TW200937251A - Data filtering method - Google Patents

Data filtering method Download PDF

Info

Publication number
TW200937251A
TW200937251A TW097149438A TW97149438A TW200937251A TW 200937251 A TW200937251 A TW 200937251A TW 097149438 A TW097149438 A TW 097149438A TW 97149438 A TW97149438 A TW 97149438A TW 200937251 A TW200937251 A TW 200937251A
Authority
TW
Taiwan
Prior art keywords
data
stored
received data
database
reference database
Prior art date
Application number
TW097149438A
Other languages
Chinese (zh)
Inventor
Mehmet Utku Celik
Original Assignee
Koninkl Philips Electronics Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninkl Philips Electronics Nv filed Critical Koninkl Philips Electronics Nv
Publication of TW200937251A publication Critical patent/TW200937251A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Abstract

A method of controlling usage of data. The method comprises receiving data (S1); processing said received data to determine (S3) whether said received data has a predetermined relationship with data stored in a reference database; and processing said received data to determine (S5) whether said received data comprises predetermined data. First usage control processing (S4, S8) is carried out if the received data has said predetermined relationship with data stored in said reference database or if the received data comprises predetermined data. Second usage control processing (S6) is carried out if the received data does not have the predetermined relationship with data stored in a reference database and if the received data does not comprise predetermined data.

Description

200937251 九、發明說明: 【發明所屬之技術領域】 本發明係關於一控制資料之使用之方法 【先前技術】 電腦被廣泛用於現代社會°現在’電腦通常經由電腦網 路相互連接’以便允許資料在電腦間傳送,且允許資料可 被電滕之錢者共用。現在,許多電職連接至網際網路 (Internet),允許全世界使用者彼此共用資料。200937251 IX. Description of the invention: [Technical field of invention] The present invention relates to a method of controlling the use of data [Prior Art] Computers are widely used in modern society. Now computers are usually connected to each other via a computer network to allow data. Transfer between computers, and allow data to be shared by the money. Nowadays, many electric jobs are connected to the Internet, allowing users all over the world to share information with each other.

