WO2006072568A1 - Tragbarer datenträger mit wasserzeichen-funktionalität - Google Patents
Tragbarer datenträger mit wasserzeichen-funktionalität Download PDFInfo
- Publication number
- WO2006072568A1 WO2006072568A1 PCT/EP2006/000020 EP2006000020W WO2006072568A1 WO 2006072568 A1 WO2006072568 A1 WO 2006072568A1 EP 2006000020 W EP2006000020 W EP 2006000020W WO 2006072568 A1 WO2006072568 A1 WO 2006072568A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- data carrier
- watermark
- stored
- volatile memory
- Prior art date
Links
- 230000015654 memory Effects 0.000 claims abstract description 54
- 238000000034 method Methods 0.000 claims description 30
- 238000004891 communication Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 2
- 238000012545 processing Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 3
- 239000000969 carrier Substances 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/125—Offline card verification
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00275—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored on a chip attached to the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00876—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy wherein physical copy protection means are attached to the medium, e.g. holograms, sensors, or additional semiconductor circuitry
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00884—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
Definitions
- the invention relates to a method and a computer program product for managing data on a portable data carrier, in particular so-called multimedia cards, and such a portable data carrier.
- DRM Digital Rights Management
- Digital watermarks are inserted into digital documents and files to transparently provide a verifiable source or copyright notice to third parties.
- watermarks are "interlaced" in the data to be marked or in their binary code so that the watermark can not be removed without possessing a digital key (at least not without data loss) and, on the other hand, in the data not readily from the outside as such is recognizable.
- a portable data carrier which comprises a non-volatile memory, a processor and a processor-executable watermark application which is also stored on the data carrier.
- the watermarking application is set up to check the data stored on the data carrier and / or those that are intended to remain on the data carrier for the presence of a digital watermark and / or to mark this data with a digital watermark.
- the checking or marking is carried out on the data carrier and the checked or marked data are written into the non-volatile memory after checking or marking, in order to remain there for an indefinite period of time. If the data was accessed by an external device, it will be passed to the external device after verification or marking. Data already marked with a first watermark can also be be marked with a second or further watermark specifying eg the data carrier.
- the portable data carrier can be used as a portable extension of a DRM system or as a multimedia card that takes into account the origin or authorship of data.
- Multimedia cards have at least one processor for administrative purposes and / or for implementing security functionalities. This processor can also be used advantageously for the realization of the watermark functionality.
- the watermarking application may be arranged to perform a check or tagging of data stored in its non-volatile memory as soon as it is accessed by an external device. In this way, the portable data carrier can not leave unmarked data.
- the secure memory may also contain the key used to verify and / or mark data with the watermark to prevent unauthorized persons from stealing the key.
- the watermark application is started on the processor of the data carrier as a background process, which permanently monitors the data present on the data carrier and carries out a transparent verification or marking of the data for the user.
- the watermark application access-controlled, so that a corresponding watermarking process becomes active only directly during write and / or read accesses to the data of the data carrier for checking or marking the data.
- data are checked and / or marked directly on storage in the non-volatile memory.
- it makes sense to set up the watermark application so that data according to certain attributes, such as data type, file name, owner, etc., are distinguishable and to check them accordingly to specific attribute-dependent watermarks or to mark with these.
- FIG. 1 shows a data carrier according to the invention interacting with a stationary terminal.
- digital watermarks are digitally interwoven into digital documents and data by means of a secret digital key for third parties, and at first irreversibly woven into the data as a verifiable source or copyright indication. It should not be per se to prevent the copying of watermarked data, but it should only the origin or authorship of the data and thus the lawful possession be determined. Ideally, watermarks are robust enough to withstand common data manipulations and transformations such as conversion and compression. For image data existing watermarking methods are for example Eikonamark, SysCoP 1.2 or PictureMarc.
- the term "digital watermark” as used herein therefore includes, in particular, non-conventional crypto graphical signatures or hash values, as these are usually appended to the data to be protected and thus are visible to third parties.
