Loading…

Persistent access control to prevent piracy of digital information

Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continu...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings of the IEEE 1999, Vol.87 (7), p.1239-1250
Main Author: Schneck, P.B.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083
cites cdi_FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083
container_end_page 1250
container_issue 7
container_start_page 1239
container_title Proceedings of the IEEE
container_volume 87
creator Schneck, P.B.
description Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continuous waveforms, the communication is complete when the recipient possesses a digital representation of the original signal with a given fidelity criterion. This allows one to embed watermarks to deliver hidden information. In the case of discrete data files, the communication is complete when the recipient possesses the identical stream of bits delivered by the source: at that moment there are two, identical, streams of bits. It is impossible to characterize one as the original and the other as the copy. Consequently, one loses control of digital information after transmitting it to another. The recipient is free to use their original as they see fit. The ubiquitous PC and Internet provide the means easily and inexpensively to copy and distribute data files to anyone wishing to do so. We introduce a framework for persistent access control over digital data. That is, data remain under the control of their originator, even after another has received them. This requires the use of multiple levels of encryption, transmission of ciphering keys through licenses associated with the data, and of trusted hardware and trusted software (access control mechanism) to ensure that the originator's restrictions are not circumvented. We show how a PC or consumer electronics appliance can accommodate the required system-while remaining compatible with previously produced data. This material is the subject of a pending U.S. Patent Application (allowed) and foreign applications.
doi_str_mv 10.1109/5.771075
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_771075</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>771075</ieee_id><sourcerecordid>919913043</sourcerecordid><originalsourceid>FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083</originalsourceid><addsrcrecordid>eNp90DtPwzAUhmELgUQpSMxMmYAl5diObyNU3KRKMMAcuc4JMkrjYLtI_fekagUb0xm-R2d4CTmnMKMUzI2YKUVBiQMyoULokjEhD8kEgOrSMGqOyUlKnwDAheQTcveKMfmUsc-FdQ5TKlzocwxdkUMxRPzeLoOP1m2K0BaN__DZdoXv2xBXNvvQn5Kj1nYJz_Z3St4f7t_mT-Xi5fF5frsoXSUhl0Zw2iI2DhUaIxEcZRK4tFxVDWgptBFu6VrlGmuRG2ZRGJS8WpqmpaD5lFzt_g4xfK0x5Xrlk8Ousz2GdaoNNYZyqPgoL_-VbCwkRjfC638hBca01orBH3UxpBSxrYfoVzZuRlRvy9ei3pUf6cWOekT8ZfvxB7xPfXY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1022888720</pqid></control><display><type>article</type><title>Persistent access control to prevent piracy of digital information</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Schneck, P.B.</creator><creatorcontrib>Schneck, P.B.</creatorcontrib><description>Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continuous waveforms, the communication is complete when the recipient possesses a digital representation of the original signal with a given fidelity criterion. This allows one to embed watermarks to deliver hidden information. In the case of discrete data files, the communication is complete when the recipient possesses the identical stream of bits delivered by the source: at that moment there are two, identical, streams of bits. It is impossible to characterize one as the original and the other as the copy. Consequently, one loses control of digital information after transmitting it to another. The recipient is free to use their original as they see fit. The ubiquitous PC and Internet provide the means easily and inexpensively to copy and distribute data files to anyone wishing to do so. We introduce a framework for persistent access control over digital data. That is, data remain under the control of their originator, even after another has received them. This requires the use of multiple levels of encryption, transmission of ciphering keys through licenses associated with the data, and of trusted hardware and trusted software (access control mechanism) to ensure that the originator's restrictions are not circumvented. We show how a PC or consumer electronics appliance can accommodate the required system-while remaining compatible with previously produced data. This material is the subject of a pending U.S. Patent Application (allowed) and foreign applications.</description><identifier>ISSN: 0018-9219</identifier><identifier>EISSN: 1558-2256</identifier><identifier>DOI: 10.1109/5.771075</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Application software ; Communication system control ; Consumer electronics ; Cryptography ; Digital ; Digital control ; Electronics ; Hardware ; Internet ; Licenses ; Polycarbonates ; Reproduction ; Streams ; Watermarking</subject><ispartof>Proceedings of the IEEE, 1999, Vol.87 (7), p.1239-1250</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083</citedby><cites>FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/771075$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,4024,27923,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Schneck, P.B.</creatorcontrib><title>Persistent access control to prevent piracy of digital information</title><title>Proceedings of the IEEE</title><addtitle>JPROC</addtitle><description>Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continuous waveforms, the communication is complete when the recipient possesses a digital representation of the original signal with a given fidelity criterion. This allows one to embed watermarks to deliver hidden information. In the case of discrete data files, the communication is complete when the recipient possesses the identical stream of bits delivered by the source: at that moment there are two, identical, streams of bits. It is impossible to characterize one as the original and the other as the copy. Consequently, one loses control of digital information after transmitting it to another. The recipient is free to use their original as they see fit. The ubiquitous PC and Internet provide the means easily and inexpensively to copy and distribute data files to anyone wishing to do so. We introduce a framework for persistent access control over digital data. That is, data remain under the control of their originator, even after another has received them. This requires the use of multiple levels of encryption, transmission of ciphering keys through licenses associated with the data, and of trusted hardware and trusted software (access control mechanism) to ensure that the originator's restrictions are not circumvented. We show how a PC or consumer electronics appliance can accommodate the required system-while remaining compatible with previously produced data. This material is the subject of a pending U.S. Patent Application (allowed) and foreign applications.