Claims
- 1. A system that is configured to receive one or more select data items of a plurality of data items corresponding to a data set, comprising:
a verifier that is configured to provide a verification of a presence of the data set, via:
a first verification of a presence of a select subset of the plurality of data items, and a second verification of a receipt of a substantial majority of the plurality of data items, and wherein the verifier provides the verification of the presence of the data set if either the first verification or the second verification occurs.
- 2. The system of claim 1, further including
a renderer that is configured to receive the data items, and a gate, operably coupled to the renderer and the verifier, that is configured to selectively inhibit or allow access to an output of the renderer corresponding to the data item, based on the verification of the presence of the data set.
- 3. The system of claim 2, wherein
the renderer is further configured to store the one or more select data items in a secure format that inhibits a subsequent rendering of the data items, and the gate is further configured to allow the subsequent rendering of the data items from the secure format.
- 4. The system of claim 2, wherein
the system is further configured to provide a recording of the one or more data items.
- 5. The system of claim 1, wherein
the verifier is configured to identify the select subset, based on a random process, and the first verification includes consideration of a likelihood of receiving the select subset of data items by chance occurrence.
- 6. The system of claim 1, wherein
the verifier is configured to identify the select subset, based on a random process, and the first verification includes consideration of a likelihood of not receiving a data item of the select subset even though the data item is present.
- 7. The system of claim 1, wherein
at least one of the first verification and the second verification includes a likelihood of an inaccurate reception of the one or more data items.
- 8. The system of claim 1, wherein
each data item of the plurality data items includes one or more sections, thereby forming a plurality of sections comprising the data set, each section of the plurality of sections including a section identifier corresponding to the section and a data set identifier corresponding to the data set, and the first verification is based on one or more responses to requests for specific sections of the plurality of sections.
- 9. The system of claim 8, wherein
at least one of the data set identifier and the section identifier of each section is embedded in the section as at least one watermark.
- 10. The system of claim 9, wherein
the at least one watermark includes:
a fragile watermark that is configured such that a modification of the section causes damage to the fragile watermark, and a robust watermark that is configured such that a removal of the robust watermark causes damage to the associated section.
- 11. The system of claim 10, wherein
the data items correspond to at least one of: digitally encoded audio content, and digitally encoded video content.
- 12. The system of claim 1, wherein
each data item of the plurality data items includes one or more sections, thereby forming a plurality of sections comprising the data set, each section of the plurality of sections including a section identifier corresponding to the section and a data set identifier corresponding to the data set, and the second verification is based on a number of different sections received, compared to a total number of sections comprising the data set.
- 13. The system of claim 12, wherein
at least one of the data set identifier and the section identifier of each section is embedded in the section as at least one watermark.
- 14. The system of claim 1, wherein
each data item of the plurality data items includes one or more sections, thereby forming a plurality of sections comprising the data set, each section of the plurality of sections including a section identifier corresponding to the section and a data set identifier corresponding to the data set, and the second verification is based on a verification of at least one of the section identifier and the data set identifier of randomly selected sections.
- 15. The system of claim 14, wherein
the at least one of the data set identifier and section identifier is embedded in the randomly selected sections as at least one watermark.
- 16. The system of claim 15, wherein
the at least one watermark includes:
a fragile watermark that is configured such that a modification of the section causes damage to the fragile watermark, and a robust watermark that is configured such that a removal of the robust watermark causes damage to the associated section.
- 17. The system of claim 1, wherein
the verifier is further configured to provide the verification of the presence of the data set via a third verification of a correspondence among identifiers of the data set in each of the received data items.
- 18. A method of controlling a rendering of data items of a data set, comprising:
receiving sections of the data set, conducting a first test for a presence of an entirety of the data set based on a receipt of randomly selected sections of the data set, conducting a second test for the presence of the entirety of the data set based on a receipt of a quantity of different sections of the data set, and controlling the rendering of the data items in dependence upon a result of either the first or second test.
- 19. The method of claim 18, further including
conducting a third test for the presence of the entirety of the data set based on a correspondence among a data set identifier that is included in each section of the data set.
- 20. The method of claim 18, wherein
each section further includes a section identifier, and at least one of the section identifier and the data set identifier is included in each section as one or more watermarks.
- 21. The method of claim 20, wherein
the one or more watermarks include:
a robust watermark that is embedded in the corresponding section such that a removal of the robust watermark causes a corruption of data contained in the section, and a fragile watermark that is embedded in the corresponding section such that a modification of the data contained in the section causes a corruption of the fragile watermark.
- 22. The method of claim 18, wherein the data items includes at least one of: digitally encoded audio content, and digitally encoded video content.
- 23. The method of claim 18, wherein
conducting the second test includes verifying a random selection of the different sections of the data set.
Parent Case Info
[0001] This application claims the benefit of U.S. Provisional Application No. 60/211,997 filed Jun. 16, 2000, Attorney Docket US000140P.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60211997 |
Jun 2000 |
US |