Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/34814
DC FieldValue
dc.titleA method for utilising medium nonuniformities to minimize unauthorized duplication of digital information
dc.contributorNATIONAL UNIVERSITY OF SINGAPORE
dc.contributor.authorARCOT DESAI NARASIMHALU
dc.contributor.authorWANG, WEIGUO
dc.contributor.authorKANKANHALLI, MOHAN SHANKARA
dc.date.accessioned2012-10-05T06:00:42Z
dc.date.available2012-10-05T06:00:42Z
dc.date.issued1995-03-22
dc.identifier.citationARCOT DESAI NARASIMHALU,WANG, WEIGUO,KANKANHALLI, MOHAN SHANKARA (1995-03-22). A method for utilising medium nonuniformities to minimize unauthorized duplication of digital information. ScholarBank@NUS Repository.
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/34814
dc.description.abstractThe present invention is a method for preventing unauthorized copying and use of information which is stored on a storage medium and for restricting the use of such information to designated devices. Copy protection is achieved by generating a signature from a given storage medium. The signature is derived from an arbitrarily selected list of nonuniformities, uniformities and their attributes. The selected list may contain nonuniformities at any granularity level. As such, this signature is unique to a given storage medium in the same way finger prints are unique to a human being. This signature is used to derive a key for encrypting the information on the storage medium. Any copying of the distribution information from one storage medium to another results in the mutation of the signature required to decrypt the information. Therefore, the present invention obviates the need for introducing artificial indica or requiring a special hardware subsystem for achieving a copy protection scheme. Restricting the usage of information on a distribution medium to a designated device is achieved by verifying the device ID (DID-D) of the device with the device ID (DID-S) stored in the distribution medium before the decryption and transfer of information are undertaken. Decryption of the information is accomplished by generating a key from both the signature of the distribution medium and the DID-S.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/http://analytics.patsnap.com/patent_view/view?pn=EP0644474A1
dc.sourcePatSnap
dc.typePatent
dc.contributor.departmentINSTITUTE OF SYSTEMS SCIENCE
dc.identifier.isiutNOT_IN_WOS
dc.description.patentnoEP0644474A1
dc.description.patenttypePublished Application
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
EP0644474A1.pdf585.47 kBAdobe PDF

OPEN

PublishedView/Download

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.