</description><subject>Access control</subject><subject>Application software</subject><subject>Communication system control</subject><subject>Consumer electronics</subject><subject>Cryptography</subject><subject>Digital</subject><subject>Digital control</subject><subject>Electronics</subject><subject>Hardware</subject><subject>Internet</subject><subject>Licenses</subject><subject>Polycarbonates</subject><subject>Reproduction</subject><subject>Streams</subject><subject>Watermarking</subject><issn>0018-9219</issn><issn>1558-2256</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1999</creationdate><recordtype>article</recordtype><recordid>eNp90DtPwzAUhmELgUQpSMxMmYAl5diObyNU3KRKMMAcuc4JMkrjYLtI_fekagUb0xm-R2d4CTmnMKMUzI2YKUVBiQMyoULokjEhD8kEgOrSMGqOyUlKnwDAheQTcveKMfmUsc-FdQ5TKlzocwxdkUMxRPzeLoOP1m2K0BaN__DZdoXv2xBXNvvQn5Kj1nYJz_Z3St4f7t_mT-Xi5fF5frsoXSUhl0Zw2iI2DhUaIxEcZRK4tFxVDWgptBFu6VrlGmuRG2ZRGJS8WpqmpaD5lFzt_g4xfK0x5Xrlk8Ousz2GdaoNNYZyqPgoL_-VbCwkRjfC638hBca01orBH3UxpBSxrYfoVzZuRlRvy9ei3pUf6cWOekT8ZfvxB7xPfXY</recordid><startdate>1999</startdate><enddate>1999</enddate><creator>Schneck, P.B.</creator><general>IEEE</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope></search><sort><creationdate>1999</creationdate><title>Persistent access control to prevent piracy of digital information</title><author>Schneck, P.B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Access control</topic><topic>Application software</topic><topic>Communication system control</topic><topic>Consumer electronics</topic><topic>Cryptography</topic><topic>Digital</topic><topic>Digital control</topic><topic>Electronics</topic><topic>Hardware</topic><topic>Internet</topic><topic>Licenses</topic><topic>Polycarbonates</topic><topic>Reproduction</topic><topic>Streams</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Schneck, P.B.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Proceedings of the IEEE</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Schneck, P.B.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Persistent access control to prevent piracy of digital information</atitle><jtitle>Proceedings of the IEEE</jtitle><stitle>JPROC</stitle><date>1999</date><risdate>1999</risdate><volume>87</volume><issue>7</issue><spage>1239</spage><epage>1250</epage><pages>1239-1250</pages><issn>0018-9219</issn><eissn>1558-2256</eissn><coden>IEEPAD</coden><abstract>Marshall McLuhan's statement that "the medium is the message" captured the reality of communications until the digital age. Communicating digitally involves the transfer of information as streams of bits. No longer does matter need to be moved. In the case of data representing continuous waveforms, the communication is complete when the recipient possesses a digital representation of the original signal with a given fidelity criterion. This allows one to embed watermarks to deliver hidden information. In the case of discrete data files, the communication is complete when the recipient possesses the identical stream of bits delivered by the source: at that moment there are two, identical, streams of bits. It is impossible to characterize one as the original and the other as the copy. Consequently, one loses control of digital information after transmitting it to another. The recipient is free to use their original as they see fit. The ubiquitous PC and Internet provide the means easily and inexpensively to copy and distribute data files to anyone wishing to do so. We introduce a framework for persistent access control over digital data. That is, data remain under the control of their originator, even after another has received them. This requires the use of multiple levels of encryption, transmission of ciphering keys through licenses associated with the data, and of trusted hardware and trusted software (access control mechanism) to ensure that the originator's restrictions are not circumvented. We show how a PC or consumer electronics appliance can accommodate the required system-while remaining compatible with previously produced data. This material is the subject of a pending U.S. Patent Application (allowed) and foreign applications.</abstract><pub>IEEE</pub><doi>10.1109/5.771075</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0018-9219
ispartof Proceedings of the IEEE, 1999, Vol.87 (7), p.1239-1250
issn 0018-9219
1558-2256
language eng
recordid cdi_ieee_primary_771075
source IEEE Electronic Library (IEL) Journals
subjects Access control
Application software
Communication system control
Consumer electronics
Cryptography
Digital
Digital control
Electronics
Hardware
Internet
Licenses
Polycarbonates
Reproduction
Streams
Watermarking
title Persistent access control to prevent piracy of digital information
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T07%3A17%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Persistent%20access%20control%20to%20prevent%20piracy%20of%20digital%20information&rft.jtitle=Proceedings%20of%20the%20IEEE&rft.au=Schneck,%20P.B.&rft.date=1999&rft.volume=87&rft.issue=7&rft.spage=1239&rft.epage=1250&rft.pages=1239-1250&rft.issn=0018-9219&rft.eissn=1558-2256&rft.coden=IEEPAD&rft_id=info:doi/10.1109/5.771075&rft_dat=%3Cproquest_ieee_%3E919913043%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c460t-9531feedce7e996e0c126036a374d0865895cbcf7cdaae392ae59e634b9df1083%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1022888720&rft_id=info:pmid/&rft_ieee_id=771075&rfr_iscdi=true