儘管廣泛地資料共詩來許多優點,其亦產生問題。例 如’當網際網路為媒體播案(諸如視訊及音樂槽案)之散布 提供-便利機制時,網際網路亦藉由增加媒體檔案之未被 授權散布而給媒體擁有者帶來問題。媒體槽案之未被授權 散布典型地違反相關版權法,且導致一媒體擁有者被剝奪 應適當給予之收入。 使用網際網路共用資料之一已知方法包含一第一使用者 上載相關資料至與一網站相關之資料庫。然後一第二使用 者可下載相關資料’因此允許資料在第一及第二使用者間 共用。儘管提供具有合法使用之共用資料之有效方式,資 料共用之此一方法可導致媒體檔案之未被授權散布。此一 方法是特別有問題的,因為當網站業者對正被散布之檔案 的版權狀態一無所知時,網站之業者可能必須對違反版權 法而散布媒體檔案負起責任。 為減輕上文陳述之問題,已提議不可被自由散布之媒體 槽案之指紋可藉由媒體擁有者提供給網站業者。此等指紋 136729.doc 200937251 可藉由每-網站業者儲存在一適當參考資料庫中。一旦接 收一上載播案,網站業者可決定該上栽構案是否具有一匹 配儲存在-參考資料庫中之指紋的指紋。如果該上載標案 具有此-指紋,則上載可被禁止,以便確保不可被自由散 布之媒體播案不被儲存在藉由網站業者操作之資料庫且因 —- 此不可用於下載。 • 儘& x此方式散布彳日紋是有效的’由於必須提供給每一 ^業者上載檔案之指紋可與其比較的指紋資料庫,其執 行疋困難的纟於媒體擁有者提供更多可用的媒體播案, 此-資料庫必須定期更新且因此資料庫之維護是困難的。 【發明内容】 本發明之-實施例之目的係消除或減輕上文陳述之一或 多個問題。更具體言之,本發明之一些實施例之目的係為 控制散布資料之使用提供一有效機制。 ,據本發明之第一態樣,提供一種控制資料之使用之電 ❹ 實方法該方法包含.接收資料;如果該接收資料與 健存在該參考資料庫中之資料具有一預先決定關係或如果 該接收資料包含預先決定資料,則執行第-使用控制處 ' 理;及如果該接&資料與健存在一參考資料庫中之資料沒 冑該預先決定關係且如果該接收資料不包含該預先決定資 料,則執行第二使用控制處理。 以此方法,包含預先決定資料之任意資料(諸如一複製 浮水P)之處理方式不同於不包含預先決定資料之資 料之處理方式。然而,即使未包含此預先決定資料,如果 I36729.doc 200937251 =收:料與储存在參考資料庫中之資料具有一預先決定 關係广資料被處理就如同包含此資料一樣。以此方 二:::使用者從被接收之資料中移除複製控制資料, 則資科之處理仍可基於參考資料庫被控制。 =收資料可係旨在儲存在—f料庫中,及該方法可用 ;或阻止儲存該接收資料於該f料庫卜例如,第一 使用控制處理可包含阻止儲存資料於該資料庫中,而第二 使用控制處理可包含允許儲存資料於該資料庫令。 參考資料庫可被填充具有基於包含預先決定資料之接收 資料之資料。例如,包含複製控制資料之接收資料之指紋 可被儲存在參考資料庫中。亦即,只要包含複製控制資料 之資枓被接收,基於該接收資料之資料可被儲存在參考資 料庫以用於未來使用。以此方式,隨著檔案之複數個複複 本被處理’如果一檔案之單一複本包含複製控制資料參 考資料庫被適當地填充以便確保檔案之另—複本不被儲 存’不管檔案之此等更多複本是否包含防複製資料。此意 指參考資料庫最初可以是空的且可藉由接收資料之適當處 理予以自動地填充。 在結合特別接收資料執行第二使用控制處理時基於該 接收資料之資料可被儲存在另一參考資料庫。如果同一資 料之後續複製被處理且被決定包含複製控制資料,則另一 參考資料庫中資料之包含可用以產生一適當警示,其指示 資料之複製被阻止的資料已以一特別方式被處理。 如指示之,複製控制資料適合地表現為一浮水印之形 136729.doc 200937251 式。各種技術可用以產生一浮水印及以將一浮水印嵌入一 資訊訊號中。此技術對意欲以移除一浮 以擊提供有變化的阻力。使用本文描述:方法更允;= 浮水印被移除,基於上文描述之參考資料庫,其複製將被 控制之資料之處理仍可被阻止。 ' 根據本發明之另一態樣,提供一種執行本發明之第一態 • 樣之方法之電腦程式。此一電腦程式被執行在一適當載體 媒體》此一載體媒體可以是一有形載體媒體諸如一軟磁 _ 碟、硬磁碟、CD或DVD或另-選擇為一無形之載鱧媒體 諸如一通訊訊號。 本發明之另一態樣提供用於執行本發明之第一態樣之方 法之裝置。 【實施方式】 現在’將以實例方式參考附隨圖式詳細描述本發明。 圖1繪示連接至網際網路1之複數個電腦。從圖可見二使 用者電腦2、3被連接至網際網路1 ’ 一伺服器電腦4亦被連 接至網際網路1。使用者電腦2、3及伺服器電腦4透過網際 網路1使用本方法可彼此間傳輸資料,此對熟悉此項技術 者將充分顯而易見。 伺服器電腦4可存取一儲存複數個檔案之資料庫5,該等 標案可藉由使用者電腦2、3透過網際網路1下載。伺服器 電腦4經組態以自使用者電腦2、3接收此等播案及將此等 檔案儲存在資料庫5。伺服器4亦可存取一參考資料庫6。 該參考資料庫6儲存檔案之指紋,該等檔案至資料庫5之上 136729.doc 200937251 載被禁止。因各種原因,一特別檔案之上載可被禁止,例 如如果一特別檔案之上載將違反相關版權法,該上载可 被禁止。 圖2疋一流程圖,其繪示從使用者電腦2 3之一上載檔 案至與伺服器電腦4相關之資料庫5之程序。圖2之流程圖 螬·示之程序是藉由伺服器電腦4執行。 . 在步驟S1,一上載檔案被接收。在步驟S2,上載檔案之 &紋被產生。該指紋可以任-適合方式產生,及組成該上 $檔案之簡明描述。在步㈣,產生的指紋與儲存在參考 資料庫6中之指紋比較。如果產生之指紋匹配儲存在參考 資料庫6中之指紋,則檔案之上載被阻止,及處理終止在 步驟S4然而,如果產生之指紋與儲存在資料庫6中之指 紋不匹配,則處理轉到步驟S5 ^ 在步驟S5,上載檔案被處理以決定其是否包含一防複製 浮水印。此一防複製浮水印可表現為任一適合形式。步驟 ❹ S5之處理被西己置以決定一浮水印是否被包含在該上載播案 内,及如果一浮水印被包含在該上載檔案中,則提取浮水 印以用於處理。如果在步驟S5沒有發現防複製浮水印則 - 其可決疋檔案之上載被允許,且因此處理從步驟S5轉到步 .驟S6,其中上載之檔案被儲存在資料庫5,使用者電腦2、 3可從該資料庫5下載該上載檔案。 如果在步驟S5找到一防複製浮水印,則可決定檔案之上 載被禁止,及然後處理從步驟S5轉到步驟87。在處理在步 驟S8繼續之前,其中該槽案之上載被阻止,在步驟上 136729.doc 200937251 載播案之指紋被儲存在參考資料庫6。Despite the many advantages of a wide range of materials, it also creates problems. For example, when the Internet provides a facilitation mechanism for the dissemination of media broadcasts (such as video and music slots), the Internet also poses problems for media owners by increasing the unauthorized distribution of media files. Unauthorized dissemination of media slots typically violates relevant copyright laws and results in a media owner being deprived of the appropriate income. One known method of using Internet sharing data includes a first user uploading relevant information to a database associated with a website. A second user can then download the relevant material' thus allowing the data to be shared between the first and second users. This method of sharing data can result in unauthorized distribution of media files, despite providing an effective means of sharing the material for legitimate use. This method is particularly problematic because when the website owner knows nothing about the copyright status of the file being distributed, the website operator may be responsible for distributing the media file in violation of copyright law. In order to alleviate the problems stated above, fingerprints of media slots that have been proposed to be freely distributed can be provided to the website provider by the media owner. These fingerprints 136729.doc 200937251 can be stored in an appropriate reference database by each website provider. Once an upload broadcast is received, the website operator can determine whether the upload has a fingerprint with a fingerprint stored in the reference database. If the uploading script has this-fingerprint, the upload can be disabled to ensure that media broadcasts that are not freely circulated are not stored in the database operated by the website operator and that this is not available for download. • It is effective to distribute the pattern in this way. 'Because the fingerprint database that must be provided to each operator to upload the fingerprint of the file can be compared, the execution of the file is more difficult and the media owner provides more available. Media broadcasts, this - the database must be updated regularly and therefore the maintenance of the database is difficult. SUMMARY OF THE INVENTION The object of the present invention is to obviate or mitigate one or more of the problems set forth above. More specifically, some embodiments of the present invention are directed to providing an effective mechanism for controlling the use of distributed material. According to a first aspect of the present invention, there is provided an electronic method for controlling the use of data, the method comprising: receiving data; if the received data has a predetermined relationship with data stored in the reference database or if If the received data includes pre-determined data, the first-use control is performed; and if the data is stored in a reference database, the predetermined relationship is not present and if the received data does not include the predetermined The data is then subjected to a second usage control process. In this way, any material containing predetermined data (such as a copy of the floating water P) is handled differently than the material that does not contain the predetermined data. However, even if this pre-determined