Authenticatable displayed content

ABSTRACT

Embodiments include a method, a computing device, and a computer program product. An embodiment provides a method implemented in a computing environment. The method includes receiving an indication of a selected watermark. The method also includes incorporating a human-perceivable manifestation of the selected watermark in each visual area of at least two human-visual areas displaying an output of an authorized program running in the computing environment.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is related to and claims the benefit of theearliest available effective filing date(s) from the following listedapplication(s) (the “Related Applications”) (e.g., claims earliestavailable priority dates for other than provisional patent applicationsor claims benefits under 35 USC § 119(e) for provisional patentapplications, for any and all parent, grandparent, great-grandparent,etc. applications of the Related Application(s)).

RELATED APPLICATIONS

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation-in-part of United States patentapplication entitled HANDLING MASQUERADING ELEMENTS, naming Alexander J.Cohen, Edward K. Y. Jung, Royce A. Levien, Robert W. Lor, Mark A.Malamud, William Henry Mangione-Smith, John D. Rinaldo, Jr. and LowellL. Wood, Jr. as inventors, U.S. application Ser. No. ______, filed Aug.31, 2006.

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation-in-part of United States patentapplication entitled SCREENING FOR MASQUERADING CONTENT, namingAlexander J. Cohen, Edward K. Y. Jung, Royce A. Levien, Robert W. Lord,Mark A. Malamud, William Henry Mangione-Smith, John D. Rinaldo, Jr. andLowell L. Wood, Jr. as inventors, U.S. application Ser. No. ______,filed Aug. 31, 2006.

The United States Patent Office (USPTO) has published a notice to theeffect that the USPTO's computer programs require that patent applicantsreference both a serial number and indicate whether an application is acontinuation or continuation-in-part. Stephen G. Kunin, Benefit ofPrior-Filed Application, USPTO Official Gazette Mar. 18, 2003, availableat http://www.uspto.gov/web/offices/com/sol/og/2003/week 11/patbene.htm.The present applicant entity has provided above a specific reference tothe application(s) from which priority is being claimed as recited bystatute. Applicant entity understands that the statute is unambiguous inits specific reference language and does not require either a serialnumber or any characterization, such as “continuation” or“continuation-in-part,” for claiming priority to U.S. patentapplications. Notwithstanding the foregoing, applicant entityunderstands that the USPTO's computer programs have certain data entryrequirements, and hence applicant entity is designating the presentapplication as a continuation-in-part of its parent applications as setforth above, but expressly points out that such designations are not tobe construed in any way as any type of commentary and/or admission as towhether or not the present application contains any new matter inaddition to the matter of its parent application(s).

All subject matter of the Related Applications and of any and allparent, grandparent, great-grandparent, etc. applications of the RelatedApplications is incorporated herein by reference to the extent suchsubject matter is not inconsistent herewith.

SUMMARY

An embodiment provides a method implemented in a computing environment.The method includes receiving an indication of a selected watermark. Themethod also includes incorporating a human-perceivable manifestation ofthe selected watermark in each visual area of at least two human-visualareas displaying an output of an authorized program running in thecomputing environment. In addition to the foregoing, other methodembodiments are described in the claims, drawings, and text that form apart of the present application.

Another embodiment provides a method implemented in a computingenvironment. The method includes receiving an indication of a selectedwatermark, and restricting access to the selected watermark to anauthorized program running in the computing environment. The method alsoincludes incorporating a human-perceivable manifestation of the selectedwatermark in each visual area of at least two human-visual areasdisplaying an output of an authorized program running in the computingenvironment. The method may include suppressing a visual area displayingan output that does not include the selected watermark in response to areceived a human-initiated input. The method may further includeautomatically suppressing a visual area displaying an output that doesnot include the selected watermark. In addition to the foregoing, othermethod embodiments are described in the claims, drawings, and text thatform a part of the present application.

A further embodiment provides a computing device. The computing deviceincludes an information store configured by computer program thatincludes computer program instructions. The computer programinstructions are operable to perform a process in a computer processor.The process including receiving an indication of a selected watermark,and allowing a control program privileges in the selected watermark. Theprocess further including associating human-perceivable manifestation ofthe selected watermark with each visual area of at least two visualareas generated for a human viewable display of an output of theoperating system. The computing device may further include a displaysurface operable to display each visual area of at least two visualareas generated for a human viewing of an output of the operatingsystem. The computing device may also include a user interface operableto receive an indication of the selected watermark in response to a useraction. In addition to the foregoing, other computing device embodimentsare described in the claims, drawings, and text that form a part of thepresent application.

An embodiment provides a computer program product. The computer programproduct includes a computer-readable signal-bearing medium bearingprogram instructions. The program instructions are operable to perform aprocess in a computing device of a computing environment. The processincludes receiving an indication of a selected watermark, and allowingan operating system privileges in the selected watermark. The processalso includes associating a visible manifestation of the selectedwatermark with each visual area of at least two human-visual areasgenerated for displaying an output of the operating system. In additionto the foregoing, other computer program product embodiments aredescribed in the claims, drawings, and text that form a part of thepresent application.

Another embodiment provides a method implemented in a computingenvironment. The method includes receiving a designation of anindividualized digital identifier. The method also includes associatinga human-perceptible form of the designated individualized digitalidentifier with each element of a group of human-perceivable elementsdisplayed by the computing environment. In addition to the foregoing,other method embodiments are described in the claims, drawings, and textthat form a part of the present application.

A further embodiment provides a method implemented in a computingenvironment. The method includes receiving a designation of anindividualized digital identifier, and restricting access to thedesignated individualized digital identifier to a trusted program. Themethod also includes associating a human-perceptible form of thedesignated individualized digital identifier with each element of agroup of human-perceivable elements displayed in response to the trustedprogram by the computing environment. The method may include scanning anelement displayed by the computing environment for a presence of thedesignated individualized digital identifier, and broadcasting a humanrecognizable notification if the individualized digital identifier isnot associated with the element. In addition to the foregoing, othermethod embodiments are described in the claims, drawings, and text thatform a part of the present application.

An embodiment provides a computing device. The computing device includesa display operable to visually present each element of the group ofelements to a human user and an information store configurable by acomputer program. The computer program includes instructions operable toperform a process in a processor. The process includes receiving adesignation of an individualized digital identifier, and limiting accessto the designated individualized digital identifier to an applicationprogramming interface callable by a privileged code. The process alsoincludes associating a human-perceptible form of the designatedindividualized digital identifier with each element of a group ofelements displayed in response to a program running in the computingdevice. In addition to the foregoing, other computing device embodimentsare described in the claims, drawings, and text that form a part of thepresent application.

Another embodiment provides a computer program product. The computerprogram product includes a computer-readable signal-bearing mediumbearing program instructions. The program instructions are operable toperform a process in a computing device. The process includes receivinga designation of an individualized digital identifier, and restrictingaccess to the designated individualized digital identifier to anoperating system program. The process also includes associating ahuman-perceptible form of the designated individualized digitalidentifier with each human-perceivable element of a group of elementsdisplayed in response to the operating system program of the computingdevice. In addition to the foregoing, other computer program productembodiments are described in the claims, drawings, and text that form apart of the present application.

A further embodiment provides a method. The method includes receiving aninstruction operable to create a visual presentation corresponding to abitmap content. The method also includes determining if the instructionoperable to create a visual presentation corresponding to a bitmapcontent includes an instruction operable to create a visual presentationcorresponding to a bitmap content having an indicium of a digitalwatermark. The method further includes initiating an action with respectto the instruction operable to create a visual presentationcorresponding to a bitmap content, the action being responsive to thedetermining. In addition to the foregoing, other method embodiments aredescribed in the claims, drawings, and text that form a part of thepresent application.

An embodiment provides a computing device. The computing device includesan information store configured by a computer program that includescomputer program instructions. The computer program instructions areoperable to perform a process in a computer processor. The processincludes receiving an instruction to create a visual presentationcorresponding to a bitmap content. The process also includes determiningif the instruction to create a visual presentation corresponding to abitmap content includes an instruction to create a visual presentationcorresponding to a bitmap content having an indicium of a digitalwatermark. The process further includes initiating an action withrespect to the instruction to create a visual presentation correspondingto a bitmap content, the action being responsive to the determining. Inaddition to the foregoing, other computing device embodiments aredescribed in the claims, drawings, and text that form a part of thepresent application.

Another embodiment provides a computer program product. The computerprogram product includes a computer-readable signal-bearing mediumbearing program instructions. The program instructions are operable toperform a process in a computing device of a computing environment. Theprocess includes receiving an instruction operable to create a visualpresentation corresponding to a bitmap content. The process alsoincludes determining if the instruction operable to create a visualpresentation corresponding to a bitmap content includes an instructionoperable to create a visual presentation corresponding to a bitmapcontent having an indicium of a digital watermark. The process furtherincludes initiating an action with respect to the instruction operableto create a visual presentation corresponding to a bitmap content inresponse to the determining. The computer-readable signal-bearing mediummay include a computer storage medium. The computer-readablesignal-bearing medium may include a communication medium. In addition tothe foregoing, other computer program product embodiments are describedin the claims, drawings, and text that form a part of the presentapplication.

A further embodiment provides a method implemented in a computingenvironment. The method includes receiving an instruction to create avisual presentation corresponding to a bitmap content. The method alsoincludes determining if the instruction to create a visual presentationcorresponding to a bitmap content includes an instruction to create avisual presentation corresponding to a bitmap content having an indiciumof a digital watermark. If the instruction to create a visualpresentation corresponding to a bitmap content does not include aninstruction to create a visual presentation corresponding to a bitmapcontent having an indicium of a digital watermark, the method includesdisplaying a human-understandable notification reflecting an absence ofa digital watermark. In addition to the foregoing, other computingdevice embodiments are described in the claims, drawings, and text thatform a part of the present application.