- Digital watermarks will therefore be incorporated into digital data as proof of authenticity, originality and authorship, which in principle can be copied without any loss of quality in order to ensure the preservation of copyrights - for example within the framework of a DRM system - and to manage them.
- Important economic application is therefore u. a. the use as copy protection for multimedia data (for example image data, video and audio data and other documents) or software programs.
- multimedia data for example image data, video and audio data and other documents
- software programs at least the data embedded in the software can be marked with a watermark.
- a digital key is needed, under the use of which a watermarking algorithm transparently inserts or verifies the corresponding watermark into a file. Since these keys are generally symmetric keys in the current state of the art, a person who has unauthorized possession of the key can use it for unauthorized marking of documents and thus for forgery or obfuscation of authorship. Therefore, there is a high risk of misuse in larger business or governmental computer systems where many people have access to watermark functionality.
- an external device or a portable data carrier eg a chip card equipped with a processor (smart card).
- a portable data carrier eg a chip card equipped with a processor (smart card).
- the microprocessor chip card 1 is connected via corresponding communication interfaces 16, 21 to a terminal 2, e.g. a workstation, a portable computer (laptop, notebook), a personal digital assistant (PDA) or a mobile phone can be.
- a terminal 2 e.g. a workstation, a portable computer (laptop, notebook), a personal digital assistant (PDA) or a mobile phone can be.
- PDA personal digital assistant
- the security-critical watermark functionality is protected against unauthorized access to the terminal 2.
- the chip card 1 comprises a processor 15 and a memory arrangement, which communicate with each other via an internal bus Sy stem 17.
- the memory device comprises a non-volatile memory 10 (ROM), a non-volatile rewritable memory 11 (EEPROM or Flash, or the like), and a volatile memory 12 (RAM) whose contents are erased as soon as the power supply to the smart card 1 is interrupted becomes.
- the ROM 10 has the fixed operating system 13, e.g. STARCOS, STARSIM, JAVA etc., which provides the essential functionalities for the operation of the chip card 1.
- a cryptography application 132, various administration applications 133 and a watermark application 131 may belong.
- the operating system 13 is constructed differently, or their applications 131, 132, 133 are organized differently from the structure shown in Figure 1 and for example, wholly or partially present in the non-volatile memory 11.
- the non-volatile EEPROM memory 11 is provided to hold documents -UN-data-110, 140 in-memory-and-there-to-indefinite-time for retrieval by a terminal 2.
- EEPROM memory 11 can be found both watermarked data 110 and unmarked data 140.
- the watermarked data 110 is indicated by a spiral symbol. However, this is for illustration purposes only, as the presence of a digital watermark is usually unseen by a file.
- the unmarked data 140 are accommodated in a particularly secure memory area 14 of the EEPROM memory 11, in order to protect them from unauthorized access, since they do not yet have a copyright notice in the form of a watermark.
- the secure memory area 14 are also other security-related data, such as. the digital watermark key
- the memory area 14 can be addressed only if the user of the smart card 1 is specifically authorized, for. Example by means of a PIN, a "pass phrase", or by means of a biometric or other authentication.
- the EEPROM memory 11 can be secured in a special way in total, or it can be provided in addition to the conventional EEPROM memory 11, a second, particularly secure EEPROM memory for the purposes mentioned.
- the functions of the operating system 13 are provided in a machine language format-understandable by the processor 15 (CPU) so that they can be executed by the processor 15.
- the watermarking plication 131 on the processor 15 in the form of a watermarking process 150.
- the watermark processor 150 operates exclusively on the data 110, 140, 120, 121 stored on the chip card 1 and, for security reasons, does not make any accesses to data of the terminal 2.