material is not included, if I36729.doc 200937251=received material and the data stored in the reference database has a predetermined relationship, the data is processed as if it were included. In this way, the second::: The user removes the copy control data from the received data, and the processing of the subject can still be controlled based on the reference database. The receipt data may be stored in the library, and the method may be used; or the storage of the received data may be prevented from being stored in the library. For example, the first usage control process may include preventing the stored data from being stored in the database. The second usage control process may include allowing the data to be stored in the database order. The reference database can be populated with information based on the received data containing the predetermined data. For example, a fingerprint containing the received data of the copy control data can be stored in the reference database. That is, as long as the assets containing the copy control data are received, the data based on the received data can be stored in the reference material library for future use. In this way, as multiple copies of the file are processed 'if a single copy of a file contains a copy control data reference library is properly populated to ensure that the other copy of the file is not stored' regardless of the file, etc. Whether the copy contains anti-copy information. This means that the reference library can initially be empty and can be automatically populated by appropriate processing of the received data. The data based on the received data may be stored in another reference database when the second usage control process is performed in conjunction with the special received data. If subsequent copies of the same material are processed and are determined to contain copy control material, the inclusion of the data in another reference database can be used to generate an appropriate alert, the information indicating that the copying of the data is blocked has been processed in a particular manner. As indicated, the copy control data suitably appears as a watermark shape 136729.doc 200937251. Various techniques can be used to generate a watermark and to embed a watermark in an information signal. This technique is intended to provide a change in resistance by removing a float. Use of the description herein: the method is more convenient; = the watermark is removed, based on the reference library described above, the processing of the data whose copy is to be controlled can still be blocked. According to another aspect of the present invention, a computer program for performing the first aspect of the present invention is provided. The computer program is executed on a suitable carrier medium. The carrier medium may be a tangible carrier medium such as a soft magnetic disk, a hard disk, a CD or a DVD or another - selected as an intangible carrier medium such as a communication signal. . Another aspect of the invention provides an apparatus for performing the method of the first aspect of the invention. [Embodiment] The present invention will now be described in detail by way of example with reference to the accompanying drawings. FIG. 1 illustrates a plurality of computers connected to the Internet 1. It can be seen that the two user computers 2, 3 are connected to the Internet 1' and a server computer 4 is also connected to the Internet 1. The user computers 2, 3 and the server computer 4 can transmit data to each other using the method via the Internet 1, which will be sufficiently apparent to those skilled in the art. The server computer 4 can access a database 5 storing a plurality of files which can be downloaded through the Internet 1 by the user computers 2, 3. The server computer 4 is configured to receive such broadcasts from the user computers 2, 3 and store the files in the database 5. The server 4 can also access a reference database 6. The reference database 6 stores fingerprints of the files, which are prohibited on the database 136729.doc 200937251. Uploading of a particular file may be prohibited for a variety of reasons, such as if a special file upload would violate the relevant copyright laws, the upload may be prohibited. Figure 2 is a flow chart showing the procedure for uploading a file from one of the user computers 23 to the database 5 associated with the server computer 4. The flowchart of FIG. 2 is executed by the server computer 4. In step S1, an upload file is received. In step S2, the & pattern of the uploaded file is generated. The fingerprint can be generated in any suitable manner and constitute a concise description of the upper file. In step (4), the generated fingerprint is compared with the fingerprint stored in the reference database 6. If the generated fingerprint matches the fingerprint stored in the reference database 6, the upload of the file is blocked, and the processing is terminated in step S4. However, if the generated fingerprint does not match the fingerprint stored in the database 6, the processing proceeds to Step S5 ^ In step S5, the upload file is processed to determine whether it contains an anti-copy watermark. This anti-copy watermark can be expressed in any suitable form. Step ❹ The processing of S5 is set by West to determine whether a watermark is included in the upload, and if a watermark is included in the upload file, the watermark is extracted for processing. If the copy-protected watermark is not found in step S5 - it can be determined that the upload of the file is permitted, and therefore the process proceeds from step S5 to step S6, wherein the uploaded file is stored in the database 5, the user computer 2 3 The upload file can be downloaded from the database 5. If an anti-copy watermark is found in step S5, it may be determined that the file upload is disabled, and then processing proceeds from step S5 to step 87. Before the processing continues in step S8, where the upload of the slot is blocked, the fingerprint of the 136729.doc 200937251 broadcast case is stored in the reference database 6.