An embodiment provides a computing device. The computing device includesmeans for receiving an instruction to create a visual presentationcorresponding to a bitmap content. The computing device also includesmeans for determining if the instruction to create a visual presentationcorresponding to a bitmap content includes an instruction to create avisual presentation corresponding to a bitmap content having an indiciumof a digital watermark. The computing device further includes means fordisplaying a human-understandable notification reflecting an absence ofa digital watermark if the instruction to create a visual presentationcorresponding to a bitmap content does not include an instruction tocreate a visual presentation corresponding to a bitmap content having anindicium of a digital watermark. In addition to the foregoing, othercomputing device embodiments are described in the claims, drawings, andtext that form a part of the present application.

Another embodiment provides a computer program product. The computerprogram product includes a computer-readable signal-bearing mediumbearing program instructions. The program instructions are operable toperform a process in a computing device of a computing environment. Theprocess includes receiving an instruction to create a visualpresentation corresponding to a bitmap content. The process alsoincludes determining if the instruction to create a visual presentationcorresponding to a bitmap content includes an instruction to create avisual presentation corresponding to a bitmap content having an indiciumof a digital watermark. If the instruction to create a visualpresentation corresponding to a bitmap content does not include aninstruction to create a visual presentation corresponding to a bitmapcontent having an indicium of a digital watermark, the process furtherincludes displaying a human-understandable notification reflecting anabsence of a digital watermark. In addition to the foregoing, othercomputer program product embodiments are described in the claims,drawings, and text that form a part of the present application.

A further embodiment provides a method implemented in a computingenvironment that includes a system digital watermark. Ahuman-perceptible manifestation of the system digital watermark beingincorporatable in a displayable content provided by a program running inthe computing environment. The method includes receiving digital datathat includes an instruction to create a visual presentationcorresponding to a bitmap. The method also includes determining if theinstruction to create a visual presentation corresponding to a bitmapincludes an instruction to create a visual presentation corresponding toa bitmap having an indicium of a digital watermark. If the instructionto create a visual presentation corresponding to a bitmap includes aninstruction to create a visual presentation corresponding to a bitmaphaving an indicium of a digital watermark, the method includesestablishing a correlation between the indicium of a digital watermarkand the system digital watermark, and displaying a human-understandableinformation responsive to the determined correlation between theindicium of the digital watermark and the system digital watermark. Ifthe determined measure of a correlation is below a preselected level,the method may include exposing to the program running in the computingenvironment the digital data that includes an instruction to create avisual presentation corresponding to a bitmap. If the determined measureof a correlation is above a preselected level, the method may includeisolating from the program running in the computing environment thedigital data that includes an instruction to create a visualpresentation corresponding to a bitmap. In addition to the foregoing,other method embodiments are described in the claims, drawings, and textthat form a part of the present application.

An embodiment provides a computer program product. The computer programproduct includes a computer-readable signal-bearing medium bearingprogram instructions. The program instructions being operable to performa process in a computing device. The process includes receiving digitaldata that includes an instruction to create a visual presentationcorresponding to a bitmap. The process also includes determining if theinstruction to create a visual presentation corresponding to a bitmapincludes an instruction to create a visual presentation corresponding toa bitmap having an indicium of a digital watermark. If the instructionto create a visual presentation corresponding to a bitmap includes aninstruction to create a visual presentation corresponding to a bitmaphaving an indicium of a digital watermark, the process includesestablishing a correlation between the indicium of a digital watermarkand a system digital watermark of a computing environment that includesthe computing device, and displaying a human-understandable informationresponsive to the determined correlation between the indicium of thedigital watermark and the system digital watermark. In addition to theforegoing, other method embodiments are described in the claims,drawings, and text that form a part of the present application.

Another embodiment provides a computing device. The computing deviceincludes means for receiving digital data that includes an instructionto create a visual presentation corresponding to a bitmap. The computingdevice also includes means for determining if the instruction to createa visual presentation corresponding to a bitmap includes an instructionto create a visual presentation corresponding to a bitmap having anindicium of a digital watermark. The computing device further includesmeans for establishing a correlation between the indicium of a digitalwatermark and a system digital watermark of a computing environment thatincludes the computing device. The computing device also includes meansfor displaying a human-understandable information responsive to thedetermined correlation between the indicium of the digital watermark andthe system digital watermark. In addition to the foregoing, othercomputing device embodiments are described in the claims, drawings, andtext that form a part of the present application.

The foregoing summary is illustrative only and is not intended to be inany way limiting. In addition to the illustrative aspects, embodiments,and features described above, further aspects, embodiments, and featureswill become apparent by reference to the drawings and the followingdetailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an exemplary general-purpose computing system inwhich embodiments may be implemented;

FIG. 2 illustrates an exemplary operational flow implemented in acomputing environment;

FIG. 3 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 4 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 5 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 6 illustrates an alternative embodiment of the exemplaryoperational flow 200 of FIG. 2;

FIG. 7 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 8 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 9 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 10 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 11 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 12 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 13 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 14 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 15 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 16 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 17 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 2;

FIG. 18 illustrates an exemplary environment in which an embodiment ofthe operational flow may be implemented;

FIG. 19 illustrates an exemplary computer program product;

FIG. 20 illustrates an exemplary operational flow implemented in acomputing environment;

FIG. 21 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 20;

FIG. 22 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 20;

FIG. 23 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 20;

FIG. 24 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 20;

FIG. 25 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 20;

FIG. 26 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 20;

FIG. 27 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 20;

FIG. 28 illustrates another embodiment of the exemplary operational flowof FIG. 20;

FIG. 29 illustrates a further embodiment of the exemplary operationalflow of FIG. 20;

FIG. 30 illustrates an embodiment of the exemplary operational flow ofFIG. 20;

FIG. 31 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 20;

FIG. 32 illustrates an exemplary computing environment in whichembodiments of the operational flow may be implemented;

FIG. 33 illustrates an exemplary display environment that may beprovided by the computing environment of FIG. 32;

FIG. 34 illustrates an exemplary computing environment in whichembodiments may be implemented;

FIG. 35 illustrates an exemplary computer program product in whichembodiments may be implemented;

FIG. 36 illustrates an exemplary operational flow implemented in acomputing environment and operable to practice embodiments;

FIG. 37 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 36;

FIG. 38 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 36;

FIG. 39 illustrates an exemplary computing environment in whichembodiments of the operational flow of FIG. 36 may be implemented;

FIG. 40 illustrates an exemplary computer program product in whichembodiments may be implemented;

FIG. 41 illustrates an exemplary operational flow in which embodimentsmay be implemented;

FIG. 42 illustrates an exemplary computing environment that mayimplement embodiments;

FIG. 43 illustrates a computer program product in which embodiments maybe implemented;

FIG. 44 illustrates an exemplary operational flow implemented in acomputing environment that includes a system digital watermark;

FIG. 45 illustrates an alternative embodiment of the operational flowdescribed in conjunction with FIG. 44;

FIG. 46 illustrates a further embodiment of the operational flowdescribed in conjunction with FIG. 44;

FIG. 47 illustrates another embodiment of the operational flow describedin conjunction with FIG. 44;

FIG. 48 illustrates an exemplary computer program product in whichembodiments may be implemented; and

FIG. 49 illustrates an exemplary computing device that may implementembodiments.

DETAILED DESCRIPTION

In the following detailed description, reference is made to theaccompanying drawings, which form a part hereof. In the drawings,similar symbols typically identify similar components, unless contextdictates otherwise. The illustrated embodiments described in thedetailed description, drawings, and claims are not meant to be limiting.Other embodiments may be utilized, and other changes may be made,without departing from the spirit or scope of the subject matterpresented here.

FIG. 1 illustrates an exemplary general-purpose computing system inwhich embodiments may be implemented, shown as a computing systemenvironment 100. Components of the computing system environment 100 mayinclude, but are not limited to, a computing device 110 having aprocessing unit 120, a system memory 130, and a system bus 121 thatcouples various system components including the system memory to theprocessing unit 120. The system bus 121 may be any of several types ofbus structures including a memory bus or memory controller, a peripheralbus, and a local bus using any of a variety of bus architectures. By wayof example, and not limitation, such architectures include IndustryStandard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus,Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA)local bus, and Peripheral Component Interconnect (PCI) bus, also knownas Mezzanine bus.

The computing system environment 100 typically includes a variety ofcomputer-readable media products. Computer-readable media may includeany media that can be accessed by the computing device 110 and includeboth volatile and nonvolatile media, removable and non-removable media.By way of example, and not of limitation, computer-readable media mayinclude computer storage media and communications media. Computerstorage media includes volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer-readable instructions, data structures,program modules, or other data. Computer storage media include, but arenot limited to, random-access memory (RAM), read-only memory (ROM),electrically erasable programmable read-only memory (EEPROM), flashmemory, or other memory technology, CD-ROM, digital versatile disks(DVD), or other optical disk storage, magnetic cassettes, magnetic tape,magnetic disk storage, or other magnetic storage devices, or any othermedium which can be used to store the desired information and which canbe accessed by the computing device 110. Communications media typicallyembody computer-readable instructions, data structures, program modules,or other data in a modulated data signal such as a carrier wave or othertransport mechanism and include any information delivery media. The term“modulated data signal” means a signal that has one or more of itscharacteristics set or changed in such a manner as to encode informationin the signal. By way of example, and not limitation, communicationsmedia include wired media such as a wired network and a direct-wiredconnection and wireless media such as acoustic, RF, optical, andinfrared media. Combinations of any of the above should also be includedwithin the scope of computer-readable media.

