Loading…
Persistent access control to prevent piracy of digital information
Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continu...
Saved in:
Published in: | Proceedings of the IEEE 1999, Vol.87 (7), p.1239-1250 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083 |
---|---|
cites | cdi_FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083 |
container_end_page | 1250 |
container_issue | 7 |
container_start_page | 1239 |
container_title | Proceedings of the IEEE |
container_volume | 87 |
creator | Schneck, P.B. |
description | Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continuous waveforms, the communication is complete when the recipient possesses a digital representation of the original signal with a given fidelity criterion. This allows one to embed watermarks to deliver hidden information. In the case of discrete data files, the communication is complete when the recipient possesses the identical stream of bits delivered by the source: at that moment there are two, identical, streams of bits. It is impossible to characterize one as the original and the other as the copy. Consequently, one loses control of digital information after transmitting it to another. The recipient is free to use their original as they see fit. The ubiquitous PC and Internet provide the means easily and inexpensively to copy and distribute data files to anyone wishing to do so. We introduce a framework for persistent access control over digital data. That is, data remain under the control of their originator, even after another has received them. This requires the use of multiple levels of encryption, transmission of ciphering keys through licenses associated with the data, and of trusted hardware and trusted software (access control mechanism) to ensure that the originator's restrictions are not circumvented. We show how a PC or consumer electronics appliance can accommodate the required system-while remaining compatible with previously produced data. This material is the subject of a pending U.S. Patent Application (allowed) and foreign applications. |
doi_str_mv | 10.1109/5.771075 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_771075</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>771075</ieee_id><sourcerecordid>919913043</sourcerecordid><originalsourceid>FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083</originalsourceid><addsrcrecordid>eNp90DtPwzAUhmELgUQpSMxMmYAl5diObyNU3KRKMMAcuc4JMkrjYLtI_fekagUb0xm-R2d4CTmnMKMUzI2YKUVBiQMyoULokjEhD8kEgOrSMGqOyUlKnwDAheQTcveKMfmUsc-FdQ5TKlzocwxdkUMxRPzeLoOP1m2K0BaN__DZdoXv2xBXNvvQn5Kj1nYJz_Z3St4f7t_mT-Xi5fF5frsoXSUhl0Zw2iI2DhUaIxEcZRK4tFxVDWgptBFu6VrlGmuRG2ZRGJS8WpqmpaD5lFzt_g4xfK0x5Xrlk8Ousz2GdaoNNYZyqPgoL_-VbCwkRjfC638hBca01orBH3UxpBSxrYfoVzZuRlRvy9ei3pUf6cWOekT8ZfvxB7xPfXY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1022888720</pqid></control><display><type>article</type><title>Persistent access control to prevent piracy of digital information</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Schneck, P.B.</creator><creatorcontrib>Schneck, P.B.</creatorcontrib><description>Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continuous waveforms, the communication is complete when the recipient possesses a digital representation of the original signal with a given fidelity criterion. This allows one to embed watermarks to deliver hidden information. In the case of discrete data files, the communication is complete when the recipient possesses the identical stream of bits delivered by the source: at that moment there are two, identical, streams of bits. It is impossible to characterize one as the original and the other as the copy. Consequently, one loses control of digital information after transmitting it to another. The recipient is free to use their original as they see fit. The ubiquitous PC and Internet provide the means easily and inexpensively to copy and distribute data files to anyone wishing to do so. We introduce a framework for persistent access control over digital data. That is, data remain under the control of their originator, even after another has received them. This requires the use of multiple levels of encryption, transmission of ciphering keys through licenses associated with the data, and of trusted hardware and trusted software (access control mechanism) to ensure that the originator's restrictions are not circumvented. We show how a PC or consumer electronics appliance can accommodate the required system-while remaining compatible with previously produced data. This material is the subject of a pending U.S. Patent Application (allowed) and foreign applications.</description><identifier>ISSN: 0018-9219</identifier><identifier>EISSN: 1558-2256</identifier><identifier>DOI: 10.1109/5.771075</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Application software ; Communication system control ; Consumer electronics ; Cryptography ; Digital ; Digital control ; Electronics ; Hardware ; Internet ; Licenses ; Polycarbonates ; Reproduction ; Streams ; Watermarking</subject><ispartof>Proceedings of the IEEE, 1999, Vol.87 (7), p.1239-1250</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083</citedby><cites>FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/771075$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,4024,27923,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Schneck, P.B.