從前述描述可知,只有當其不包含防複製浮水印(步驟 S5)’且具有-沒有包含在參考資料庫6中之指紋時(步錄 S3) ’ -播案可被上載至資料庫5。參考資料庫㉖初可以 是空的’及然後可隨著包含防複製浮水印之檔案被處理而 被填充。以此方式,不需要—内容擁有者傳輸指紋資料给 網站業者,及替代的是網站業者可基於被呈現上載給資料 庫5之檔案建立參考資料庫6。&果防複製資料已經被從一 槽案之複製中移除,該播案至資料庫5之上載應被阻止, 藉由檢查決定該檔案之指紋是否被包含在該參考資料庫6 中’檔案之上載仍應被阻止。 可見,只有當檔案之指紋被儲存在參考資料庫6時,不 包含防複製浮水印之檔案之上載之阻止可發生。在參考資 料庫ό最初是空的時’只有當伺服器電腦4先前已被提供包 含一防複製浮水印之檔案之複製,且因此已經在參考資料 庫ό中儲存一適當指紋時,上載可被阻止。因此,如果伺 服器電腦4最初被提供具有一權案之複製,該標案之上载 應被阻止’其不包含防複製浮水印,檔案之一複製將被儲 存在資料庫5。此一情形藉由本發明之實施例減輕,現 在,參考圖式3及4描述本發明之實施例。 圖3是圖1之網路之另一圖解。然而,從圖可見除了資料 庫5及參考資料庫6之外,伺服器電腦4另外可存取另一參 考資料庫7。另一參考資料庫7經配置以儲存已被上載至資 料庫5之檔案之指紋,且參考圖4之流程圖描述其使用。對 136729.doc -10· 200937251 應圖2之流程圖之步驟之圖4流程圖之步驟被標識有同一參 考數字,且此處沒有進一步詳細討論。 參考圖4,可見如果在步驟S5沒有偵測到防複製浮水 印,則處理轉到步驟S9,其中在步驟S2產生之上載檔案之 指紋被儲存在另一參考資料庫7’下文將討論其使用。儲 存在另一參考資料庫7中之資料被提供具有一獨一識別 • 符。處理從步驟S9轉到步驟S6,其中上載檔案被儲存在資 料庫5中’如上文所述。 ® 如果在步驟S5中偵測到一複製保護浮水印,處理轉到步 驟S7,再次如上文描述,在步驟88之前阻止在檔案之上 載,上載檔案之指紋被儲存在參考資料庫6中,如上文所 述。然而,在圖4繪示之本發明之實施例中,處理從步驟 S8轉到步驟S10,在步驟S10中執行一檢查以決定產生的指 紋是否被包含在另一參考資料庫7中。如果是此情況,處 理從步驟S10轉到步驟S11,在步驟su中一警示被提供給 φ 肖服器電腦4之業者°此—警示指示-與不應被上載至資 料庫5之檔案相關之指紋被儲存在另一參考資料庫?中因 此指示該檔案先前已被儲存在資料庫5中。該警示可指示 ·- 與資料之指紋相關之獨一識別符被儲存在另一參考資料庫 . 7中。伺服器電腦4之業者可回應於該警示而採取適當行 動。 可見,如參考圖4描述之處理意指如果應被阻止之檔案 之上載已被上載至資料庫5,則一警示被提供給饲服器電 腦4之業者以允許進-步調查,及是否應從資料庫$中適當 136729.doc -11- 200937251 移除相關檔案。 從上述描述可見’在參考圖3及4描述之本發明之實施例 中’參考資料庫6儲存檔案上載應被阻止之檔案指紋,同 時另一參考資料庫7儲存其上載已被允許之檔案之指紋。 應瞭解上文描述之發明實施例可用以控制至一資料庫之 任一類型之檔案之上載。例如,本發明之實施例可用於音 訊、視訊、影像、圖形及多媒體播案。 上述描述已參考被產生、儲存及比較之各種檔案之指 紋。應瞭解此等指紋可被建立及以任一適合方式予以處 理’指紋基本上是相關檔案之短描述符β應進一步瞭解, 在一些情況下’自接收資料產生之指紋將不能精確地匹配 儲存在參考資料庫6中之指紋或儲存在另一參考資料庫7中 之指紋,即使該接收資料事實上待基於儲存在參考資料庫 6中之指紋或儲存在另一參考資料庫7中之指紋予以控制。 為此原因’最佳地’執行接收資料之指紋之搜尋致使找出 實質上相同於接收資料之指紋的任一指紋(雖然或許與接 收資料之指紋不相同)。 前述描述已參考防複製浮水印。此等浮水印可被產生及 以任一便利方式嵌入相關檔案。概括地,應瞭解上文描述 之本發明之實施例可使用包含在上載檔案中之任一適合防 複製資料。 前述描述涉及一組態,其中伺服器電腦4(圖1及3)控制 至與伺服器電腦4相關之資料庫5之檔案之上載。應瞭解在 本發明之替代實施例中,使用複數個伺服器電腦共同操 136729.doc -12- 200937251 作,上文描述之方法可被執行。在此一組態中,一單一參 考資料庫可被複數個伺服器電腦共用,或另一選擇是每— 伺服器電腦可具有其各自參考資料庫。 術語"資料庫"例如本文使用之術語將被廣泛地解釋以涵 蓋儲存資料之任一構件使得儲存之資料可被棟取。亦即, - 儘管術語涵蓋正式的資料庫管理系統,其亦包含任一資料 . 儲存系統諸如例如藉由多個作業系統提供之一檔案儲存系 統類型。 前述描述涉及本發明之實施例,其中上載至一伺服器及 自一伺服器中下載之資料對複數個使用者電腦是易存取 的。然而,本發明不限於此一情形,本發明之替代實施例 在一對等環境中使用上文描述之使用控制技術以便控制連 接至一電腦網路之電腦間的資料之傳輸。實際上,概括 地,上文描述之方法可用作將一使用控制策略應用於特別 資料之有效方式。例如,接收資料可被處理如上文描述及 ⑩ 指不接收資料之使用之約束之資料可被產生。此產生資料 可被提供給-電腦内的另一程序以產生資料或替代地可被 提供給另一電腦。 前述描述涉及防複製浮水印之使用及-參考資料庫之使 - 肖#經組態使得存在於參考資料庫中之資料是資料不應 被散3布之指示。在本發明之替代實施例中,以某-方式 (不疋簡單地阻止複製)控制複製之浮水印被使用。在此情 况下、’參考資料庫可同樣地健存資料之指紋,該資料之複 製將乂某方式被控制。任_適合複製控制策略可用於本 136729.doc 200937251 發明之實施例。例如,如果複製控制資料被包含在接收資 料中(或適當資料被儲存在參考資料庫中)’接收資料之散 布可僅在付費給第三方後被允許,或僅如果按照特別程序 以確保資料之完整性,接收資料之散布可被允許。 在本發明之一些實施例中,參考資料庫經配置以執行至 少二不同使用控制策略。浮水印可同樣地經配置以執行不 同使用控制策略。亦即,替代簡單地使用參考資料庫以決 定對應特別資料之資料(例如,一指紋)是否被儲存及然後 基於該決定執行預先決定處理,儲存在參考資料庫中之資 料可指示一特別類型之將被執行的使用控制處理,且然後 該使用控制處理被執行❶亦即,參考資料庫可支援複數個 不同類型的使用控制處理及指示適於特別資料之特別使用 控制處理。同樣地,包含在資料中之浮水印可指示一應該 被應用之特別類型的使用控制處理。從前述描述可瞭解, 不同類型的使用控制處理包含阻止複製、在一定條件下允 許複製’及簡單地允許複製而不約束。 上文已描述本發明之實施例。然而,應瞭解在不脫離附 隨請求項之範圍之情況下,可對描述之實施例進行各種修 改。 【圖式簡單說明】 圖1是一電腦網路之概略圖解; 圖2是根據本發明之實施例用於控制資料之上載至圖1之 網路中伺服器之程序流程圖; 圖3是圖1之電腦網路之概略圖解,其中該伺服器經組態 136729.doc -14 - 200937251 以根據本發明之替代實施例操作;及 圖4是一替代程序之流程圖,用於根據本發明之一實施 例控制資料之上載至圖3之網路中之伺服器。 【主要元件符號說明】 1 網際網路 .- 2 使用者電腦 . 3 使用者電腦 4 伺服器電腦 資料庫 6 參考資料庫 7 另一參考資料庫 136729.doc -15-As apparent from the foregoing description, the broadcast can be uploaded to the database 5 only if it does not contain the copy-protected watermark (step S5)' and has a fingerprint not included in the reference library 6 (step S3). Reference library 26 may initially be empty' and may then be populated as the file containing the anti-copy watermark is processed. In this way, it is not necessary for the content owner to transmit fingerprint data to the website provider, and instead the website provider can create a reference database 6 based on the files uploaded to the database 5 for presentation. The & anti-copy data has been removed from the copy of a slot, the upload of the broadcast to the database 5 should be blocked, by checking to determine whether the fingerprint of the file is included in the reference database 6' The upload of the file should still be blocked. It can be seen that only when the fingerprint of the file is stored in the reference database 6, the blocking of the upload of the file without the anti-copy watermark can occur. When the reference library is initially empty, 'Only when the server computer 4 has previously been provided with a copy of the file containing an anti-copy watermark, and thus an appropriate fingerprint has been stored in the reference library, the upload can be prevent. Therefore, if the servo computer 4 is initially provided with a copy of a rights, the upload of the file should be blocked 'it does not contain an anti-copy watermark, and one copy of the file will be stored in the database 5. This situation is