The system memory 130 includes computer storage media in the form ofvolatile and nonvolatile memory such as ROM 131 and RAM 132. A basicinput/output system (BIOS) 133, containing the basic routines that helpto transfer information between elements within the computing device110, such as during start-up, is typically stored in ROM 131. RAM 132typically contains data and program modules that are immediatelyaccessible to or presently being operated on by processing unit 120. Byway of example, and not limitation, FIG. 1 illustrates an operatingsystem 134, application programs 135, other program modules 136, andprogram data 137. Often, the operating system 134 offers services toapplications programs 135 by way of one or more application programminginterfaces (APIs) (not shown). Because the operating system 134incorporates these services, developers of applications programs 135need not redevelop code to use the services. Examples of APIs providedby operating systems such as Microsoft's “WINDOWS” are well known in theart. In an embodiment, an information store may include a computerstorage media. In a further embodiment, an information store may includea group of digital information storage devices. In another embodiment,an information store may include a quantum memory device.

The computing device 110 may also include other removable/non-removable,volatile/nonvolatile computer storage media products. By way of exampleonly, FIG. 1 illustrates a non-removable non-volatile memory interface(hard disk interface) 140 that reads from and writes to non-removable,non-volatile magnetic media, a magnetic disk drive 151 that reads fromand writes to a removable, non-volatile magnetic disk 152, and anoptical disk drive 155 that reads from and writes to a removable,non-volatile optical disk 156 such as a CD ROM. Otherremovable/nonremovable, volatile/non-volatile computer storage mediathat can be used in the exemplary operating environment include, but arenot limited to, magnetic tape cassettes, flash memory cards, DVDs,digital video tape, solid state RAM, and solid state ROM. The hard diskdrive 141 is typically connected to the system bus 121 through anon-removable memory interface, such as the interface 140, and magneticdisk drive 151 and optical disk drive 155 are typically connected to thesystem bus 121 by a removable non-volatile memory interface, such asinterface 150.

The drives and their associated computer storage media discussed aboveand illustrated in FIG. 1 provide storage of computer-readableinstructions, data structures, program modules, and other data for thecomputing device 110. In FIG. 1, for example, hard disk drive 141, isillustrated as storing an operating system 144, application programs145, other program modules 146, and program data 147. Note that thesecomponents can either be the same as or different from the operatingsystem 134, application programs 135, other program modules 136, andprogram data 137. The operating system 144, application programs 145,other program modules 146, and program data 147 are given differentnumbers here to illustrate that, at a minimum, they are differentcopies. A user may enter commands and information into the computingdevice 110 through input devices such as a microphone 163, keyboard 162,and pointing device 161, commonly referred to as a mouse, trackball, ortouch pad. Other input devices (not shown) may include a joystick, gamepad, satellite dish, and scanner. These and other input devices areoften connected to the processing unit 120 through a user inputinterface 160 that is coupled to the system bus, but may be connected byother interface and bus structures, such as a parallel port, game port,or a universal serial bus (USB). A monitor 191 or other type of displaydevice is also connected to the system bus 121 via an interface, such asa video interface 190. In addition to the monitor, computers may alsoinclude other peripheral output devices such as speakers 197 and printer196, which may be connected through an output peripheral interface 195.

The computing system environment 100 may operate in a networkedenvironment using logical connections to one or more remote computers,such as a remote computer 180. The remote computer 180 may be a personalcomputer, a server, a router, a network PC, a peer device, or othercommon network node, and typically includes many or all of the elementsdescribed above relative to the computing device 110, although only amemory storage device 181 has been illustrated in FIG. 1. The logicalconnections depicted in FIG. 1 include a local area network (LAN) 171and a wide area network (WAN) 173, but may also include other networkssuch as a personal area network (PAN) (not shown). Such networkingenvironments are commonplace in offices, enterprise-wide computernetworks, intranets, and the Internet.

When used in a LAN networking environment, the computing systemenvironment 100 is connected to the LAN 171 through a network interfaceor adapter 170. When used in a WAN networking environment, the computingdevice 110 typically includes a modem 172 or other means forestablishing communications over the WAN 173, such as the Internet. Themodem 172, which may be internal or external, may be connected to thesystem bus 121 via the user input interface 160, or via anotherappropriate mechanism. In a networked environment, program modulesdepicted relative to the computing device 110, or portions thereof, maybe stored in a remote memory storage device. By way of example, and notlimitation, FIG. 1 illustrates remote application programs 185 asresiding on computer storage medium 181. It will be appreciated that thenetwork connections shown are exemplary and other means of establishinga communications link between the computers may be used.

FIG. 1 is intended to provide a brief, general description of anillustrative and/or suitable exemplary environment in which embodimentsmay be implemented. An exemplary system may include the computing systemenvironment 100 of FIG. 1. FIG. 1 is an example of a suitableenvironment and is not intended to suggest any limitation as to thestructure, scope of use, or functionality of an embodiment. A particularenvironment should not be interpreted as having any dependency orrequirement relating to any one or combination of components illustratedin an exemplary operating environment. For example, in certaininstances, one or more elements of an environment may be deemed notnecessary and omitted. In other instances, one or more other elementsmay be deemed necessary and added.

In the description that follows, certain embodiments may be describedwith reference to acts and symbolic representations of operations thatare performed by one or more computing devices, such as the computingdevice 110 of FIG. 1. As such, it will be understood that such acts andoperations, which are at times referred to as being computer-executed,include the manipulation by the processing unit of the computer ofelectrical signals representing data in a structured form. Thismanipulation transforms the data or maintains them at locations in thememory system of the computer, which reconfigures or otherwise altersthe operation of the computer in a manner well understood by thoseskilled in the art. The data structures in which data is maintained arephysical locations of the memory that have particular properties definedby the format of the data. However, while an embodiment is beingdescribed in the foregoing context, it is not meant to be limiting asthose of skill in the art will appreciate that the acts and operationsdescribed hereinafter may also be implemented in hardware.

Embodiments may be implemented with numerous other general-purpose orspecial-purpose computing devices and computing system environments orconfigurations. Examples of well-known computing systems, environments,and configurations that may be suitable for use with an embodimentinclude, but are not limited to, personal computers, handheld or laptopdevices, personal digital assistants, multiprocessor systems,microprocessor-based systems, set top boxes, programmable consumerelectronics, network, minicomputers, server computers, game servercomputers, web server computers, mainframe computers, and distributedcomputing environments that include any of the above systems or devices.

Embodiments may be described in a general context of computer-executableinstructions, such as program modules, being executed by a computer.Generally, program modules include routines, programs, objects,components, data structures, etc., that perform particular tasks orimplement particular abstract data types. An embodiment may also bepracticed in a distributed computing environment where tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules may be located in both local and remote computer storage mediaincluding memory storage devices.

FIG. 2 illustrates an exemplary operational flow 200 implemented in acomputing environment. In an embodiment, the operational flow may beimplemented using the computing system environment 100 of FIG. 1. Aftera start operation, the operational flow 200 moves to a determinationoperation 210. The determination operation receives an indication of aselected watermark. A rights operation 250 restricts access to theselected watermark to an authorized program running in a computingenvironment. In an embodiment, an authorized program may include atleast two authorized programs. An integration operation 270 incorporatesa human-perceivable manifestation of the selected watermark in eachvisual area of at least two human-visual areas displaying an output ofthe authorized program. The operational flow then moves to an endoperation.

In an embodiment, a watermark may include a digital watermark. Inanother embodiment, a watermark may include a visually and/or audiblyreproducible pattern of bits useful to a human user in authentication ofa content and/or differentiation of one content from another content.

In an embodiment of the integration operation 270, the at least twohuman-visual areas may be displayed simultaneously and/or sequentially.In another embodiment, each visual area of the at least two human-visualareas may be displayed on and/or from a single physical surface. In anfurther embodiment, a sequential display of the at least twohuman-visual areas may including sequential displays temporallyseparated, for example, by seconds, minutes, hours, days, and/or weeks.For example, the visual areas may include at least two windows that aresequentially displayed from at least a substantially portion of aphysical area of a flat screen panel display. In a further embodiment,the human-perceivable manifestation of the selected watermark ishuman-visually discernable in each human visual area displayed by anoutput of the authorized program.

FIG. 3 illustrates an alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The determination operation 210 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 212, an operation 214, an operation216, and/or an operation 218. The operation 212 receives auser-originated watermark. The operation 214 receives an indication of auser-selected watermark. The operation 216 receives an indication of awatermark selected by a user from at least two watermarks. The operation218 receives an indication of a watermark selected by a user from atleast two human-differentiable watermarks.

FIG. 4 illustrates another alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The determination operation 210 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 222, an operation 224, an operation226, and/or an operation 228. The operation 222 receives an indicationof a watermark selected by a user from a library of watermarks thatincludes at least two human-differentiable watermarks. The operation 224receives an indication of a watermark selected from at least twohuman-differentiable polymorphic watermarks, the at least twohuman-differentiable polymorphic watermarks respectively including avariation of a genus watermark. The operation 226 receives an indicationof a selection of a watermark generated in response to an algorithm. Forexample, in an embodiment an algorithm may generate a watermark inresponse to a random number or a pseudo random number. In anotherembodiment, an algorithm may generate a watermark in response to acombination of unique identifiers, such as by a hash of a current date,a MAC address of a computing device, a birthday of a user, a serialnumber associated with an operating system of the computing device orother program, and/or a current date. The operation 228 selects awatermark from at least two human-differentiable watermarks in responseto an algorithm.

