-
公开(公告)号:EP0942418A4
公开(公告)日:2002-08-05
申请号:EP97934777
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
CPC classification number: G06T1/0035 , G06T2201/0051 , G06T2201/0061 , G06T2201/0064 , G11B20/00086 , G11B20/00094 , G11B20/00768 , G11B20/00884 , H04N5/913 , H04N9/8042 , H04N2005/91314 , H04N2005/91321 , H04N2005/91328 , H04N2005/91335
-
公开(公告)号:CA2265647C
公开(公告)日:2003-09-23
申请号:CA2265647
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
公开(公告)号:MY127838A
公开(公告)日:2006-12-29
申请号:MYPI9704638
申请日:1997-10-03
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: IN PROVIDING A SYSTEM THAT CAN MANAGE ACCESS TO DATA TO EFFECTIVELY PREVENT ILLEGAL ACCESS TO THE DATA OR THE LIKE, THERE IS PROVIDED A SYSTEM (56,58,59,60,63,81,84,85,86) FOR EMBEDDING ACCESS MANAGEMENT INFORMATION THAT PREPARES MANAGEMENT INFORMATION FOR MANAGING ACCESS TO THE DATA, AND EMBEDS THE MANAGEMENT INFORMATION IN THE DATA THROUGH DATA TRANSFORMATION WITHOUT CHANGING AMOUNT OF DATA. IN MANAGING ACCESS TO DATA, THERE IS PROVIDED A METHOD THAT EXTRACTS MANAGEMENT INFORMATION EMBEDDED IN THE DATA THROUGH DATA DEFORMATION WITHOUT CHANGING AMOUNT OF DATA, AND MANAGES ACCESS TO THE DATA ACCORDING TO THE EXTRACTED MANAGEMENT INFORMATION. THERE IS ALSO PROVIDED A METHOD FOR CHANGING MANAGEMENT OF ACCESS TO THE DATA ACCORDING TO THE TYPE OF MEDIUM IN WHICH THE DATA IS STORED (RAM OR ROM). THE MANAGEMENT INFORMATION FURTHER CONTAINS INFORMATION FOR CONTROLLING RECORDING OF THE DATA, RECEPTION OF THE DATA, PLAYBACK OF THE DATA, INTERFERENCE OF OUTPUT OF THE DATA, DUPLICATION HISTORY OF THE DATA, OR MODIFICATION OFTHE MANAGEMENT INFORMATION. THE ACCESS MANAGEMENT METHOD CAN PREVENT ILLEGAL DUPLICATION OF DATA OR THE LIKE, AND CAN EFFECTIVELY PROTECT A WORK.(FIG 1)
-
公开(公告)号:HK1021588A1
公开(公告)日:2000-06-16
申请号:HK00100523
申请日:2000-01-28
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
公开(公告)号:GB2330031A
公开(公告)日:1999-04-07
申请号:GB9819727
申请日:1998-09-11
Applicant: IBM
Inventor: MIWA KUNIHIKO , MORIMOTO NORISHIGE , SHIMIZU SHUICHI
IPC: H04N5/91 , G06F12/14 , G06F21/10 , G06F21/16 , G06F21/62 , G06T1/00 , G09C5/00 , G11B20/00 , G11B20/10 , H04L9/36 , H04N1/387 , H04N7/08 , H04N7/081 , H04N7/167 , H04N7/24 , H04N19/00 , H04N21/2347 , H04N21/266 , H04N21/8355 , H04N1/32
Abstract: Copying of watermarked DVD data or broadcast digital image data is controlled by appending a token to the data. When a copy is made the token is deleted from the data to prevent further copying. The token may also be used to control playback and reception of data. The token is generated from the DVD data using a hash code or CRC code. The technique may be applied in a set-top box, personal computer, facsimile machine or mobile telephone.
-
公开(公告)号:JPH11164132A
公开(公告)日:1999-06-18
申请号:JP14370598
申请日:1998-05-26
Applicant: IBM
Inventor: MIWA KUNIHIKO , MORIMOTO NORISHIGE , SHIMIZU SHUICHI
IPC: H04N5/91 , G06F12/14 , G06F21/10 , G06F21/16 , G06F21/62 , G06T1/00 , G09C5/00 , G11B20/00 , G11B20/10 , H04L9/36 , H04N1/387 , H04N7/08 , H04N7/081 , H04N7/167 , H04N7/24 , H04N19/00 , H04N21/2347 , H04N21/266 , H04N21/8355
Abstract: PROBLEM TO BE SOLVED: To obtain a low cost system which can safely perform data control through the use of electronic watermark technology by controlling data according to a control rule, having a token or control flag defined in advance. SOLUTION: In a step 800, it is checked from distributed data whether or not there is a control flag(CF) embedded by using electronic watermark technology. When no CF is detected, unrestricted control, e.g., duplication, video- recording, reproduction, etc., are performed. When a CF is detected, it is determined in a next step 820 whether or not there is an added token. When the result of the step 820 is NO, data control is inhibited. Namely, no duplication, video-recording, reproduction, etc., is done and the process is ended as it is. When the result of the step 820 is YES, the data control (duplication, video- recording, reproduction, etc.), by the control rule having a token or CF defined in advance is performed.
-
公开(公告)号:PL191368B1
公开(公告)日:2006-05-31
申请号:PL33279897
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
-
公开(公告)号:GB2330031B
公开(公告)日:2002-04-24
申请号:GB9819727
申请日:1998-09-11
Applicant: IBM
Inventor: MIWA KUNIHIKO , MORIMOTO NORISHIGE , SHIMIZU SHUICHI
-
公开(公告)号:PL332798A1
公开(公告)日:1999-10-11
申请号:PL33279897
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
公开(公告)号:CA2265647A1
公开(公告)日:1998-04-23
申请号:CA2265647
申请日:1997-08-12
Applicant: IBM
Inventor: MORIMOTO NORISHIGE , MIWA KUNIHIKO , KOBAYASHI HIROYA
Abstract: A system for managing access to data and effectively preventing illegal access to data is provided with an access management information burying system in which management information for managing access to the data is prepared and the management information is buried in the data by deforming the data without changing the quantity of data. A method for managing access to data in which, the management information buried in the data by deforming the data without changing the quantity of the data is extracted and access to the data is managed in accordance with the extracted information. A method for changing the management of access to data in accordance with the kind of the medium (RAM or ROM) where the data are stored. The management information including the information for controlling the recording, receiving, reproducing, output hindering, copying history of the data, or changing of the management information. By the access management method, the illegal copying, etc., of the data can be prevented and a literary work can be protected effectively.
-
-
-
-
-
-
-
-
-