alleviated by embodiments of the present invention, and embodiments of the present invention will now be described with reference to Figures 3 and 4. Figure 3 is another illustration of the network of Figure 1. However, it can be seen from the figure that in addition to the database 5 and the reference database 6, the server computer 4 can additionally access another reference database 7. Another reference library 7 is configured to store fingerprints of files that have been uploaded to the repository 5, and its use is described with reference to the flow chart of Figure 4. The steps of Figure 4 of the flowchart of Figure 2 are identified by the same reference numerals and are not discussed in further detail herein. Referring to FIG. 4, it can be seen that if the anti-copy watermark is not detected in step S5, the process goes to step S9, wherein the fingerprint of the upload file generated in step S2 is stored in another reference library 7'. . The data stored in another reference database 7 is provided with a unique identifier. Processing proceeds from step S9 to step S6, in which the uploaded file is stored in the repository 5 as described above. ® If a copy protection watermark is detected in step S5, the process goes to step S7, again as described above, the upload of the file is blocked before step 88, and the fingerprint of the uploaded file is stored in the reference database 6, as above As stated in the article. However, in the embodiment of the present invention illustrated in Fig. 4, the process proceeds from step S8 to step S10, and a check is performed in step S10 to determine whether the generated fingerprint is included in another reference database 7. If this is the case, the process proceeds from step S10 to step S11, in which a warning is provided to the operator of the φ server computer 4 - the warning indication - associated with the file that should not be uploaded to the database 5 Is the fingerprint stored in another reference library? This indicates that the file has been previously stored in the database 5. The alert may indicate that the unique identifier associated with the fingerprint of the data is stored in another reference database. The operator of the server computer 4 can take appropriate action in response to the alert. It can be seen that the processing as described with reference to FIG. 4 means that if the upload of the file to be blocked has been uploaded to the database 5, a warning is provided to the operator of the server 4 to allow further investigation and whether it should be Appropriate 136729.doc -11- 200937251 in the database $Remove the relevant files. As can be seen from the above description, 'in the embodiment of the present invention described with reference to Figs. 3 and 4, the reference database 6 stores the file fingerprints whose file uploads should be blocked, while the other reference database 7 stores the files whose uploads have been permitted. fingerprint. It will be appreciated that the embodiments of the invention described above can be used to control the uploading of files of any type to a database. For example, embodiments of the present invention can be used for audio, video, video, graphics, and multimedia broadcasts. The above description has referenced the fingerprints of various files that are generated, stored and compared. It should be understood that such fingerprints can be created and processed in any suitable manner. 'Fingerprints are basically short descriptors of related files. β should be further understood. In some cases, fingerprints generated from received data will not be accurately matched. The fingerprint in the reference database 6 or the fingerprint stored in another reference database 7, even if the received data is actually to be based on the fingerprint stored in the reference database 6 or the fingerprint stored in another reference database 7 control. For this reason, the 'best' execution of the fingerprint of the received data results in the identification of any fingerprint that is substantially identical to the fingerprint of the received data (although perhaps not identical to the fingerprint of the received data). The foregoing description has referred to anti-copy watermarking. These watermarks can be generated and embedded in the associated file in any convenient manner. In general, it should be understood that embodiments of the invention described above may use any suitable anti-copy material contained in an upload file. The foregoing description relates to a configuration in which the server computer 4 (Figs. 1 and 3) controls the uploading of files to the database 5 associated with the server computer 4. It will be appreciated that in an