- the terminal 2 may in turn be a conventional computer equipped with a communication interface 21 for data transfer with the chip card 1, a display device 22 such as e.g. a monitor, an input device 23, e.g. a keyboard, a processor 24, a memory 25, which may contain documents and data, and optionally a cryptographic device 26 for encrypting and decrypting documents.
- a display device 22 such as e.g. a monitor
- an input device 23 e.g. a keyboard
- a processor 24 e.g. a keyboard
- a memory 25 which may contain documents and data
- optionally a cryptographic device 26 for encrypting and decrypting documents.
- a portable data carrier 1 come out of the smart card 1 shown in Figure 1 all those portable storage media in question, which are equipped with a processor- this includes mass storage cards, USB dongles, tokens, sticks and similar storage media with non-volatile , re-use writeable memory, if they include a microprocessor. Frequently, the microprocessor serves to execute the administrative functionalities relating to the memory, such as controlling communication with an external device. Such a processor can be set up to also execute a watermark application 131 according to the invention or to provide the corresponding functionalities.
- the security-relevant functionalities such as The watermark application 131 and the cryptography application 132 of the chip card 1 can, unlike the representation in FIG. 1, also be provided by a specialized co-processor, which is optimized for the rapid execution of such arithmetic operations. For this purpose, possibly due to similar operations, a cryptographic co-processor can also be used to implement the watermark functionality.
- data 110, 140 which are to be checked or marked, have been subjected to a check 152 or a marking 151 in the volatile RAM 12, these data are stored as marked data 110 or unmarked data 140 in the EEPROM memory 11 - optionally stored in a secure memory area 14 or other memory - to remain indefinitely. In this case, the data are stored in the EEPROM memory 11 even if they are directly transferred back to the terminal 2 directly after the check 152 or marking 151.
- the processing processing of data by the watermarking process 150 independently of read or write accesses (R / W) as a permanent background process, as long as the smart card 1 is connected to the terminal 2 and is supplied with power.
- the process 150 may be continuously repeated or started at predetermined regular times. All data 140, 110 which are currently stored on the data medium 1 at the time or are to be stored are then checked for existence of a specific watermark 152 and marked 151 if the watermark is not present in the data 151.
- data 110 whose authorship is to be determined may be checked for a particular watermark 152 and further processed in accordance with the presence of the watermark in a particular manner, such as erased, disabled, encrypted, copied, or otherwise manipulated.
- the watermarking process 150 can also be operated access-controlled by triggering processing of data only when a read / write access (R / W) to the data 110, 140 of the data carrier 1 takes place from the terminal 2. For example, all data are checked / marked immediately upon their writing to the data carrier 1.
- the processing of the data 110, 140 may possibly be made dependent on certain additional conditions, e.g. the type of data, the type of access, or the access privileges of specific users or processes.
- a watermark application 131 can use a plurality of watermarking for checking 152 and marking 151, wherein the choice of a certain watermark can be made depending on certain characteristics of the data, eg of the data type (eg document type, audio, video data, image data, executable program data, etc.) or different watermarks can be used for different types of access, accessing persons or terminals.
- the data type eg document type, audio, video data, image data, executable program data, etc.
- different watermarks can be used for different types of access, accessing persons or terminals.
- the processing of the data 110, 140 may be based on certain of these Attributes are limited. Thus, e.g. be determined that only certain image, video or audio files are checked 152 or marked 151. In a hierarchical file system, processing can also be restricted to specific subdirectories. Likewise, it is conceivable in certain cases to process certain data 110, 140 or directories independently of data accesses in the background while other data 110, 140 or directories are processed access-controlled. Depending on this, it makes sense to use different watermarks.
- An inventive equipped with a watermark functionality disk 1 can of course, although it is provided in principle that all checked or marked data stored in the non-volatile EEPROM memory 11, are used for processing temporary data from the terminal 2 on the disk. 1 152 can be transmitted there, or 151 can be marked there, and the end device 2 can then be immediately made available to the end device 2.