FIG. 5 illustrates a further alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The determination operation 210 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 232, an operation 234, an operation236, and/or an operation 238. The operation 232 receives an indicationof a selected watermark, the selected watermark including at least oneof a human-differentiable visible watermark and/or human-differentiableaudible watermark. The operation 234 receives an indication of aselected watermark, the selected watermark including an icon. Forexample, an icon may include a small pictorial representation of anobject. In an embodiment, an icon may include a commonly known icon,such as an icon representative of a Mario Brother from Super MarioBrothers© Nintendo. In another example, an icon may include a picture orother representation of a user. The operation 236 receives an indicationof a selected watermark, the selected watermark including at least oneof a visual aspect, an acoustical aspect, a user name, a biometricidentifier, a fingerprint, a word, a symbol, a graphic, a picture,and/or an avatar. In another embodiment, the selected watermark mayinclude a user's name. The operation 238 receives an indication of aselected watermark, the selected watermark including an image having avariation.

FIG. 6 illustrates an alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The determination operation 210 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 242. The operation 242 receives anindication of a selected watermark, the selected watermark including avariation. The variation may include at least one of a temporalvariation, a random variation, a pseudo random variation, a movementvariation, a rotation, a rotation variation, a shape variation, a colorvariation, a perspective variation, a size variation, and/or a featurevariation. For example, a temporal variation may include an image of aplanet, a face, a wheel, and/or an object that rotates. A temporalvariation may occur over a relatively short time, such as one second,and/or over a relatively longer time, such as monthly. A featurevariation may include a star that sparkles, or a varying width of acomponent of a watermark. Another variation may include a representationof a United States President that changes daily in order of theirelection. A variation may include a dynamic variation that includes asynchronization or other temporal or visual relationship to anotherwatermark or other element active on the same system/environment.Another variation may include a responsive watermark that does somethingin response to a user action, such as appearing in response to a useraction. A further variation is an invariant quality, including a staticrelationship of a watermark with respect to another watermark and/orother elements within the same computing system and/or environment.

In embodiments, a watermark may share a system and/or environmentaspect, such as a background color, a style, and/or a font, etc.,including incorporation through duplication or transparency. A watermarkmay include a polymorphic variation within a system and/or environmentand/or other domain, such as a workgroup or network. A watermark mayinclude a shared and/or a variable aspect in combination with others. Awatermark may be selected and/or generated in a manner to make it atleast substantially unique by using one or more unique aspects and/oridentifiers associated with a machine, system, account, or user, etc. Awatermark may be user invisible, and may be user queryable/displayableon user request. A watermark may be recognizable by code, includingmodules that take action—e.g., warn or do not present items withwatermark imitations especially those that a user might mistake forlegitimate.

FIG. 7 illustrates a further alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The rights operation 250 may include atleast one additional operation. The at least one additional operationmay include an operation 252, an operation 254, and/or an operation 256.The operation 252 restricts the authorized program to a read access, awrite access, and/or an update access to the selected watermark. Theoperation 254 limits access to the selected watermark to an operatingsystem. The operation 256 allows an application program authorized by ahuman-user to access the selected watermark.

FIG. 8 illustrates a further alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The rights operation 250 may include atleast one additional operation. The at least one additional operationmay include an operation 258, and/or an operation 262. The operation 258allows access to the selected watermark by an application program, theapplication program including at least one of a browser, a web browser,a word processing program, and/or a database management program. Theoperation 262 allows an operating system and at least one selectedapplication program access to the selected watermark.

FIG. 9 illustrates an alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The integration operation 270 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 272, and/or an operation 274. Theoperation 272 incorporates a human-perceivable manifestation of theselected watermark in each visual area of at least two human-visualareas displaying an output of the authorized program running in thecomputing environment and/or another program running in the computingenvironment. The operation 274 uses an application program interface toincorporate a human-perceivable manifestation of the selected watermarkin each visual area of at least two human-visual areas displaying anoutput of the authorized program running in the computing environment.

FIG. 10 illustrates another alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The integration operation 270 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 276, and/or an operation 278. Theoperation 276 synchronizes a human-visually-differentiable dynamicaspect of the selected watermark when the selected watermark issimultaneously displayed in at least two human-visual areas outputted bythe authorized program running in the computing environment. Forexample, if the selected watermark includes a bouncing icon, thebouncing movement of is synchronized when the selected water mark isdisplayed in two simultaneously displayed windows. The operation 278incorporates a human-perceivable manifestation of the selected watermarkin one visual area of at least two human-visual areas displaying anoutput of the authorized program running in the computing environment inresponse to a mouse-over of a portion of the one visual area.

FIG. 11 illustrates a further alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The integration operation 270 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 282, and/or an operation 284. Theoperation 282 incorporates a human-perceivable manifestation of theselected watermark in one visual area of at least two human-visual areasdisplaying an output of the authorized program running in the computingenvironment in response to a mouse-over of a portion of another visualarea. The operation 284 incorporates a human-perceivable manifestationof the selected watermark in all visual areas displaying an output ofthe authorized program running in the computing environment.

FIG. 12 illustrates an alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The integration operation 270 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 286, and/or an operation 288. Theoperation 286 incorporates a human-perceivable manifestation of theselected watermark in each visual area of a default subgroup of visualareas displaying an output of the authorized program running in thecomputing environment. The operation 288 incorporates ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two popup visual areas displaying an output of theauthorized program running in the computing environment.

FIG. 13 illustrates another alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The integration operation 270 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 292, and/or an operation 294. Theoperation 292 incorporates a human-perceivable manifestation of theselected watermark in each visual area of at least two human-visualareas displaying an output of an operating system running in thecomputing environment. The operation 294 incorporates ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying for human viewing anoutput of the authorized program running in the computing environment.

FIG. 14 illustrates a further alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The integration operation 270 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 296, and/or an operation 298. Theoperation 296 incorporates a human-perceivable manifestation of theselected watermark in each visual area of at least two human-visualareas displaying an output of an application program running in thecomputing environment. The operation 298 incorporates ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output for humanviewing of the authorized program running in the computing environment.

FIG. 15 illustrates an alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The integration operation 270 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 302, and/or an operation 304. Theoperation 302 incorporates a human-perceivable manifestation of theselected watermark in each visual area of at least two human-visualareas displaying an output of the authorized program running in thecomputing environment unless otherwise directed by an operating systemof the computing environment. The operation 304 incorporates ahuman-perceivable manifestation of the selected watermark in eachgraphical display area of at least two display areas displaying anoutput of the authorized program running in the computing environment.

FIG. 16 illustrates another alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The integration operation 270 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 306, and/or an operation 308. Theoperation 306 incorporates a human-perceivable manifestation of theselected watermark in each visual surface of at least two visualsurfaces displaying an output of the authorized program running in thecomputing environment. The operation 308 incorporates ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output andallowing a user input with respect to the authorized program running inthe computing environment.

In an embodiment of the integration operation 270, the selectedwatermark may be incorporated in a window by an operating system and/orthe authorized program. In another embodiment, the selected watermarkmay be visually prominent and located proximate to a feature of awindow, such as next to a “yes” and/or a “no” button of a dialog box. Inanother embodiment, the watermark may include a watermark displayedproximate to or within a dialog box during a mouseover of a genuinedialog box. In a further embodiment, a dialog box changes color and/orcauses a script display, such as a “genuine button” during a mouseover.A color change may be responsive to a trust level of the program thatcaused display of the dialog box. In another embodiment, the operatingsystem causes a user visually-differentiable display during a mouseoverof an image, such as a jpeg, gif, tiff, and/or a bitmap based image whencompared to that displayed during a mouseover of an operating systemgenerated dialog box and/or a dialog box button.

In another embodiment, the selected watermark may be positioned at anysuitable location with respect to a visual area and/or may have anysuitable degree of conspicuousness. For example, the selected watermarkmay be position with respect to a button, a form, a frame, a windowtitle bar, and/or an object title bar. A level of conspicuousness may beunder a user or a configuration control. For example, a novice usermight want a “super secure” setting that placed a visually conspicuouswatermark in all the buttons while an experience user might opt for anembodiment in which a subtle watermark is placed in the corner of thewindow. In a further embodiment, the selected watermark may include avisual watermark, an audio watermark, a tactile, and/or hepaticwatermark.

In a further embodiment, a watermark may include a window, such as apopup window, displayed at least partially contemporaneously withanother window, and/or on top of the window. In an embodiment, awatermark may include at least a portion of a window, another windowdisplayed in a visual combination with the window, and/or on top of thewindow.

FIG. 17 illustrates a further alternative embodiment of the exemplaryoperational flow 200 of FIG. 2. The operational flow may include atleast one additional operation 310. The at least one additionaloperation may include an operation 312, and/or an operation 314. Theoperation 312 suppresses a visual area displaying an output that doesnot include the selected watermark in response to a received ahuman-initiated input. The operation 314 automatically suppresses avisual area displaying an output that does not include the selectedwatermark.

Returning to FIG. 2, an alternative embodiment of the operational flow200 is includes an operational flow 200A. After a start operation, theoperational flow 200A moves to the determination operation 210. Thedetermination operation receives an indication of a selected watermark.The integration operation 270 incorporates incorporating ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output of anauthorized program running in the computing environment. The operationalflow then proceeds to an end operation.