</creatorcontrib><title>Persistent access control to prevent piracy of digital information</title><title>Proceedings of the IEEE</title><addtitle>JPROC</addtitle><description>Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continuous waveforms, the communication is complete when the recipient possesses a digital representation of the original signal with a given fidelity criterion. This allows one to embed watermarks to deliver hidden information. In the case of discrete data files, the communication is complete when the recipient possesses the identical stream of bits delivered by the source: at that moment there are two, identical, streams of bits. It is impossible to characterize one as the original and the other as the copy. Consequently, one loses control of digital information after transmitting it to another. The recipient is free to use their original as they see fit. The ubiquitous PC and Internet provide the means easily and inexpensively to copy and distribute data files to anyone wishing to do so. We introduce a framework for persistent access control over digital data. That is, data remain under the control of their originator, even after another has received them. This requires the use of multiple levels of encryption, transmission of ciphering keys through licenses associated with the data, and of trusted hardware and trusted software (access control mechanism) to ensure that the originator's restrictions are not circumvented. We show how a PC or consumer electronics appliance can accommodate the required system-while remaining compatible with previously produced data. This material is the subject of a pending U.S. Patent Application (allowed) and foreign applications.</description><subject>Access control</subject><subject>Application software</subject><subject>Communication system control</subject><subject>Consumer electronics</subject><subject>Cryptography</subject><subject>Digital</subject><subject>Digital control</subject><subject>Electronics</subject><subject>Hardware</subject><subject>Internet</subject><subject>Licenses</subject><subject>Polycarbonates</subject><subject>Reproduction</subject><subject>Streams</subject><subject>Watermarking</subject><issn>0018-9219</issn><issn>1558-2256</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1999</creationdate><recordtype>article</recordtype><recordid>eNp90DtPwzAUhmELgUQpSMxMmYAl5diObyNU3KRKMMAcuc4JMkrjYLtI_fekagUb0xm-R2d4CTmnMKMUzI2YKUVBiQMyoULokjEhD8kEgOrSMGqOyUlKnwDAheQTcveKMfmUsc-FdQ5TKlzocwxdkUMxRPzeLoOP1m2K0BaN__DZdoXv2xBXNvvQn5Kj1nYJz_Z3St4f7t_mT-Xi5fF5frsoXSUhl0Zw2iI2DhUaIxEcZRK4tFxVDWgptBFu6VrlGmuRG2ZRGJS8WpqmpaD5lFzt_g4xfK0x5Xrlk8Ousz2GdaoNNYZyqPgoL_-VbCwkRjfC638hBca01orBH3UxpBSxrYfoVzZuRlRvy9ei3pUf6cWOekT8ZfvxB7xPfXY</recordid><startdate>1999</startdate><enddate>1999</enddate><creator>Schneck, P.B.</creator><general>IEEE</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope></search><sort><creationdate>1999</creationdate><title>Persistent access control to prevent piracy of digital information</title><author>Schneck, P.B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Access control</topic><topic>Application software</topic><topic>Communication system control</topic><topic>Consumer electronics</topic><topic>Cryptography</topic><topic>Digital</topic><topic>Digital control</topic><topic>Electronics</topic><topic>Hardware</topic><topic>Internet</topic><topic>Licenses</topic><topic>Polycarbonates</topic><topic>Reproduction</topic><topic>Streams</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Schneck, P.B.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Proceedings of the IEEE</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Schneck, P.B.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Persistent access control to prevent piracy of digital information</atitle><jtitle>Proceedings of the IEEE</jtitle><stitle>JPROC</stitle><date>1999</date><risdate>1999</risdate><volume>87</volume><issue>7</issue><spage>1239</spage><epage>1250</epage><pages>1239-1250</pages><issn>0018-9219</issn><eissn>1558-2256</eissn><coden>IEEPAD</coden><abstract>Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continuous waveforms, the communication is complete when the recipient possesses a digital representation of the original signal with a given fidelity criterion. This allows one to embed watermarks to deliver hidden information. In the case of discrete data files, the communication is complete when the recipient possesses the identical stream of bits delivered by the source: at that moment there are two, identical, streams of bits. It is impossible to characterize one as the original and the other as the copy. Consequently, one loses control of digital information after transmitting it to another. The recipient is free to use their original as they see fit. The ubiquitous PC and Internet provide the means easily and inexpensively to copy and distribute data files to anyone wishing to do so. We introduce a framework for persistent access control over digital data. That is, data remain under the control of their originator, even after another has received them. This requires the use of multiple levels of encryption, transmission of ciphering keys through licenses associated with the data, and of trusted hardware and trusted software (access control mechanism) to ensure that the originator's restrictions are not circumvented. We show how a PC or consumer electronics appliance can accommodate the required system-while remaining compatible with previously produced data. This material is the subject of a pending U.S. Patent Application (allowed) and foreign applications.</abstract><pub>IEEE</pub><doi>10.1109/5.771075</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0018-9219 |
ispartof | Proceedings of the IEEE, 1999, Vol.87 (7), p.1239-1250 |
issn | 0018-9219 1558-2256 |
language | eng |
recordid | cdi_ieee_primary_771075 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Access control Application software Communication system control Consumer electronics Cryptography Digital Digital control Electronics Hardware Internet Licenses Polycarbonates Reproduction Streams Watermarking |
title | Persistent access control to prevent piracy of digital information |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T07%3A17%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Persistent%20access%20control%20to%20prevent%20piracy%20of%20digital%20information&rft.jtitle=Proceedings%20of%20the%20IEEE&rft.au=Schneck,%20P.B.&rft.date=1999&rft.volume=87&rft.issue=7&rft.spage=1239&rft.epage=1250&rft.pages=1239-1250&rft.issn=0018-9219&rft.eissn=1558-2256&rft.coden=IEEPAD&rft_id=info:doi/10.1109/5.771075&rft_dat=%3Cproquest_ieee_%3E919913043%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1022888720&rft_id=info:pmid/&rft_ieee_id=771075&rfr_iscdi=true |