alternate embodiment of the present invention, the method described above can be performed using a plurality of server computers operating together 136729.doc -12-200937251. In this configuration, a single reference database can be shared by a plurality of server computers, or alternatively, each server computer can have its own reference library. The term "database", as used herein, is to be interpreted broadly to encompass any component of the stored material so that the stored material can be taken. That is, - although the term encompasses a formal database management system, it also contains any material. A storage system such as one of the file storage system types provided by, for example, multiple operating systems. The foregoing description relates to embodiments of the present invention in which the data uploaded to a server and downloaded from a server is easily accessible to a plurality of user computers. However, the present invention is not limited to this case, and an alternative embodiment of the present invention uses the above-described usage control techniques in a peer-to-peer environment to control the transfer of data between computers connected to a computer network. In fact, in summary, the method described above can be used as an effective way to apply a control strategy to particular data. For example, receiving data may be processed as described above and 10 means that data that does not accept the use of the data may be generated. This generated material can be provided to another program within the computer to generate the data or alternatively can be provided to another computer. The foregoing description relates to the use of anti-copy watermarks and the use of reference libraries - Xiao # is configured so that the data present in the reference database is not indicated by the data. In an alternative embodiment of the invention, a copy of the watermark is controlled in a certain manner (not simply preventing copying) from being used. In this case, the reference database can similarly store the fingerprint of the data, and the copying of the data will be controlled in a certain way. Any suitable copy control strategy can be used in embodiments of the invention of 136729.doc 200937251. For example, if the copy control material is included in the received data (or the appropriate data is stored in the reference database), the distribution of the received data may be permitted only after payment to a third party, or only if special procedures are followed to ensure the data. Integrity, the distribution of received data can be allowed. In some embodiments of the invention, the reference library is configured to perform at least two different usage control strategies. The watermark can be similarly configured to perform different usage control strategies. That is, instead of simply using the reference database to determine whether the data corresponding to the particular material (eg, a fingerprint) is stored and then performing a predetermined process based on the decision, the data stored in the reference database may indicate a particular type. The usage control process to be executed, and then the usage control process is executed, that is, the reference database can support a plurality of different types of usage control processes and instructions for special use control processing suitable for special materials. Similarly, the watermark contained in the material can indicate a particular type of usage control process that should be applied. As can be appreciated from the foregoing description, different types of usage control processes include blocking copying, allowing copying under certain conditions' and simply allowing copying without constraining. Embodiments of the invention have been described above. However, it will be appreciated that various modifications may be made to the described embodiments without departing from the scope of the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic diagram of a computer network; FIG. 2 is a flow chart of a program for controlling uploading of data to a server in the network of FIG. 1 according to an embodiment of the present invention; A schematic diagram of a computer network, wherein the server is configured 136729.doc -14 - 200937251 to operate in accordance with an alternate embodiment of the present invention; and Figure 4 is a flow diagram of an alternative program for use in accordance with the present invention An embodiment controls the uploading of data to a server in the network of FIG. [Main component symbol description] 1 Internet .- 2 User computer . 3 User computer 4 Server computer Database 6 Reference library 7 Another reference library 136729.doc -15-

