-
公开(公告)号:EP0942418A4
公开(公告)日:2002-08-05
申请号:EP97934777
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
CPC classification number: G06T1/0035 , G06T2201/0051 , G06T2201/0061 , G06T2201/0064 , G11B20/00086 , G11B20/00094 , G11B20/00768 , G11B20/00884 , H04N5/913 , H04N9/8042 , H04N2005/91314 , H04N2005/91321 , H04N2005/91328 , H04N2005/91335
-
公开(公告)号:HK1021588A1
公开(公告)日:2000-06-16
申请号:HK00100523
申请日:2000-01-28
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
公开(公告)号:MY127838A
公开(公告)日:2006-12-29
申请号:MYPI9704638
申请日:1997-10-03
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: IN PROVIDING A SYSTEM THAT CAN MANAGE ACCESS TO DATA TO EFFECTIVELY PREVENT ILLEGAL ACCESS TO THE DATA OR THE LIKE, THERE IS PROVIDED A SYSTEM (56,58,59,60,63,81,84,85,86) FOR EMBEDDING ACCESS MANAGEMENT INFORMATION THAT PREPARES MANAGEMENT INFORMATION FOR MANAGING ACCESS TO THE DATA, AND EMBEDS THE MANAGEMENT INFORMATION IN THE DATA THROUGH DATA TRANSFORMATION WITHOUT CHANGING AMOUNT OF DATA. IN MANAGING ACCESS TO DATA, THERE IS PROVIDED A METHOD THAT EXTRACTS MANAGEMENT INFORMATION EMBEDDED IN THE DATA THROUGH DATA DEFORMATION WITHOUT CHANGING AMOUNT OF DATA, AND MANAGES ACCESS TO THE DATA ACCORDING TO THE EXTRACTED MANAGEMENT INFORMATION. THERE IS ALSO PROVIDED A METHOD FOR CHANGING MANAGEMENT OF ACCESS TO THE DATA ACCORDING TO THE TYPE OF MEDIUM IN WHICH THE DATA IS STORED (RAM OR ROM). THE MANAGEMENT INFORMATION FURTHER CONTAINS INFORMATION FOR CONTROLLING RECORDING OF THE DATA, RECEPTION OF THE DATA, PLAYBACK OF THE DATA, INTERFERENCE OF OUTPUT OF THE DATA, DUPLICATION HISTORY OF THE DATA, OR MODIFICATION OFTHE MANAGEMENT INFORMATION. THE ACCESS MANAGEMENT METHOD CAN PREVENT ILLEGAL DUPLICATION OF DATA OR THE LIKE, AND CAN EFFECTIVELY PROTECT A WORK.(FIG 1)
-
公开(公告)号:CA2265647C
公开(公告)日:2003-09-23
申请号:CA2265647
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
公开(公告)号:PL191368B1
公开(公告)日:2006-05-31
申请号:PL33279897
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
-
公开(公告)号:PL332798A1
公开(公告)日:1999-10-11
申请号:PL33279897
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
公开(公告)号:CA2265647A1
公开(公告)日:1998-04-23
申请号:CA2265647
申请日:1997-08-12
Applicant: IBM
Inventor: MORIMOTO NORISHIGE , MIWA KUNIHIKO , KOBAYASHI HIROYA
Abstract: A system for managing access to data and effectively preventing illegal access to data is provided with an access management information burying system in which management information for managing access to the data is prepared and the management information is buried in the data by deforming the data without changing the quantity of data. A method for managing access to data in which, the management information buried in the data by deforming the data without changing the quantity of the data is extracted and access to the data is managed in accordance with the extracted information. A method for changing the management of access to data in accordance with the kind of the medium (RAM or ROM) where the data are stored. The management information including the information for controlling the recording, receiving, reproducing, output hindering, copying history of the data, or changing of the management information. By the access management method, the illegal copying, etc., of the data can be prevented and a literary work can be protected effectively.
-
-
-
-
-
-