FIG. 18 illustrates an exemplary environment 400 in which an embodimentof the operational flow 200 may be implemented. The exemplaryenvironment includes a computing device 410, a human user interface 436,and a visual display 440. The visual display illustrates a displaysurface 441 that is operable to display an output of an authorizedprogram running in the computing environment. The display surface isalso operable to display at least two human-visual display areas 442 and444. The display areas are illustrated as windows, such as may begenerated by a Microsoft Windows XP operating system or by an Apple MacOS X operating system.

A receiver module 435 of the computing device may receive an indicationof a selected watermark 450. The indication may be responsive to anaction by a human user communicated by the human user interface and/orresponsive to a selection from a watermark library by a program, such asan operating system 412 and/or an application program 420. For purposesof illustration, a human-perceivable manifestation 450A of the selectedwatermark 450 is illustrated as two concentric circles with the name ofa user “Bob” followed by “Watermark” disposed between the concentriccircles. In an alternative embodiment, the selected watermark may be awatermark generated by a watermark generation program that is a part ofan ancillary module 434. An access restrictor module 422 may restrictaccess to the selected watermark to an authorized program running in thecomputing environment, such as the operating system 412 and/or anapplication program 420. The operating system 412 may incorporate ahuman-perceivable manifestation of the selected watermark 450 in eachvisual area of at least two human-visual areas 442 and 444 displaying anoutput of an authorized program running in the computing environment.The user “Bob” will know that a window displayed by the display 440 isauthentic or genuine when the window includes the selected watermark“Bob's Watermark.” Conversely, the user Bob will likewise know that awindow not bearing the selected watermark “Bob's Watermark” was notoutputted by an authorized program. A non-watermarked window or awrongly watermarked window may be bitmap spoofing a legitimate window,or may be a window outputted by an authorized program such a malwareprogram. The absence of the selected watermark is expected to aid theuser Bob in deciding not to interact with a non-watermarked window, andthus not clicking on the non-watermarked window or not entering personalinformation in boxes displayed in a the non-watermarked window that maybe linked to malware.

In an embodiment, the computing device 410 of FIG. 18 includes aninformation store 426 configured by computer program that includescomputer program instructions. The computer program may be included inthe operating system 412 and/or an application program 420. The computerprogram instructions are operable to perform a process in a computerprocessor. The process includes receiving an indication of a selectedwatermark, illustrated as the human-perceivable manifestation 450A ofthe selected watermark 450. The process also includes allowing a controlprogram privileges in the selected watermark. In another embodiment, theallowing a control program privileges may be implemented using theaccess restrictor module 422. The process further includes associating ahuman-perceivable manifestation of the selected watermark with eachvisual area of at least two visual areas 442 and 444 generated for ahuman viewable display of an output of the operating system.

In a further embodiment, the process including receiving an indicationof a selected watermark 450 further includes a process includingreceiving an indication of a selected watermark. The selected watermarkincluding at least one of a user-originated watermark, a user selectedwatermark, a watermark selected by a user from at least two watermarks,a watermark selected by a user from a library of watermarks thatincludes at least two human-differentiable watermarks, a watermarkselected from at least two human-differentiable polymorphic watermarks,a watermark generated in response to an algorithm, and/or a watermarkselected from at least two human-differentiable watermarks in responseto an algorithm. In another embodiment, the process including allowing acontrol program privileges in the selected watermark further includes aprocess including allowing a control program full privileges in theselected watermark and limited privileges in the selected watermark forall other programs. In a further embodiment, the process includingallowing a control program privileges in the selected watermark furtherincludes a process including allowing at least one of an operatingsystem, a database management system, and/or a communications protocolprivileges in the selected watermark.

In an embodiment, the process including allowing a control programprivileges in the selected watermark 450 further includes a processincluding allowing at least one of an operating system, a databasemanagement system, and/or a communications protocol privileges in theselected watermark. In another embodiment, the process includingallowing a control program privileges in the selected watermark furtherincludes a process including allowing a control program full privilegesin the selected watermark and another program a limited privilege in theselected watermark. In a further embodiment, the process includingallowing a control program privileges in the selected watermark furtherincludes a process including allowing a control program full privilegesin the selected watermark and another program a read-only privilege inthe selected watermark. In another embodiment, the process includingallowing a control program privileges in the selected watermark furtherincludes a process including allowing a control program full privilegesin the selected watermark and denying another program privileges in theselected watermark.

In an embodiment, the computing device 410 further includes a displaysurface 441 operable to display each visual area of at least two visualareas 442 and 444 generated for a human viewing of an output of theoperating system 412. In another embodiment, the computing devicefurther includes a human user interface 436 operable to receive anindication of the selected watermark 450 in response to a user action.

FIG. 19 illustrates an exemplary computer program product 500. Thecomputer program product includes a computer-readable signal-bearingmedium 505 bearing computer program instructions 510. The programinstructions are operable to perform a process in a computing device ofa computing environment. The process includes receiving an indication ofa selected watermark, and allowing an operating system privileges in theselected watermark. The process also includes associating a visiblemanifestation of the selected watermark with each visual area of atleast two human-visual areas generated for displaying an output of theoperating system.

In an alternative embodiment, the computer program instructions 510allowing an operating system privileges in the selected watermarkfurther includes allowing an operating system full privileges in theselected watermark. In another alternative embodiment, the computerprogram instructions allowing an operating system privileges in theselected watermark further includes allowing an operating system fullprivileges in the selected watermark and allowing another programlimited privileges in the selected watermark 512. In a furtherembodiment, the computer program instructions the allowing an operatingsystem privileges in the selected watermark further includes allowing anoperating system full privileges in the selected watermark and allowinganother program read-only privileges in the selected watermark 514.

In another embodiment, the computer-readable signal-bearing medium 505includes a computer storage medium 522. In a further embodiment, thecomputer-readable signal-bearing medium includes a communication medium524.

FIG. 20 illustrates an exemplary operational flow 600 implemented in acomputing environment. In an embodiment, the operational flow may beimplemented using the computing system environment 100 of FIG. 1, and/orthe exemplary environment 400 of FIG. 18. After a start operation, theoperational flow 600 moves to an acquiring operation 610. The acquiringoperation receives a designation of an individualized digitalidentifier. A rights management operation 660 restricts access to thedesignated individualized digital identifier to a trusted program. Arelationship operation 680 associates a human-perceptible form of thedesignated individualized digital identifier with each element of agroup of human-perceivable elements displayed in response to the trustedprogram by the computing environment. The operational flow then moves toan end operation.

In an embodiment, the individualized digital identifier may include anyindividualized digital identifier useful to an individual human user inrecognizing an authentic nature of a content, and/or in differentiatingbetween an authentic content and a false, misleading, and/or a spoofedcontent. In another embodiment, the individualized digital identifiermay include a watermark. In a further embodiment, individualized digitalidentifier may include an individualized distinguishing tool. In anembodiment, the individualized digital identifier may include arelatively unique individualized digital identifier. The uniqueindividualized digital identifier may include, a semi-uniqueindividualized digital identifier may include, and/or an individualizeddigital identifier not likely to be at least substantial duplicated by apredetermined percentage of human users. For example, an individualizeddigital identifier may include an individualized digital identifier notlikely to be at least substantially duplicated by no more than 10% ofother digital identifiers. In another embodiment, the individualizeddigital identifier may include an individualized digital identifierhaving at least one of a visual, sound, tactile, and/or haptic aspect.

FIG. 21 illustrates an alternative embodiment of the exemplaryoperational flow 600 of FIG. 20. The acquiring operation 610 may includeat least one additional operation. The at least one additional operationmay include an operation 612, an operation 614, an operation 616, and/oran operation 618. The operation 612 receives a designation of anindividualized digital identifier from a human user. The operation 614receives a designation of an individualized digital identifier from adigital identifier generator. The operation 616 receives a designationof an individualized digital identifier from a digital identifierselection algorithm. The operation 618 receives a designation of anindividualized digital identifier from an operating system.

FIG. 22 illustrates another alternative embodiment of the exemplaryoperational flow 600 of FIG. 20. The acquiring operation 610 may includeat least one additional operation. The at least one additional operationmay include an operation 622, an operation 624, an operation 626, and/oran operation 628. The operation 622 receives a designation of anindividualized digital identifier from the trusted program. Theoperation 624 receives a designation of an individualized digitalidentifier from another program. The operation 626 receives adesignation of at least one of individualized digital identifier useablein a visual display by the computing environment. The operation 628receives a designation of at least one of individualized digitalidentifier useable in an audio display by the computing environment.

FIG. 23 illustrates a further alternative embodiment of the exemplaryoperational flow 600 of FIG. 20. The acquiring operation 610 may includeat least one additional operation. The at least one additional operationmay include an operation 632, an operation 634, an operation 636, and/oran operation 638. The operation 632 receives a designation of an atleast relatively unique digital identifier. The operation 634 receives adesignation of a unique digital identifier. The operation 636 receives adesignation of an individualized digital identifier selected from alibrary of digital identifiers. The operation 638 receives a designationof an individualized digital identifier received from a source.

FIG. 24 illustrates an alternative embodiment of the exemplaryoperational flow 600 of FIG. 20. The acquiring operation 610 may includeat least one additional operation. The at least one additional operationmay include an operation 642, an operation 644, an operation 646, and/oran operation 648. The operation 642 receives a designation of anindividualized digital identifier selected by a human user. Theoperation 644 receives a designation of an individualized digitalidentifier generated by a digital identifier generator module. Theoperation 646 receives a designation of a machine-distinguishableindividualized digital identifier. The operation 648 receives adesignation of a human-distinguishable individualized digitalidentifier.

