Claims
- 1. A method comprising:
obtaining fingerprint data from a file header associated with a file, the fingerprint data being associated with contents of the file; checking the integrity of the fingerprint data; if the check leaves doubt about the fingerprint data thus obtained, then recalculating fingerprint data from contents of the file; and transmitting the fingerprint data to a database.
- 2. The method of claim 1 that includes:
accessing a database record corresponding to the transmitted fingerprint data, to obtain associated information; and returning at least some of said associated information to a computer device from which the fingerprint data was transmitted.
- 3. The method of claim 1 in which the file contents comprise audio.
- 4. The method of claim 1 in which checking includes checking a digital signature.
- 5. The method of claim 1 in which the checking includes decrypting fingerprint data from the header and authenticating the decrypted data.
- 6. The method of claim 5 that includes applying an inverse modification to the fingerprint in the header prior to said decrypting.
- 7. The method of claim 1 that includes applying an inverse modification to the fingerprint in the header.
- 8. A method comprising:
obtaining watermark data from a file header associated with a file, the watermark data being associated with contents of the file; checking the integrity of the watermark data; if the check leaves doubt about the watermark data thus obtained, then detecting watermark data from contents of the file; and transmitting the watermark data to a database.
- 9. The method of claim 8 that includes:
accessing a database record corresponding to the transmitted watermark data, to obtain associated information; and returning at least some of said associated information to a computer device from which the watermark data was transmitted.
- 10. The method of claim 8 in which the file contents comprise audio.
- 11. The method of claim 8 in which checking includes checking a digital signature.
- 12. The method of claim 8 in which the checking includes decrypting watermark data from the header and authenticating the decrypted data.
- 13. The method of claim 12 that includes applying an inverse modification to the watermark in the header prior to said decrypting.
- 14. The method of claim 12 that includes applying an inverse modification to the watermark in the header.
RELATED APPLICATION DATA
[0001] This application is a continuation in part of application Ser. No. 09/571,422, which claimed priority from application Ser. Nos. 09/314,648, 09/342,688, 09/342,689, 09/342,971, 09/343,101, 09/343,104, 60/141,468, 60/151,586, 60/158,015, 60/163,332, 60/164,619, 09/531,076, 09/543,125, 09/547,664, and 09/552,998.
[0002] This application is also a continuation-in-part of copending application Ser. Nos. 09/574,726 and 09/476,686, both of which claim priority to application 60/134,782.
[0003] The present application claims priority benefit to the foregoing applications.
[0004] The subject matter of this application is also related to that of Ser. No. 09/620,019, 60/257,822, 60/232,163, and 09/404,291.
Provisional Applications (6)
|
Number |
Date |
Country |
|
60141468 |
Jun 1999 |
US |
|
60151586 |
Aug 1999 |
US |
|
60158015 |
Oct 1999 |
US |
|
60163322 |
Nov 1999 |
US |
|
60164619 |
Nov 1999 |
US |
|
60134782 |
May 1999 |
US |
Continuation in Parts (3)
|
Number |
Date |
Country |
Parent |
09571422 |
May 2000 |
US |
Child |
09858189 |
May 2001 |
US |
Parent |
09574726 |
May 2000 |
US |
Child |
09571422 |
May 2000 |
US |
Parent |
09476686 |
Dec 1999 |
US |
Child |
09574726 |
May 2000 |
US |