Kwok et al., 2004 - Google Patents
Intellectual property protection for electronic commerce applications.Kwok et al., 2004
View PDF- Document ID
- 7994432861997330781
- Author
- Kwok S
- Yang C
- Tam K
- Publication year
- Publication venue
- J. Electron. Commer. Res.
External Links
Snippet
Online content distribution businesses require methods to protect the intellectual property of distributed content. Intellectual property protection is a mechanism to protect the rights of ownership of original work so that no one can use the rights-protected work in any way …
- 238000000034 method 0 abstract description 82
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0702—Binding
- G06F2221/0704—Device
- G06F2221/0706—Domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0775—Logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0757—Licence
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8607354B2 (en) | Deriving multiple fingerprints from audio or video content | |
US7266704B2 (en) | User-friendly rights management systems and methods | |
JP4542411B2 (en) | Post-decoding watermarking system for media | |
US20030016842A1 (en) | Digital content with information of latent value to purchaser and method for making the same | |
Subba Rao | Copyright: its implications for electronic information | |
Natarajan et al. | Safeguarding the digital contents: Digital watermarking | |
Kwok et al. | Intellectual property protection for electronic commerce applications. | |
Cheung et al. | The use of digital watermarking for intelligence multimedia document distribution | |
Arsenova | Technical aspects of digital rights management | |
Kwok et al. | Watermark design pattern for intellectual property protection in electronic commerce applications | |
Sherekar et al. | Role of Digital Watermark in e-governance and e-commerce | |
Kwok et al. | SDMI-based rights management systems | |
Garofalakis et al. | Digital robbery; authors are not unprotected | |
Rao et al. | Multimedia digital rights protection using watermarking techniques | |
Kanwar | Intellectual Property Rights and The Digital World | |
Moskowitz | Introduction—Digital Rights Management | |
Pons et al. | Data protection using watermarking in e-business | |
Khanzode et al. | Digital watermarking for protection of intellectual property | |
Harinarayana et al. | Digital rights management in digital libraries: An introduction to technology, effects and the available open source tools | |
Jahnke et al. | Digital watermarking and its impact on intellectual property limitation for the digital age | |
Ebersohn | Catching hackers | |
Kwok et al. | An SDMI-based rights management system for electronic media using digital watermarking | |
JP2005535959A (en) | Digital content containing information of potential value to buyers and method of creating it | |
Barda et al. | Protection of Intellectual Property: A Must In Digital Content Exploitation | |
Phillips | Hardware-Based Methods for Prevention of Multimedia Piracy: Some Issues |