability to reproduce recorded CD
or DVD media. These methods work with recording software and hardware components such as CD/DVD Writers and will not allow the reproduction of a pre-recorded copyright protected CD or DVD.
- Copyright statements attached to, or included with, the copyright protected media.
The MMST can be used to uniquely identify any digital audio or video file.
Due to this fact, the MMST can be employed as a copyright protection method and apparatus for digital media including digital music files, digital video files, and e-books according to the present invention.
Features of the present invention and advantages associated therewith are as follows:
- The MMST can be used to uniquely identify any digital audio or digital file;
- The MMST, used together with specific methods to intercept and sample digital files distributed through electronic networks, can be used to identify copyright protected digital media and thereby prevent the unauthorised distribution of the media.
- Content management for control and distribution of digital audio and visual files over telephony networks - The MMST is created based upon the biometric characteristics of the audio or visual file. Therefore, the MMST can uniquely identify the file based upon derived characteristics rather than an external component that must be embedded or buried in the file.
- The MMST can be recreated at any time after file creation and therefore cannot be tampered with. A MMST created from a file will always be the same for that particular file. If the file characteristics are changed or altered then the file will sound or play differently. This is a deterrent to editing the underlying files.
- The MMST can be produced for all existing and future audio and visual files so therefore can provide a method for copyright protection for any existing or new file.
- The MMST can be created in near real-time so can be used to monitor the distribution of digital copyright protected content on digital networks including Internet and telephony based networks.
Further understanding of other features, aspects and advantages of the invention will be realized by reference to the following description, appended claims and accompanying drawings.
Brief Description of the Drawings Embodiments) of the invention will be described with reference to the accompanying drawings, in which:
Fig. 1 is a schematic presentation of a copyright protection method in accordance with the present invention; and Fig. 2 is a schematic flowchart of a copyright protection method in accordance with the present invention;
Fig.3 illustrates the overall architecture of an embodiment of the present invention;
Fig. 4 illustrates a method of uniquely identifying an electronic transaction; and Fig. 5 illustrates an apparatus for uniquely identifying an electronic transaction.
Detailed Description of the Preferred Embodimentls) According to one embodiment of the present invention, there is provided a method of protecting a copyright for audio or visual media by using a multi-media security token (MMST) technology, which is based in voice biometrics.
The MMST can be created from any audio or visual digital file regardless of format or time of creation. The MMST is created by signal processing the digital audio or visual file and extracting a small digital representation based upon the voice biometrics within the file. Because the MMST originates as a voice biometric it is as unique as a fingerprint. Furthermore, because the token is created from the file it can be recreated at any time and can definitively identify any digital audio or visual file regardless of format or when the file was created.
The method by which the MMST is created is disclosed in Canadian Patent Application 2,364,293, which is filed in the name of the same applicant as the present application, and the disclosure of which is incorporated herein by reference. The MMST creating process will be detailed hereinafter.
Fig. 1 schematically illustrates a MMST system according to one embodiment of the invention, which operates in the following manner to limit the distribution of copyright protected digital audio and visual files over the Internet and Peer-to-Peer networks.
Fig. 1 represents the network traffic flow across an Internet or Peer-to-Peer network hub. In this embodiment, digital files are sampled at high speed as they pass through a network hub. Files that are identified in audio or visual format (i.e. MP3) will then have a MMST created from within the file. The MMST
is then checked against a master database of MMSTs for copyright protected digital files. This database contains MMSTs for all copyright protected digital files that are subject to limited distribution. Should a match be made between the real time MMST and the database then steps are taken to stop the distribution.
As shown in Fig. 1, the system of the invention comprises the following components: (1 ) Internet or Peer-to-Peer network. (2) Network hub within the above network. (3) Digital File Sampling component. The digital sampling component is a network appliance that interfaces to the network hub. The file sampling is high speed and determines if the digital traffic across the hub represents a file of interest (i.e. MP3). (4) MMST creation component. This is another network appliance that creates the MMST for the sampled file. (5) Master MMST database. This database holds all copies of MMSTs created from original copies of the audio and visual files.
Fig. 2 illustrates the process employed with the MMST to control the distribution of copyright protected digital media within networks such as Internet and Peer-to-Peer.
A second embodiment of the MMST process described above refers to an implementation in telephony networks. In this second embodiment, the MMST process works in exactly the same manner. The only difference is that the Network hub component described above is replaced by a telephony switch component.
In this embodiment, the audio or visual digital files are being distributed over a telephony network. The file sampling occurs at a telephony switch or wireless gateway. Wireless telephony networks will soon have the transmission bandwidth required to distribute both audio and visual digital files to wireless devices such as G3 phones and Personal Digital Assistants.
The MMST (also, called "VST") will be described below in greater detail.
There are many challenges in today's electronic environment for business exchange of goods and services. The traditional method for contracts to be made between the buyer and seller was for the buyer to provide a signature signifying that the buyer understood and agreed to the terms and conditions of the sale, usually within a sales contract. This signed contract was the basis for any dispute surrounding the sale B non-repudiation. This paper-based trail has been a challenge for electronic business because the contract and signature may all be electronically agreed to. There have been recent advances in the courts accepting digital signatures, but these have focussed on pen-based signatures utilizing biometrics.