Claims (1)

200937251 十、申請專利範圍: 該方法包含以下 i 一種控制資料之使用之電腦實施方法 步驟: 接收資料(si); 如果該接收資料與儲存在一參老眘 廿仕麥考資枓庫(6)_之資料具 有一預先決定關係,或如果該接 术涿接收資枓包含預先決定資 料,則執行第一使用控制處理(S4、S8);及 如果該接收資料與儲存在該參考資料庫中之資料沒有 該預先決㈣係且如果該接收資料不包含該預先決定資 料,則執行第二使用控制處理(S6)。 2·如請求項1之方法,其中執行該第一使用控制處理包含 產生第一使用資料,及執行該第二使用控制處理包含產 生第二使用資料。 3. 如請求項1或2之方法,其中·· 該接收資料係旨在儲存在一資料庫(5); 執行該第一使用控制處理包含阻止儲存該接收資料於 該資料庫中;及 執行該第二使用控制處理包含允許儲存該接收資料於 該資料庫中 4. 如請求項1或2之方法,其中該預先決定資料是與該接收 資料相關之使用控制資料。 5. 如請求項4之方法,其中該使用控制資料是防複製資 料。 6. 如請求項1或2之方法’其中該預先決定資料是一浮水 136729.doc 200937251 印。 7. 如請求項1或2之方法’其中該參考資料庫(6)儲存複數個 指紋,及該方法進一步包含: 處理(S2、S3)該接收資料,藉由決定該接收資料之一 指紋’以決定該接收資料與儲存在該參考資料庫中之資 料是否具有一預先決定關係。 8. 如請求項7之方法,其中處理該接收資料以決定該接收200937251 X. Patent application scope: The method includes the following i: a computer implementation method for controlling the use of data: receiving data (si); if the receiving data is stored and stored in a ginseng Shimao Shimao library (6) The data of _ has a predetermined relationship, or if the receiving data includes predetermined data, the first usage control process is performed (S4, S8); and if the received data is stored in the reference database The data has no such predetermined (four) system and if the received data does not contain the predetermined data, the second use control process is executed (S6). 2. The method of claim 1, wherein performing the first usage control process comprises generating a first usage profile, and performing the second usage control process comprises generating a second usage profile. 3. The method of claim 1 or 2, wherein: the receiving data is intended to be stored in a database (5); performing the first usage control processing comprises preventing storage of the received data in the database; and executing The second usage control process includes a method of allowing the receipt of the received data in the database. 4. The method of claim 1 or 2, wherein the predetermined data is usage control data associated with the received data. 5. The method of claim 4, wherein the usage control data is anti-copy material. 6. The method of claim 1 or 2 wherein the predetermined data is a floating water 136729.doc 200937251 printed. 7. The method of claim 1 or 2 wherein the reference database (6) stores a plurality of fingerprints, and the method further comprises: processing (S2, S3) the received data by determining a fingerprint of the received data. To determine whether the received data has a predetermined relationship with the data stored in the reference database. 8. The method of claim 7, wherein the receiving the data is processed to determine the receiving 資料與儲存在該參考資料庫中之資料是否具有一預先決 定關係進一步包含: 決定該接收資料之該指紋是否實質上相同於儲存在該 參考資料庫中之指紋。 9.如請求項1或2之方法,進一步包含: 如果該接收資料包含該預先決定資料,則將基於該接 收資料之資料儲存(S7)在該參考資料庫中。 10.如請求項9之方法, 接收資料之一指紋。 其中基於該接收資料之該資料是該 如請求項1或2之方 資料儲存(S9)在—另—參考資料庫⑺中。 12.如請求項11之方法,甘士丑 冬·收* 其中執行該第二使用控制處理包 •將基於該接收資料之資 中。 貝τ叶餺存在該另一參考資料庫 13.如請求項11之方法 資料之一指紋。 14.如請求項I〗之方法 其令基於該接收資料之該資料是該 其中該第一使用控制處理包含: 136729.doc •2· 200937251 決定基於該接收資料之資料是否被儲存在該另一參考 資料庫中;及 如果基於該接收資料之資料被儲#在該另一參考資料 庫中’則輸出(S1 1)訊息資料。 15 « ❹16. 17. 18. 19. ❹ 20. 如請求項14之方法,其中該第一使用控制處理進一步包 含:如果基於該接收資料之該資料被儲存在該另一參考 資料庫中: 從該另一參考資料庫中移除基於該接收資料之資料。 如請求項1或2之方法,其中該接收資料是選自包含音訊 資料、影像資料、及視訊資料之群組。 一種電腦程式,其經組態以控制一電腦執行任一前述請 求項中之一方法。 種載體媒體,其攜載如請求項17之一電腦程式。 一種用於篩選儲存在一資料庫中之資料之電腦,該電 包含: ««己隐體’其儲存處理器可讀取指令;及 一處理器,其經組態以讀取及執行儲存在該程式記憶 體中之指令; 其中該處理器可讀取指令包含控制該處理器以執行如 請求項1至16中任一項之方法之指令。 一種控制資料之使用之裝置’該裝置包含: 一接收器,其經組態以接收資料; 一處理器,其經配置以: 如果該接收資料與儲存在該參考㈣庫中之資料具 136729.doc 200937251 一預先決㈣係或如果該接收資料包含預先決定資 ,’則執行第一使用控制處理;及 果該接收資料與儲存在一參考資料庫中之資料沒 有該預先決定關係且如果該接收資料不包含該預先決 定資料則執行第二使用控制處理。 Ο ❸ 136729.docWhether the data and the data stored in the reference database have a predetermined relationship further comprises: determining whether the fingerprint of the received data is substantially the same as the fingerprint stored in the reference database. 9. The method of claim 1 or 2, further comprising: if the received data includes the predetermined data, storing (S7) the data based on the received data in the reference database. 10. In the method of claim 9, receiving a fingerprint of the data. The data based on the received data is stored in the data of the request item 1 or 2 (S9) in the other reference library (7). 12. As in the method of claim 11, the Gans ugly winter receives the second use control processing package, which will be based on the received data. The shellfish is present in the other reference library 13. A fingerprint of one of the methods of claim 11. 14. The method of claim I, wherein the data based on the received data is the first usage control process comprises: 136729.doc • 2· 200937251 determining whether the data based on the received data is stored in the other In the reference database; and if the data based on the received data is stored in the other reference database, the (S1 1) message data is output. 15. The method of claim 14, wherein the first usage control process further comprises: if the data based on the received data is stored in the another reference database: The other reference database removes the data based on the received data. The method of claim 1 or 2, wherein the received data is selected from the group consisting of audio data, video data, and video data. A computer program configured to control a computer to perform one of the methods of any of the preceding claims. A carrier medium carrying a computer program as in claim 17. A computer for screening data stored in a database, the battery comprising: ««hidden" a storage processor readable instruction; and a processor configured to read and execute storage An instruction in the program memory; wherein the processor readable instruction comprises an instruction to control the processor to perform the method of any one of claims 1 to 16. A device for controlling the use of data 'The device comprises: a receiver configured to receive data; a processor configured to: if the received data and the data stored in the reference (4) library have 136729. Doc 200937251 a pre-determined (four) system or if the receiving data contains pre-determined assets, 'the first use control process is performed; and the received data and the data stored in a reference database do not have the predetermined relationship and if the receiving The second usage control process is executed if the data does not include the predetermined data. Ο ❸ 136729.doc
TW097149438A 2007-12-19 2008-12-18 Data filtering method TW200937251A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP07123555 2007-12-19