FIG. 25 illustrates another alternative embodiment of the exemplaryoperational flow 600 of FIG. 20. The rights management operation 660 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 662, an operation 664, and/or anoperation 666. The operation 662 restricts the trusted program to atleast one of a read, a write, and/or an update access to the designatedindividualized digital identifier. The operation 664 restricts access tothe designated individualized digital identifier to an operating systemof the computing environment. The operation 666 restricts access to thedesignated individualized digital identifier to a program trusted by anoperating system running in the computing environment.

FIG. 26 illustrates a further alternative embodiment of the exemplaryoperational flow 600 of FIG. 20. The rights management operation 660 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 668, and/or an operation 672. Theoperation 668 restricts access to the designated individualized digitalidentifier to an application program having a trusted status. Theoperation 672 restricts access to the designated individualized digitalidentifier to an application granted an access right by at least one ofa human user and/or an operating system running in the computingenvironment.

FIG. 27 illustrates an alternative embodiment of the exemplaryoperational flow 600 of FIG. 20. The relationship operation 680 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 682, and/or an operation 684. Theoperation 682 embeds a human-perceivable manifestation of the designatedindividualized digital identifier in each human-perceivable element of agroup of elements displayed in response to the trusted program by thecomputing environment. The operation 684 at least one of visually andproximately associates, and/or aurally and temporally associates ahuman-perceptible form of the designated individualized digitalidentifier with each human-perceivable element of a group of elementsdisplayed in response to the trusted program by the computingenvironment.

FIG. 28 illustrates another embodiment of the exemplary operational flow600 of FIG. 20. The relationship operation 680 may include at least oneadditional operation. The at least one additional operation may includean operation 684, and/or an operation 686. The operation 686incorporates an audio manifestation of the designated individualizeddigital identifier within each human-perceivable element of a group ofelements displayed in response to the trusted program by the computingenvironment. The operation 688 audibly and temporally associates ahuman-perceptible form of the designated individualized digitalidentifier with each human-perceivable element of a group of elementsdisplayed in response to the trusted program by the computingenvironment.

FIG. 29 illustrates a further embodiment of the exemplary operationalflow 600 of FIG. 20. The relationship operation 680 may include at leastone additional operation. The at least one additional operation mayinclude an operation 692, and/or an operation 694. The operation 692associates a human-perceptible form of the designated individualizeddigital identifier in each human-visually perceivable element of a groupof elements displayed in response to the trusted program by thecomputing environment. The operation 694 associates a human-perceptibleform of the designated individualized digital identifier in eachhuman-audibly perceivable element of a group of elements displayed inresponse to the trusted program by the computing environment.

FIG. 30 illustrates an embodiment of the exemplary operational flow 600of FIG. 20. The relationship operation 680 may include at least oneadditional operation. The at least one additional operation may includean operation 696, and/or an operation 698. The operation 696 associatesa human-perceptible form of the designated individualized digitalidentifier with each human-perceivable element of a group of elementsdisplayed in response to the trusted program by the computingenvironment, the group of elements includes at least one of a group ofwindows, a group a content type, a group of a streaming content type, agroup of a presentation type, a group of facsimiles, a group of avatars,a group of gifs, a group of buttons, and/or a group of bitmaps. Theoperation 698 associates a human-perceptible form of the designatedindividualized digital identifier with each human-perceivable element ofa group of elements displayed in response to the trusted program.

FIG. 31 illustrates an alternative embodiment of the exemplaryoperational flow 600 of FIG. 20. The exemplary operational flow 600 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 710. The operation 710 scans anelement displayed by the computing environment for a presence of thedesignated individualized digital identifier; and broadcasts a humanrecognizable notification if the individualized digital identifier isnot associated with the element.

Returning to FIG. 20, an alternative embodiment of the operational flow600 is includes an operational flow 600A. After a start operation, theoperational flow 600 moves to an acquiring operation 610. The acquiringoperation receives a designation of an individualized digitalidentifier. A relationship operation 680 associates a human-perceptibleform of the designated individualized digital identifier with eachelement of a group of human-perceivable elements displayed by thecomputing environment. In an embodiment, the relation operationrespectfully associates a human-perceptible form of the designatedindividualized digital identifier with each element of a group ofhuman-perceivable elements when both the designated individualizeddigital identifier and each element of a group of human-perceivableelements are displayed.

FIG. 32 illustrates an exemplary computing environment 800 in whichembodiments of the operational flow 600 may be implemented. Thecomputing environment includes a computing device 810, a human userinterface 836, and a visual display 840. The visual display may includevisual display of a CRT, a LCD, a laptop display, a desktop monitor,and/or a screen of a portable electronic device, such as a cell phone, apersonal digital assistant, or a Blackberry© RIM. The visual displayillustrates a display surface 841 operable to display an output of atrusted program running in the computing environment. The displaysurface is also operable to display at least one human-perceivableelement, illustrated as a human-visual display area 846. The displayarea is illustrated as a window, such as may be generated by a MicrosoftWindows XP operating system or by an Apple Mac OS X operating system.The computing environment illustrates an example where a Mario Brothericon© Nintendo constitutes a human-perceptible form 850A of the selecteddigital component 850 by the operation 610 of operational flow 600. Forexample, the digital component may have been received from or selectedby a hypothetical human user named “Roy” for illustration purposes.Alternatively, the digital component may have been selected from adigital component library 829 by a digital identifier generator 832. Inanother alternative, the digital identifier generator may have generatedthe particular colors and/or style of the selected digital component. Anenlarged version of the Mario Brother received digital component (icon)850E is provided for additional clarity. The human-perceptible MarioBrother icon is associated with each human-visual display area of agroup of human-visual display areas, for example by placement in a righthand corner of a title bar of the display area 846. By observing theMario Brother icon associated with each element of a group of elements,“Roy” will have information on which he may base a decision whether eachelement is displayed in response to the trusted program by the computingenvironment.

FIG. 33 illustrates an exemplary display environment 900 that may beprovided by the computing environment 800 of FIG. 32. The visual display840 is illustrated as including a visual display surface 941 operable todisplay a window 946 operable to display a group of elements in responseto a trusted program of the computing environment 800. The group ofelements is illustrated as a tree 962, an airplane 964, and a truck 966.In an embodiment, at least one of the elements may be dynamic, such asmoving relative to a plane of the visual display surface, or rotatingabout an axis. For example, the tree may be swaying as if blown by awind, the airplane may move across the window 946 as if flying, and thetruck may move across the window as if being driven. By way of furtherexample, the airplane may also drop bombs (not illustrated). Theselected digital component 850 Mario Brother is associated with eachelement displayed in response to a trusted program running in thecomputing environment. The window 946 displays a Mario Brother icon 850Aassociated in an upper right corner, the tree has a Mario Brother icon850B proximately associated, and the airplane has a Mario Brother icon850C also proximately associated. These associations indicate that theelements are displayed in response to a trusted program. However, thetruck does not have a Mario Brother icon associated with it. Instead, avillain icon 972 from Super Mario Bros.© Nintendo is proximatelydisplayed, indicating to the user “Roy” that the truck is a spoofed or amasquerading element displayed in response to a non-trusted program. Anon-trusted program may be was restricted from accessing the designateddigital component by the rights management operation 660 of theoperational flow 600 described in conjunction with FIG. 20. In anotherembodiment, the truck may not have any digital component associated withit. Such absence of an associated digital component also indicates tothe user “Roy” that the truck is a spoofed or a masquerading elementdisplayed in response to a non-trusted program.

FIG. 34 illustrates an exemplary computing environment 1000 in whichembodiments may be implemented. The computing environment includes acomputing device 1010 coupled with a network, a human user interface1036, an audio display 1038, and a visual display 1040.

The computing device 1010 also includes an information store 1026configurable by a computer program. The computer program may be includedin an operating system 1012, an application program 1020, and/or anotherprogram. The computer program may be a stand-alone program. The computerprogram includes instructions operable to perform a process in aprocessor 1016. The process includes receiving a designation of anindividualized digital identifier. The designation may be received by areceiver module 1035 from any source, including from a user via thehuman user interface 1036, a generator module 1032, and/or a selectormodule. In an embodiment, the process including receiving a designationof an individualized digital identifier further includes a processincluding receiving a designation of at least one of an individualizeddigital visual identifier and/or an individualized digital audioidentifier. The process also includes limiting access to the designatedindividualized digital identifier to an application programminginterface (API's 1014) callable by a privileged code. The limitingaccess may include limiting at least one of a read, a write, and/or anupdate access. The privileged code may include at least one of anoperating system, an application program, and/or an application programgranted an access right by at least one of a user and/or the operatingsystem. The process further includes associating a human-perceptibleform of the designated individualized digital identifier with eachelement of a group of elements displayed in response to a programrunning in the computing device. The visual display includes a displayoperable to present visually each element of the group of elements to ahuman user.

The visual display 1040 may include visual display surface 1041 operableto display an output of a program running in the computing device. Thedisplay surface is also operable to visually present a group of elementsto a human user by at least one human-perceivable area, illustrated as ahuman-visual display area 1046. The computing environment illustrates anexample where the Mario Brother icon constitutes a human-perceptibleform of the designated digital component 850 received by the acquiringoperation 610 of operational flow 600 of FIG. 20. The display area 1046is illustrated as including a Mario Brother 1050A associated with thedisplay area 1046, and a Mario Brother 1050B associated with a tree1062. The display area is also illustrated as including a truck 1066without the designated digital component associated with it.