- the data carrier 1 can also represent a "black box system" associated with the Terminal 2 is in communication and transparently performs the functions of the invention for a user.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Mathematical Physics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
- Image Processing (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200680001851.1A CN101099207B (zh) | 2005-01-05 | 2006-01-03 | 带有水印功能的便携数据载体 |
JP2007549854A JP2008527518A (ja) | 2005-01-05 | 2006-01-03 | 電子透かし機能を備えた携帯型データ担体 |
EP06703803A EP1844467A1 (de) | 2005-01-05 | 2006-01-03 | Tragbarer datenträger mit wasserzeichen-funktionalität |
US11/794,452 US9076007B2 (en) | 2005-01-05 | 2006-01-03 | Portable data support with watermark function |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102005000796.1 | 2005-01-05 | ||
DE102005000796A DE102005000796A1 (de) | 2005-01-05 | 2005-01-05 | Tragbarer Datenträger mit Wasserzeichen-Funktionalität |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006072568A1 true WO2006072568A1 (de) | 2006-07-13 |
Family
ID=35999554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2006/000020 WO2006072568A1 (de) | 2005-01-05 | 2006-01-03 | Tragbarer datenträger mit wasserzeichen-funktionalität |
Country Status (6)
Country | Link |
---|---|
US (1) | US9076007B2 (de) |
EP (1) | EP1844467A1 (de) |
JP (1) | JP2008527518A (de) |
CN (1) | CN101099207B (de) |
DE (1) | DE102005000796A1 (de) |
WO (1) | WO2006072568A1 (de) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102005000796A1 (de) * | 2005-01-05 | 2006-07-13 | Giesecke & Devrient Gmbh | Tragbarer Datenträger mit Wasserzeichen-Funktionalität |
US20130024698A1 (en) * | 2010-03-31 | 2013-01-24 | Nec Corporation | Digital content management system, device, program and method |
CN101853341A (zh) * | 2010-04-06 | 2010-10-06 | 李勇 | 一种有数字水印功能的便携存储装置 |
JP2014103522A (ja) * | 2012-11-20 | 2014-06-05 | Intelligent Willpower Corp | イメージデータ配信サーバ |
US10061905B2 (en) | 2016-01-26 | 2018-08-28 | Twentieth Century Fox Film Corporation | Method and system for conditional access via license of proprietary functionality |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4734568A (en) * | 1985-07-31 | 1988-03-29 | Toppan Moore Company, Ltd. | IC card which can set security level for every memory area |
DE4403206A1 (de) * | 1994-02-03 | 1995-08-10 | Ralph Waldorf | Datenträger |
WO2000055707A1 (de) * | 1999-03-18 | 2000-09-21 | Scm Microsystems Gmbh | Verfahren zur sicherung von daten in einem tragbaren massenspeicher gegen unautorisierte vervielfältigung |
EP1047066A1 (de) * | 1998-10-08 | 2000-10-25 | Matsushita Electric Industrial Co., Ltd. | Datenaufzeichnungs- und wiedergabegerät |
US6182217B1 (en) * | 1997-03-03 | 2001-01-30 | Siemens Aktiengesellschaft | Electronic data-processing device and system |
EP1130492A2 (de) * | 1999-12-20 | 2001-09-05 | Sony Corporation | System und Verfahren zur Verarbeitung von gesicherten Daten |
US6292874B1 (en) * | 1999-10-19 | 2001-09-18 | Advanced Technology Materials, Inc. | Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges |
WO2001095206A1 (en) * | 2000-06-02 | 2001-12-13 | Matsushita Electric Industrial Company, Limited | Recording medium, license management apparatus, and recording and playback apparatus |
US20020010826A1 (en) * | 2000-07-14 | 2002-01-24 | Victor Company Of Japan, Ltd. | Digital memory card and apparatus for reproducing data therefrom |
WO2003081544A2 (en) * | 2002-03-18 | 2003-10-02 | Sun Microsystems, Inc. | Enhanced memory management for portable devices |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2697361B1 (fr) | 1992-10-27 | 1994-12-16 | Bull Cp8 | Procédé et système d'inscription d'une information sur un support permettant de certifier ultérieurement l'originalité de cette information. |
US6869023B2 (en) * | 2002-02-12 | 2005-03-22 | Digimarc Corporation | Linking documents through digital watermarking |
US5796935A (en) | 1995-07-20 | 1998-08-18 | Raytheon Company | Voting node for a distributed control system |
JP4046767B2 (ja) | 1997-01-27 | 2008-02-13 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 記録信号のコピー防止システム |
KR20000064791A (ko) | 1997-01-27 | 2000-11-06 | 엠. 제이. 엠. 반 캄 | 콘텐트 정보 및 그것과 관련된 추가정보를전송하는 방법 및 시스템 |
JP2955538B2 (ja) * | 1997-04-30 | 1999-10-04 | 株式会社ディジタル・ビジョン・ラボラトリーズ | 情報受信装置及び同装置に適用するカードモジュール |
KR19980086811A (ko) * | 1997-05-08 | 1998-12-05 | 니시무로 타이조 | 부가정보 매입과 재생을 위한 장치와 방법 및 그 기록 매체 |
JP4456185B2 (ja) * | 1997-08-29 | 2010-04-28 | 富士通株式会社 | コピー防止機能を持つ見える透かし入り動画像記録媒体とその作成・検出および録画・再生装置 |
US6064764A (en) | 1998-03-30 | 2000-05-16 | Seiko Epson Corporation | Fragile watermarks for detecting tampering in images |
JP3201347B2 (ja) | 1998-05-15 | 2001-08-20 | 日本電気株式会社 | 画像属性変更装置と電子透かし装置 |
US20030130954A1 (en) * | 1998-07-31 | 2003-07-10 | Carr J. Scott | Postal applications including digital watermarks |
JP4195746B2 (ja) | 1998-12-11 | 2008-12-10 | インターナショナル・ビジネス・マシーンズ・コーポレーション | データ課金システム、コンテンツ生成装置、データ課金置および方法 |
JP2000207524A (ja) | 1999-01-14 | 2000-07-28 | Ntt Data Corp | カ―ド発行装置、カ―ド利用装置、本人識別装置、本人識別システム及び本人識別方法 |
WO2000042568A1 (en) * | 1999-01-16 | 2000-07-20 | Qdos Media Limited | Smart card and reader/writer |
JP2001216387A (ja) | 2000-02-02 | 2001-08-10 | Sony Corp | Icカードによる代金支払いシステム及びコンピュータ読み込み可能な記録媒体 |
NO20000656A (no) * | 2000-02-09 | 2001-07-09 | Knut Krogstad | Digital korreksjonsmodul for videoprojektor |
US7127744B2 (en) * | 2000-03-10 | 2006-10-24 | Digimarc Corporation | Method and apparatus to protect media existing in an insecure format |
US7197694B2 (en) * | 2000-03-21 | 2007-03-27 | Oki Electric Industry Co., Ltd. | Image display system, image registration terminal device and image reading terminal device used in the image display system |
JP2001283180A (ja) | 2000-03-29 | 2001-10-12 | Dainippon Printing Co Ltd | Icカードおよび電子透かしデータ重畳装置 |
US6802004B1 (en) * | 2000-06-30 | 2004-10-05 | Intel Corporation | Method and apparatus for authenticating content in a portable device |
US6948068B2 (en) * | 2000-08-15 | 2005-09-20 | Spectra Systems Corporation | Method and apparatus for reading digital watermarks with a hand-held reader device |
EP1215907A3 (de) | 2000-12-07 | 2006-04-26 | Sony United Kingdom Limited | Wasserzeichnung von Daten und Übertragung von wassergezeichneten Daten |
JP2003016420A (ja) | 2001-07-03 | 2003-01-17 | Yec Solutions:Kk | Icカード及びそのアクセスシステム |
JP4934923B2 (ja) * | 2001-08-09 | 2012-05-23 | ソニー株式会社 | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにコンピュータ・プログラム |
JP2003296606A (ja) | 2002-04-04 | 2003-10-17 | Oki Electric Ind Co Ltd | コンテンツ仲介システム及びコンテンツ仲介方法 |
US20040005078A1 (en) * | 2002-06-21 | 2004-01-08 | Spectra Systems Corporation | Method and apparatus for digitally watermarking images created with a mobile imaging device |
JP2004038445A (ja) * | 2002-07-02 | 2004-02-05 | Nec Tokin Corp | Icカードおよびicカードの暗号方法 |
JP2004064109A (ja) | 2002-07-24 | 2004-02-26 | Sharp Corp | データ記録媒体、データ記録再生装置及びデータ記録方法 |
KR100534056B1 (ko) | 2002-10-15 | 2005-12-07 | (주)마크텍 | 디지털 음성 저장 장치에 저장된 데이터의 인증 및위/변조를 방지하기 위한 장치 및 방법 |
EP2782337A3 (de) * | 2002-10-15 | 2014-11-26 | Verance Corporation | Media-Überwchung, Verwaltung und Informationssystem |
US7702125B2 (en) * | 2003-02-05 | 2010-04-20 | Digimarc Corporation | Watermarking systems and methods |
JP2004326735A (ja) * | 2003-04-11 | 2004-11-18 | Matsushita Electric Ind Co Ltd | プログラム電子透かし処理装置 |
US20050063027A1 (en) * | 2003-07-17 | 2005-03-24 | Durst Robert T. | Uniquely linking security elements in identification documents |
DE102005000796A1 (de) * | 2005-01-05 | 2006-07-13 | Giesecke & Devrient Gmbh | Tragbarer Datenträger mit Wasserzeichen-Funktionalität |
-
2005
- 2005-01-05 DE DE102005000796A patent/DE102005000796A1/de not_active Withdrawn
-
2006
- 2006-01-03 WO PCT/EP2006/000020 patent/WO2006072568A1/de active Application Filing
- 2006-01-03 US US11/794,452 patent/US9076007B2/en active Active
- 2006-01-03 CN CN200680001851.1A patent/CN101099207B/zh not_active Expired - Fee Related
- 2006-01-03 EP EP06703803A patent/EP1844467A1/de not_active Withdrawn
- 2006-01-03 JP JP2007549854A patent/JP2008527518A/ja active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4734568A (en) * | 1985-07-31 | 1988-03-29 | Toppan Moore Company, Ltd. | IC card which can set security level for every memory area |
DE4403206A1 (de) * | 1994-02-03 | 1995-08-10 | Ralph Waldorf | Datenträger |
US6182217B1 (en) * | 1997-03-03 | 2001-01-30 | Siemens Aktiengesellschaft | Electronic data-processing device and system |
EP1047066A1 (de) * | 1998-10-08 | 2000-10-25 | Matsushita Electric Industrial Co., Ltd. | Datenaufzeichnungs- und wiedergabegerät |
WO2000055707A1 (de) * | 1999-03-18 | 2000-09-21 | Scm Microsystems Gmbh | Verfahren zur sicherung von daten in einem tragbaren massenspeicher gegen unautorisierte vervielfältigung |
US6292874B1 (en) * | 1999-10-19 | 2001-09-18 | Advanced Technology Materials, Inc. | Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges |
EP1130492A2 (de) * | 1999-12-20 | 2001-09-05 | Sony Corporation | System und Verfahren zur Verarbeitung von gesicherten Daten |
WO2001095206A1 (en) * | 2000-06-02 | 2001-12-13 | Matsushita Electric Industrial Company, Limited | Recording medium, license management apparatus, and recording and playback apparatus |
US20020010826A1 (en) * | 2000-07-14 | 2002-01-24 | Victor Company Of Japan, Ltd. | Digital memory card and apparatus for reproducing data therefrom |
WO2003081544A2 (en) * | 2002-03-18 | 2003-10-02 | Sun Microsystems, Inc. | Enhanced memory management for portable devices |
Non-Patent Citations (1)
Title |
---|