Natural language speech recognition allows for more commerce to be completed using only voice and augments existing transaction systems. This can be voice transmitted over Publicly Switched Telephone Systems (PSTN), mobile or cellular traffic, two-way radio, campus systems and voice over Internet Protocol (Voice Over IP) B any medium that carries a voice stream. There are advances in speaker recognition that have taken place, but there is nothing that captures the nature and intent and agreement around the verbal contract that takes place in a voice transaction. fn a voice transaction, there is no effective method to capture the transactional information for non-repudiation purposes and that is what the VST solves. This is critical if the 'offer' is not perceived to be the same as the 'acceptance' in the transaction.
Today, call centres either record the transaction or do nothing. If they do have the recording, they can use the tape to go back to play the original 'offer' and 'acceptance'. If the call was of a significant duration, the portions of the contractual terms and conditions and acceptance of the terms and conditions are captured using Computer Telephony Integration (CTI). These systems tend to be used in higher value transactions that are less frequent because of the cost to capture, store and more importantly, retrieve the correct information.
The problem is that either party (buyer or seller) can challenge the authenticity of the files.
In an Electronic Data Interchange (EDI) transaction, the Value Added Network (VAN) assured the sender and receiver of the authenticity of the message and gave each tracking tools to ensure the messages had been received. VANs did not encrypt the information so there could be a challenge to the original seller's terms and conditions or to the acceptance by the buyer.
Virtual Private Network allow for the secure transaction of information with each party having a trusted medium. There is an implicit assumption that the buyer and seller are working in trusted environments but this does not solve the non-repudiation of the verbal contract.

The other challenge for businesses is to have an inexpensive process for reconciliation. If the process is paper-based, then the process is expensive because it is people intensive. Companies require an inexpensive system to easily verify the original verbal contract.
Therefore, there exists a need for a cost effective method and apparatus for uniquely identifying an electronic transaction that is not easily disputed by either the buyer or seller.
In general, the disclosed method and apparatus presents an assurance mechanism for the buyer and seller in a verbal contract to verify the original terms and conditions, ensuring the authenticity of the information. A voice security token (VST) is a unique transactional identifier that is generated from the voice samples of the buyers) and sellers) in a digital format. The VST is a condensed representation of the original voice files containing characteristic voice features of each the parties in the transaction. The VST is a unique identifier to the specific verbal agreement. The VST is a 'fingerprint' of the transaction and ensures no one can modify the offer and/or acceptance of the terms and conditions that were agreed to in a verbal contract. The disclosed method and apparatus also enables the buyer and/or seller to have their own systems to capture the information for their own assurance systems.
Referring to Figs. 3, 4 and 5, a seller presents an offer including terms and conditions to a buyer. The buyer receives the offer and then accepts the offer, and an electronic transaction is agreed upon. The offer including the terms and conditions is saved as a first digital audio voice file and stored in a database. The acceptance of the offer is also saved as a second digital audio voice file and stored in a database. The format of the digital audio voice files is preferably in time format. A voice security token in then created from both the offer and acceptance as saved in the digital audio voice file database. The VST
is created where the digital audio files are sent through a pre-processor program in addition to the core system that features frequency feature extraction.
Since voiceprints are unique, the VST is unique for each electronic transaction.