FIG. 35 illustrates an exemplary computer program product 1110 in whichembodiments may be implemented. The computer program producing includesa computer-readable signal-bearing medium 1105 bearing programinstructions 1110. The program instructions are operable to perform aprocess in a computing device. The process includes receiving adesignation of an individualized digital identifier, and restrictingaccess to the designated individualized digital identifier to anoperating system program. The process also includes associating ahuman-perceptible form of the designated individualized digitalidentifier with each human-perceivable element of a group of elementsdisplayed in response to the operating system program of the computingdevice. In an embodiment, the process including associating ahuman-perceptible form of the designated individualized digitalidentifier with each human-perceivable element of a group of elementsdisplayed in response to the operating system program of the computingdevice further includes a process 1112 including associating ahuman-perceptible form of the designated individualized digitalidentifier with each human-perceivable element of a group of elementsdisplayed in response to the operating system program of the computingdevice, wherein the group of human-perceivable elements displayedincludes at least one of a window, a content, a streaming content, apresentation, a facsimile, an avatar, a gif, a button, and/or a bitmap.

In another embodiment, the computer-readable signal-bearing medium 1105includes a computer storage medium 1122. In a further embodiment, thecomputer-readable signal-bearing medium includes a communication medium1124.

FIG. 36 illustrates an exemplary operational flow 1200 implemented in acomputing environment and operable to practice embodiments. After astart operation, the operational flow includes an acquisition operation1210. The acquisition operation receives an instruction operable tocreate a visual presentation corresponding to a bitmap content. Theacquisition operation may receive the instruction from a remote source,a local source, a computing device, a program, an application program,and/or a program running in the computing environment. The acquisitionoperation may receive the instruction via a network, such as a LAN, aWAN, and/or the Internet. The acquisition operation may receive one ormore instructions which in combination are operable to create a visualpresentation corresponding to a bitmap content. The bitmap content mayinclude digital data that includes an indicium of a digital watermark.The bitmap content may include a representation of a window. The bitmapcontent may include a content, a streaming content, a presentation, afacsimile, an avatar, a gif, a button, and/or a bitmap. The bitmapcontent may include a content having a TIFF, a GIF, a JPEG, and/or a BMPformat.

The operational flow 1200 also includes an inspection operation 1220.The inspection operation determines if the instruction operable tocreate a visual presentation corresponding to a bitmap content includesan instruction operable to create a visual presentation corresponding toa bitmap content having an indicium of a digital watermark. Theoperational flow further includes an effectuation operation 1230. Inresponse to the inspection operation 1220, the effectuation operationinitiates an action with respect to the instruction operable to create avisual presentation corresponding to a bitmap content. The operationalflow moves to an end operation.

The operational flow 1200 may be performed proximate in time to thecomputing environment receiving the instruction operable to create avisual presentation corresponding to a bitmap content, proximate in timeto the computing environment displaying a content responsive to theinstruction operable to create a visual presentation corresponding to abitmap content, or at a time intermediate to the receiving theinstruction and the displaying a content.

FIG. 37 illustrates an alternative embodiment of the exemplaryoperational flow 1200 of FIG. 36. The effectuation operation 1230 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 1232, an operation 1234, and/or anoperation 1236. The operation 1232 initiates a quarantine of theinstruction operable to create a visual presentation corresponding to abitmap content in response to the determining. The operation 1234initiates an exposure of the instruction operable to create a visualpresentation corresponding to a bitmap content to a program associatedwith the computing environment. The operation 1236 initiates ahuman-perceptible indication that a visual presentation of the bitmapcontent is at least unlikely to include a visual presentation of adigital watermark.

FIG. 38 illustrates another alternative embodiment of the exemplaryoperational flow 1200 of FIG. 36. The effectuation operation 1230 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 1238, and/or an operation 1242. Theoperation 1238 initiates a human-perceptible indication that a visualpresentation of the bitmap content is at least likely to include adigital watermark not significantly corresponding with a preselecteddigital watermark associated with the computing environment. Theoperation 1242 initiates a human-perceptible indication that a visualpresentation of the bitmap content will include a digital watermark atleast significantly corresponding with an individualized digitalwatermark associated with the computing environment.

FIG. 39 illustrates an exemplary computing environment 1300 in whichembodiments of the operational flow 1200 of FIG. 36 may be implemented.In addition, the exemplary computing environment illustrates anenvironment in which other embodiments may be implemented. The computingenvironment includes a computing device 1310, a human activatedinterface 1336, an audio display device 1338 illustrated as a speaker,and a visual display device 1370. The computing device includes aninformation store configured by computer program that includes computerprogram instructions. The computer program includes instructionsoperable to perform a process in a computer processor 1316. The processincludes receiving an instruction to create a visual presentationcorresponding to a bitmap content. The process also includes determiningif the instruction to create a visual presentation corresponding to abitmap content includes an instruction to create a visual presentationcorresponding to a bitmap content having an indicium of a digitalwatermark. The process further includes initiating an action withrespect to the instruction to create a visual presentation correspondingto a bitmap content, the action being responsive to the determining.

In another embodiment, the determining process further includes aprocess that determines if the instruction to create a visualpresentation corresponding to a bitmap content includes an instructionto create a visual presentation corresponding to an individualizeddigital watermark associated with the computing device. In a furtherembodiment, the determining process further includes a process thatdetermines if the instruction to create a visual presentationcorresponding to a bitmap content includes an instruction to create avisual presentation corresponding to an individualized digital watermarkassociated with the computing device. The digital watermark may includeat least one of a user-originated digital watermark, a user selecteddigital watermark, a digital watermark selected by a user from at leasttwo digital watermarks, a digital watermark selected by a user from alibrary of digital watermarks that includes at least twohuman-differentiable digital watermarks, a digital watermark selectedfrom at least two human-differentiable polymorphic digital watermarks, adigital watermark generated in response to an algorithm, and/or adigital watermark selected from at least two human-differentiabledigital watermarks in response to an algorithm.

In an embodiment, the process that receives an instruction furtherincludes a process including receive an instruction to create a visualpresentation corresponding to a bitmap content, the instruction tocreate a visual presentation corresponding to a bitmap content includesat least two instruction that in a combination create a visualpresentation corresponding to a bitmap content. In another embodiment,the process that includes initiating an action further includes aprocess including quarantining the instruction to create a visualpresentation corresponding to a bitmap content from a program associatedwith the computing environment. In a further embodiment, the processthat includes initiating an action further includes a process includingallowing at least one of an operating system, a database managementsystem, and/or a communications protocol privileges to the instructionto create a visual presentation corresponding to a bitmap content.

In an embodiment, the process that initiates an action further includesa process including allowing at least one program full privileges to theinstruction to create a visual presentation corresponding to a bitmapcontent and limiting another program's privileges to the instruction tocreate a visual presentation corresponding to a bitmap content. Inanother embodiment, the process that initiates an action furtherincludes a process including exposing the instruction to create a visualpresentation corresponding to a bitmap content to a program associatedwith the computing environment.

In operation, for illustrative purposes a user named “Bill” looking at avisual display surface 1341 of a display device 1340 may see threeelements that include a photograph of a woman sleeping 1371, a window ofhis bank's home page with a watermark 1373, and a window of his bank'shome page 1375 without a watermark. While the three elements might bedisplayed at least simultaneously, in a more likely example, theelements may be displayed sequentially as Bill uses his computer overtime. The photograph of a woman, like most personal photographs, wouldnot expected to include a digital watermark. When Bill views thephotograph of woman, an action is initiated that displays a popup box1372 indicating that the photograph does not contain a digitalwatermark. This indication reflects Bill's expected property of thepersonal photograph. When Bill views the window of his bank's home pagewith a watermark 1373, he may expect to see a watermark. However, anaction is initiated that displays a popup box 1374 warning Bill thatvisual presentation of his bank's home page includes a spoofedwatermark. Bill may use the information provided by the popup box 1374to avoid any interaction with the visual presentation of his bank's homepage. When Bill views the window of his bank's home page without awatermark 1375, he may not notice that his expected digital watermark isabsent. An action is initiated that displays a popup box 1376 warningBill that visual presentation of his bank's home page does not include awatermark. Bill may use the information provided by the popup box 1376to avoid any interaction with the visual presentation of his bank's homepage.

FIG. 40 illustrates an exemplary computer program product 1400 in whichembodiments may be implemented. The computer program product includes acomputer-readable signal-bearing medium 1405 bearing programinstructions 1410. The program instructions are operable to perform aprocess in a computing device of a computing environment. The processincludes receiving an instruction operable to create a visualpresentation corresponding to a bitmap content. The process alsoincludes determining if the instruction operable to create a visualpresentation corresponding to a bitmap content includes an instructionoperable to create a visual presentation corresponding to a bitmapcontent having an indicium of a digital watermark. The process furtherincludes initiating an action with respect to the instruction operableto create a visual presentation corresponding to a bitmap content inresponse to the determining.

In an embodiment, the computer-readable signal-bearing medium 1405includes a computer storage medium 1422. In another embodiment, thecomputer-readable signal-bearing medium includes a communication medium1424.

FIG. 41 illustrates an exemplary operational flow 1500 in whichembodiments may be implemented. After a start operation, the operationalflow moves to an acquisition operation 1510. The acquisition operationreceives an instruction to create a visual presentation corresponding toa bitmap content. An inspection operation 1520 determines if theinstruction to create a visual presentation corresponding to a bitmapcontent includes an instruction to create a visual presentationcorresponding to a bitmap content having an indicium of a digitalwatermark. If the instruction to create a visual presentationcorresponding to a bitmap content does not include an instruction tocreate a visual presentation corresponding to a bitmap content having anindicium of a digital watermark, an effectuation operation 1530 displaysa human-understandable notification reflecting an absence of a digitalwatermark. In an alternative embodiment, the inspection operationdetermines if the instruction to create a visual presentationcorresponding to a bitmap content includes an instruction to create avisual presentation corresponding to a bitmap content having an indiciumof a digital watermark of a group of digital watermarks.

