TW200723879A - Preventing illegal distribution of copy protected content - Google Patents
Preventing illegal distribution of copy protected contentInfo
- Publication number
- TW200723879A TW200723879A TW095128843A TW95128843A TW200723879A TW 200723879 A TW200723879 A TW 200723879A TW 095128843 A TW095128843 A TW 095128843A TW 95128843 A TW95128843 A TW 95128843A TW 200723879 A TW200723879 A TW 200723879A
- Authority
- TW
- Taiwan
- Prior art keywords
- media content
- comparator
- fingerprint
- packets
- piracy
- Prior art date
Links
- 238000001514 detection method Methods 0.000 abstract 2
- 230000005540 biological transmission Effects 0.000 abstract 1
- 230000000903 blocking effect Effects 0.000 abstract 1
- 230000000593 degrading effect Effects 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
Landscapes
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Method and devices are directed to invention is directed towards analyzing packets on-the-fly for pirated content. Packets are intercepted and analyzed to determine if the packets include media content. If media content is detected, a comparator determines a fingerprint associated with the media content. The comparator then compares the determined fingerprint to other fingerprints within a data store. If a match is found, forensic information may be collected. Piracy detection responses may also be performed, including: blocking transmission of the media content, providing a piracy alert message, degrading a quality of the media content, or including within the media content a watermark and/or fingerprint. In one embodiment, the packet analysis and the comparator may reside within a same or different device within a path between a source device and a destination device to enable piracy detection to be performed in real-time.
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US70649205P | 2005-08-08 | 2005-08-08 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW200723879A true TW200723879A (en) | 2007-06-16 |
Family
ID=57912298
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW095128843A TW200723879A (en) | 2005-08-08 | 2006-08-07 | Preventing illegal distribution of copy protected content |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TW200723879A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI482045B (en) * | 2008-02-01 | 2015-04-21 | Yahoo Inc | System, method and computer-readable medium for detecting the source of media content with application to business rules |
-
2006
- 2006-08-07 TW TW095128843A patent/TW200723879A/en unknown
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI482045B (en) * | 2008-02-01 | 2015-04-21 | Yahoo Inc | System, method and computer-readable medium for detecting the source of media content with application to business rules |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2007019521A3 (en) | Preventing illegal distribution of copy protected content | |
| Zhao et al. | Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting | |
| KR101378295B1 (en) | Method and Apparatus of privacy masking on Image | |
| EP1762028A4 (en) | Methods and apparatus for computer network security using intrusion detection and prevention | |
| ATE484144T1 (en) | SYSTEM AND METHOD FOR PROCESSING SECURE TRANSMISSIONS | |
| WO2009099790A3 (en) | System and method for detecting the source of media content with application to business rules | |
| BR0212490A (en) | Virus Detection System | |
| CN101119369A (en) | A security detection method and system for network data flow | |
| TW200509633A (en) | Method, program and system for automatically detecting malicious computer network reconnaissance | |
| CN110677415A (en) | Network information safety protection system | |
| Megías | Data hiding: New opportunities for security and privacy? | |
| GB2472955A (en) | Security printing analysis system and method for enhancing security printing | |
| TW200723879A (en) | Preventing illegal distribution of copy protected content | |
| CN102461065B (en) | Method and system for fingerprint-based copyright protection of real-time content | |
| Sedghi et al. | Analysis of channel capacity of spread spectrum audio watermarking system | |
| JP2007207190A (en) | Content detection device, unauthorized use determination device, alarm device, and content distribution network system | |
| Bogdanoski et al. | Steganography in Support of the Global Terrorism. | |
| PL1810442T3 (en) | Device and method for detection of a manipulation of an information signal | |
| Pal et al. | Survey Of Digital Watermarking Using Dct | |
| CN1910534A (en) | Method and apparatus for protection of content using biometric watermarks | |
| Vaitheki et al. | A Havoc proof for secure and robust audio watermarking | |
| Steel et al. | Impersonator identification through dynamic fingerprinting | |
| KR100355268B1 (en) | Digital Watermark Extraction Apparatus for Copyright Protection of Digital Audio/Video/Multimedia | |
| TW200802018A (en) | Detection device and method thereof | |
| TW200735665A (en) | System and method for processing streaming data |