The VST is then sent to both parties. The VST may be sent by mail receipt, email, fax, XML format, EDI format or any other user defined format.
The VST forms the core of the non-repudiation process and enables faster lookup of the original files. There can also be a smaller token that can points to the VST if either party only needs a condensed confirmation. The VST is now the basis of any non-repudiation claims if the buyer and seller disputes the terms and conditions that were agreed to.
The seller now goes through its normal process of delivering goods to the customer that were ordered through the contract.
In one embodiment, a third party is used as a neutral party that stores the information in the database in order for either party to have assurances as to the integrity and authenticity of the information. The third party dispute mechanism involves limited human involvement as either party only has to submit the VST
to get access to the authentic originals. The system includes the ability to regenerate the VST from original digital audio files and compare it with the original buyer/seller VST. It will also highlight if there was any tampering with the original voice recordings of the contract, even though third party participation is used to reduce the likelihood of tampering of process by either buyer or seller While the third party option for capturing the voice files from both parties as a non-repudiation system is a preferred embodiment, the seller and/or buyer can use the system for their own internal non-repudiation system.
In another embodiment, the system may also use middleware for integration into business documents.
The disclosed method and apparatus is used for confirmation of a verbal contract but can augment a traditional paper contract as well.
The VST integrates signal processing for analog-to-digital and Time-to-Frequency conversion, Frequency elements for the VST, Data storage and hosting, and encryption methods of securing the data. The VST interoperates with existing login and user level security systems.
The previously described embodiments of the present invention have many advantages including:
- the VST can be used by either the buyer or the seller or from a third party;
- the VST is used at the individual level versus the company level so that it creates an assurance mechanism based on biometrics to the individuals) within the contractual agreements;
- the VST ensures the authenticity of the original 'offer' of the sellers) and 'acceptance' by the buyer(s);
- the VST is a mechanism to ensure that the record of the 'offer' and 'acceptance' has not been tampered with as the VST is given to both parties and it must match to ensure the validity of the originals;
- the VST is different for every transaction ensuring a high degree of success to ensure that the VST cannot be duplicated without the original information;
- the VST system is much faster than traditional methods as it is based on database architecture speeds versus human intervention for non-repudiation challenges;
- the VST is much lower in cost than traditional methods due to limited human intervention;
- the VST is small in comparison to standard voice files and therefore can be embedded within business transactions; and - the identity of the users within the transaction can be authenticated with the VST if the users have been through either an enrolment process in a proactive stance or matched 'after the fact' by comparing a given voice sample.
While the invention has been described with reference to several specific embodiments, the description is illustrative of the invention and is not to be construed as limiting the invention. Various modifications may occur to those skilled in the art without departing from the true spirit and scope of the invention as defined by the appended claims.

Claims

What is claimed is:
1. A method of protecting a copyright for audio or video media by using a multi-media security token (MMST), the method comprising steps of:
(a) sampling a file at a network hub of a communications networks;
(b) determining whether or not the sampled file is an audio or visual file;
(c) if not, passing the file;
(d) if yes, creating an MMST for the sampled file;
(d) checking the MMST in a master database whether or not the MMST
matches anyone of the database;
(e) if no, passing the file;
(f) if yes, preventing the distribution of the file from which the sampled file is taken.
CA002375575A 2002-03-08 2002-03-08 Copyright protection method using multi-media security token Abandoned CA2375575A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002375575A CA2375575A1 (en) 2002-03-08 2002-03-08 Copyright protection method using multi-media security token

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA002375575A CA2375575A1 (en) 2002-03-08 2002-03-08 Copyright protection method using multi-media security token

Publications (1)

Publication Number Publication Date
CA2375575A1 true CA2375575A1 (en) 2003-09-08

Family

ID=27810536

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002375575A Abandoned CA2375575A1 (en) 2002-03-08 2002-03-08 Copyright protection method using multi-media security token

Country Status (1)

Country Link
CA (1) CA2375575A1 (en)

Similar Documents

Publication Publication Date Title
US8307213B2 (en) Method and system for digital watermarking
US7707088B2 (en) Copyright detection and protection system and method
US5822432A (en) Method for human-assisted random key generation and application for digital watermark system
US6928421B2 (en) Method and system for securely recording a verbal transaction
JP2009200595A (en) Signature management program, signature management method and signature management apparatus
Gomes et al. Audio watermarking and fingerprinting: For which applications?
EP3876507B1 (en) System and method for audio content verification
US20060015713A1 (en) Economically secure digital mass media systems
CA2375575A1 (en) Copyright protection method using multi-media security token
CA2375165A1 (en) Voice data privacy and protection system
JP5163727B2 (en) Signature management method, signature management system
JP2004158993A (en) Voice recording system
Moskowitz What is acceptable quality in the application of digital watermarking: trade-offs of security, robustness and quality
Li et al. Digital Forensics Laboratories in Operation: How are Multimedia Data and Devices Handled?
CA2352001A1 (en) Method for carrier class voice security token
Moskowitz A solution to the napster phenomenon: Why value cannot be created absent the transfer of subjective data

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued