Abstract:
A multimedia signal processing device is used between a multimedia signal source and a down-stream multimedia device. The multimedia signal processing device includes a communication unit, a multimedia decoding unit and a judging unit. The communication unit receives a multimedia signal from the multimedia signal source. The multimedia decoding unit decodes the multimedia signal and receives designated device information from the down- stream multimedia device, The judging unit performs an identification procedure according to a set of data stored in a database and the designated device information of the down-stream multimedia device to obtain a judged result to be stored in the multimedia signal processing device and have the multimedia signal processing device perform an action according to the judged result. A related authorization method involving the steps is performed by the multimedia signal processing device.
Abstract:
A system and method is provided for management of digital watermarks, including a system and method for identifying the source of counterfeit copies of multimedia works using layered simple digital watermarks which are difficult to locate, identify and circumvent. The layered digital watermarks may be modulated in a variety of ways, and may be individualized to assist in detection of unlawful copyrighted material infringement by endpoint device and/or the user committing the copyright infringement. In addition, multiple layers of watermarks may be selected and applied by various schemes, such as on-the-fly remotely by the distributor of the copyrighted material. This system and method for management of digital watermarks effectively makes it impossible for a potential copyright infringer to have complete confidence that they located and disabled all of the watermarks in the copyrighted material, and therefore substantially increases the risk of infringer identification and prosecution for copyright violations.
Abstract:
An information embedded method is used with a broadcast source and a broadcast signal receiver using a unidirectional transmission medium. The information embedded method includes steps of: storing information-push files in the broadcast signal receiver during a first time period; the broadcast source delivering broadcast signals to the broadcast signal receiver through the unidirectional transmission medium during a second time period posterior to the first time period; and the broadcast signal receiver selecting one of the information-push files according to a predetermined rule and combining the broadcast signals and information content of the selected information-push file to form an information embedded program. An information embedded system includes the broadcast source and the broadcast signal receiver.
Abstract:
Media file distribution is be controlled by encrypting the media file by an application executed on a mobile device of the media file owner. The media file is encrypted using a media file encryption key. The media file encryption key is then separately encrypted using a public key of each intended recipient, and the encrypted media file encryption key is appended to the encrypted media file. Accordingly, only intended recipients will have the complementary private key to allow decryption of the encrypted media file encryption key, which once decrypted can be used to decrypt the encrypted media file itself.
Abstract:
Media file distribution is be controlled by encrypting the media file by an application executed on a mobile device of the media file owner. The media file is encrypted using a media file encryption key. The media file encryption key is then separately encrypted using a public key of each intended recipient, and the encrypted media file encryption key is appended to the encrypted media file. Accordingly, only intended recipients will have the complementary private key to allow decryption of the encrypted media file encryption key, which once decrypted can be used to decrypt the encrypted media file itself.
Abstract:
Media file distribution is be controlled by encrypting the media file by an application executed on a mobile device of the media file owner. The media file is encrypted using a media file encryption key. The media file encryption key is then separately encrypted using a public key of each intended recipient, and the encrypted media file encryption key is appended to the encrypted media file. Accordingly, only intended recipients will have the complementary private key to allow decryption of the encrypted media file encryption key, which once decrypted can be used to decrypt the encrypted media file itself.