See also references of EP1844467A1 * |
Also Published As
Publication number | Publication date |
---|---|
US20080133932A1 (en) | 2008-06-05 |
US9076007B2 (en) | 2015-07-07 |
CN101099207B (zh) | 2013-01-16 |
JP2008527518A (ja) | 2008-07-24 |
CN101099207A (zh) | 2008-01-02 |
EP1844467A1 (de) | 2007-10-17 |
DE102005000796A1 (de) | 2006-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1944716B1 (de) | Verfahren und Vorrichtung zum Sichern eines Dokuments mit eingefügtem Signaturabbild und biometrischen Daten in einem Computersystem | |
DE69626530T2 (de) | Schutz von software gegen benutzung ohne erlaubnis | |
DE69906270T2 (de) | Digitale authentisierung mit analogen dokumenten | |
DE69635868T2 (de) | Verfahren und vorrichtung zum kryptographisch gesteuerten betrieb eines zusatzgeräts | |
EP2367128B1 (de) | Verfahren und Vorrichtung zur elektronischen Signatur | |
DE19532617A1 (de) | Verfahren und Vorrichtung zur Versiegelung von Computerdaten | |
DE102006000930A1 (de) | Speicher-Anordnung, Speichereinrichtungen, Verfahren zum Verschieben von Daten von einer ersten Speichereinrichtung zu einer zweiten Speichereinrichtung und Computerprogrammelemente | |
EP3159824B1 (de) | Verfahren zur verarbeitung eines verschlüsselten druckauftrags | |
WO2006072568A1 (de) | Tragbarer datenträger mit wasserzeichen-funktionalität | |
DE10020050A1 (de) | Vorrichtung zum zugriffsgeschützten Behandeln elektronischer Daten | |
EP2562670B1 (de) | Verfahren zur Durchführung eines Schreibzugriffs, Computerprogrammprodukt, Computersystem und Chipkarte | |
EP2491513B1 (de) | Verfahren und system zum bereitstellen von edrm-geschützten datenobjekten | |
EP1912184A2 (de) | Vorrichtung und Verfahren zur Erzeugung von Daten | |
EP1700182B1 (de) | Verfahren zum wiederherstellen eines berechtigungscodes | |
EP2060988B1 (de) | Sicherheitsmodul | |
DE102008028881A1 (de) | Verfahren und System zum prüfen und autorisieren von Inhalt | |
EP1288768A2 (de) | Intelligenter Dongle | |
DE102004046018A1 (de) | Verfahren und Vorrichtung zum Frankieren von Postsendungen | |
DE102009008184B4 (de) | Prüfen einer Authentisierung eines Besitzers eines portablen Datenträgers | |
WO2010040423A1 (de) | Ausführen kryptographischer operationen | |
CN103971032A (zh) | 文件防拷贝方法及其系统 | |
DE69710789T2 (de) | Vorrichtung und verfahren zur geschützten übertragung und darstellung von elektronisch publizierten dokumenten | |
EP1990751A1 (de) | Verfahren zum digitalen Signieren und/oder Verschlüsseln einer auf einer Datenverarbeitungseinheit gespeicherten Datei | |
EP1904980A1 (de) | Verfahren zum betreiben eines tragbaren datenträgers | |
DE102015119140A1 (de) | Verfahren zum Steuern des Zugriffs auf verschlüsselte Dateien und Computersystem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2007549854 Country of ref document: JP Ref document number: 200680001851.1 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2006703803 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006703803 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2006703803 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11794452 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 11794452 Country of ref document: US |