Publications (1)

Publication Number Publication Date
TW200937251A true TW200937251A (en) 2009-09-01

Family

ID=40473774

Family Applications (1)

Application Number Title Priority Date Filing Date
TW097149438A TW200937251A (en) 2007-12-19 2008-12-18 Data filtering method

Country Status (2)

Country Link
TW (1) TW200937251A (en)
WO (1) WO2009081322A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9099080B2 (en) 2013-02-06 2015-08-04 Muzak Llc System for targeting location-based communications

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5473769A (en) * 1992-03-30 1995-12-05 Cozza; Paul D. Method and apparatus for increasing the speed of the detecting of computer viruses
US6952776B1 (en) * 1999-09-22 2005-10-04 International Business Machines Corporation Method and apparatus for increasing virus detection speed using a database
US20020168082A1 (en) * 2001-03-07 2002-11-14 Ravi Razdan Real-time, distributed, transactional, hybrid watermarking method to provide trace-ability and copyright protection of digital content in peer-to-peer networks
WO2004015629A2 (en) * 2002-07-26 2004-02-19 Koninklijke Philips Electronics N.V. Identification of digital data sequences
EP1595398A1 (en) * 2003-02-10 2005-11-16 Koninklijke Philips Electronics N.V. Import control of content

Also Published As

Publication number Publication date
WO2009081322A1 (en) 2009-07-02

Similar Documents

Publication Publication Date Title
KR101712726B1 (en) Method and system for verifying integrity and validity of contents using hash code
US8607354B2 (en) Deriving multiple fingerprints from audio or video content
US8126918B2 (en) Using embedded data with file sharing
US8489882B2 (en) Third-party watermarking
US8442997B2 (en) Method and apparatus for monitoring the distribution of electronic files
US20150193602A1 (en) Methods and apparatus for sharing, transferring and removing previously owned digital media
US20160105583A1 (en) Using a Security Feature with a Digital Image File
EP1785890B1 (en) Using embedded data with file sharing
GB2379349A (en) Embedding data in material at a receiver
US20090125722A1 (en) Cross-platform digital rights management providing multi-level security information flow tracking
AU2001277047A1 (en) Using embedded data with file sharing
WO2007072372A2 (en) Efficient secure forensic watermarking
US20070136204A1 (en) Apparatus and method for implementing digital rights management systems in low-efficiency storage device
TWI281825B (en) Right management system and method for digital broadcasting
TW200937251A (en) Data filtering method
KR101564731B1 (en) System and method for tracking a downloaded digital media file
Kwok et al. Intellectual property protection for electronic commerce applications.
KR20210068929A (en) Tracking system for image unauthorized replication and theft
RU2439821C2 (en) Method of protecting digital content by using memory card encryption and decryption
JP2006237687A (en) Program and user tracing device
KR101172669B1 (en) On-line watermark service system
US8682797B1 (en) Methods and systems for distributing digitally encoded information
EP2854067B1 (en) Information processing device, information processing system, information processing method, and program
CN114519171A (en) Watermark information embedding method and device and electronic equipment
JP2008033516A (en) Charging system