FIG. 42 illustrates an exemplary computing environment 1600 that mayimplement embodiments. The computing environment includes means 1610 forreceiving an instruction to create a visual presentation correspondingto a bitmap content. The computing environment also includes means 1620for determining if the instruction to create a visual presentationcorresponding to a bitmap content includes an instruction to create avisual presentation corresponding to a bitmap content having an indiciumof a digital watermark. The computing environment further includes means1630 for displaying a human-understandable notification reflecting anabsence of a digital watermark if the instruction to create a visualpresentation corresponding to a bitmap content does not include aninstruction to create a visual presentation corresponding to a bitmapcontent having an indicium of a digital watermark.

FIG. 43 illustrates a computer program product 1700 in which embodimentsmay be implemented. The computer program product includes acomputer-readable signal-bearing medium 1705 bearing programinstructions 1710. The program instructions are operable to perform aprocess in a computing device of a computing environment. The processincludes receiving an instruction to create a visual presentationcorresponding to a bitmap content. The processes also includesdetermining if the instruction to create a visual presentationcorresponding to a bitmap content includes an instruction to create avisual presentation corresponding to a bitmap content having an indiciumof a digital watermark. The process further includes displaying ahuman-understandable notification reflecting an absence of a digitalwatermark if the instruction to create a visual presentationcorresponding to a bitmap content does not include an instruction tocreate a visual presentation corresponding to a bitmap content having anindicium of a digital watermark.

In another embodiment, the computer-readable signal-bearing medium 1705includes a computer storage medium 1722. In a further embodiment, thecomputer-readable signal-bearing medium includes a communication medium1724.

FIG. 44 illustrates an exemplary operational flow 1800 implemented in acomputing environment that includes a system digital watermark. Ahuman-perceptible manifestation of the system digital watermark isincorporatable in a displayable content provided by a program running inthe computing environment. After a start operation, the operational flowincludes an acquisition operation 1810. The acquisition operationreceives digital data that includes an instruction to create a visualpresentation corresponding to a bitmap. A decision operation 1820determines if the instruction to create a visual presentationcorresponding to a bitmap includes an instruction to create a visualpresentation corresponding to a bitmap having an indicium of a digitalwatermark. If the decision operation determines that the instruction tocreate a visual presentation corresponding to a bitmap includes aninstruction to create a visual presentation corresponding to a bitmaphaving an indicium of a digital watermark, the operational flow moves toan analysis operation 1830. Otherwise, the operational flow moves to anend operation.

At the analysis operation 1830, a correlation is established between theindicium of a digital watermark and the system digital watermark. Thecorrelation may be established to any desired degree or measure. Forexample, a correlation may be established when there is an at leastsubstantial correlation, i.e., such as a correspondence level of atleast 50% between the indicium of a digital watermark and the systemdigital watermark. In another example, a correlation may be establishedwhen there is a confidence level of at least 30%. In another example, acorrelation may be established when there is a correspondence level ofat least 80% between the indicium of a digital watermark and the systemdigital watermark. A broadcast operation 1850 displays ahuman-understandable information responsive to the determinedcorrelation between the indicium of the digital watermark and the systemdigital watermark. For example, the broadcast operation may display adialog box indicating the digital data includes a visual presentationspoofing the system digital watermark. The operational flow the moves tothe end operation.

FIG. 45 illustrates an alternative embodiment of the operational flow1800 described in conjunction with FIG. 44. The analysis operation 1830may include at least one additional operation. The at least oneadditional operation may include an operation 1832 and/or an operation1834. The operation 1832 establishes a correlation between the indiciumof a digital watermark and a system digital watermark personalized to ahuman user of the computing environment. The operation 1834 establishesa correlation between the indicium of a digital watermark and ahuman-perceptible system digital watermark.

FIG. 46 illustrates a further embodiment of the operational flow 1800described in conjunction with FIG. 44. The analysis operation 1830 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 1836, an operation 1838, and/or anoperation 1842. The operation 1836 establishes a correlation between theindicium of a digital watermark and a human-imperceptible system digitalwatermark. The operation 1838 establishes a correlation between theindicium of a digital watermark and at least one of a selected, areceived, and/or a generated system digital watermark. The operation1842 establishes a correlation between the indicium of a digitalwatermark and a digital watermark associated with a program running inthe computing environment.

FIG. 47 illustrates another embodiment of the operational flow 1800described in conjunction with FIG. 44. The analysis operation 1830 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 1844. The operation 1844 establishesa measure of a correlation between the indicium of a digital watermarkand the system digital watermark. The operation 1844 may include atleast one additional operation. The at least one additional operationmay include an operation 1846, and/or an operation 1848. The operation1848 exposes to the program running in the computing environment thedigital data that includes an instruction to create a visualpresentation corresponding to a bitmap if the determined measure of acorrelation is below a preselected level. The program may include anoperating system and/or a production environment running in thecomputing environment. The operation 1846 isolating from the programrunning in the computing environment the digital data that includes aninstruction to create a visual presentation corresponding to a bitmap ifthe determined measure of a correlation is above a preselected level.

FIG. 48 illustrates an exemplary computer program product 1900 in whichembodiments may be implemented. The computer program product includes acomputer-readable signal-bearing medium 1905 bearing programinstructions 1910. The program instructions are operable to perform aprocess in a computing device. The process includes receiving digitaldata that includes an instruction to create a visual presentationcorresponding to a bitmap. The process also includes determining if theinstruction to create a visual presentation corresponding to a bitmapincludes an instruction to create a visual presentation corresponding toa bitmap having an indicium of a digital watermark. If the instructionto create a visual presentation corresponding to a bitmap includes aninstruction to create a visual presentation corresponding to a bitmaphaving an indicium of a digital watermark, the process establishes acorrelation between the indicium of a digital watermark and a systemdigital watermark of a computing environment that includes the computingdevice. The process also displays a human-understandable informationresponsive to the determined correlation between the indicium of thedigital watermark and the system digital watermark.

In an embodiment, the computer-readable signal-bearing medium 1905includes a computer storage medium 1922. In another embodiment, thecomputer-readable signal-bearing medium includes a communications medium1924.

FIG. 49 illustrates an exemplary computing device 2000 that mayimplement embodiments. The computing device includes means 2010 forreceiving digital data that includes an instruction to create a visualpresentation corresponding to a bitmap. The computing device alsoincludes means 2020 for determining if the instruction to create avisual presentation corresponding to a bitmap includes an instruction tocreate a visual presentation corresponding to a bitmap having anindicium of a digital watermark. The computing device further includesmeans 2030 for establishing a correlation between the indicium of adigital watermark and a system digital watermark of a computingenvironment that includes the computing device. The computing devicealso includes means 2040 for displaying a human-understandableinformation responsive to the determined correlation between theindicium of the digital watermark and the system digital watermark.

It will be understood by those skilled in the art that the variouscomponents and elements disclosed herein and in the drawings, as well asthe various steps and substeps disclosed herein and in the drawings, maybe incorporated together in different combinations to implementembodiments and enhance possible benefits and advantages. The exemplarysystem, apparatus, and computer program product embodiment disclosedherein, including FIGS. 1, 18, 19, 32-35, 39-40, 42-43, and 48-49, alongwith other components, devices, know-how, skill, and techniques that areknown in the art have a capability of implementing and practicingmethods and process illustrated in FIGS. 2-17, 20-31, 36-38, 41, and44-47. It is to be understood that the methods and processes can beincorporated in one or more different types of computer program productswith a carrier medium having program instructions encoded thereon.However, it is to be further understood by those skilled in the art thatother systems, apparatus, and technology may be used to implement andpractice such methods and processes.

The foregoing detailed description has set forth various embodiments ofthe devices and/or processes via the use of block diagrams, flowdiagrams, operation diagrams, flowcharts, illustrations, and/orexamples. Insofar as such block diagrams, operation diagrams,flowcharts, illustrations, and/or examples contain one or more functionsand/or operations, it will be understood that each function and/oroperation within such block diagrams, operation diagrams, flowcharts,illustrations, or examples can be implemented, individually and/orcollectively, by a wide range of hardware, software, firmware, orvirtually any combination thereof unless otherwise indicated. Aparticular block diagram, operation diagram, flowchart, illustration,environment, and/or example should not be interpreted as having anydependency or requirement relating to any one or combination ofcomponents illustrated therein. For example, in certain instances, oneor more elements of an environment may be deemed not necessary andomitted. In other instances, one or more other elements may be deemednecessary and added.

Those having skill in the art will recognize that the state of the arthas progressed to the point where there is little distinction leftbetween hardware and software implementations of aspects of systems; theuse of hardware or software is generally (but not always, in that incertain contexts the choice between hardware and software can becomesignificant) a design choice representing cost vs. efficiency tradeoffs.Those having skill in the art will appreciate that there are variousvehicles by which processes and/or systems and/or other technologiesdescribed herein can be effected (e.g., hardware, software, and/orfirmware), and that the preferred vehicle will vary with the context inwhich the processes and/or systems and/or other technologies aredeployed. For example, if an implementer determines that speed andaccuracy are paramount, the implementer may opt for a mainly hardwareand/or firmware vehicle; alternatively, if flexibility is paramount, theimplementer may opt for a mainly software implementation; or, yet againalternatively, the implementer may opt for some combination of hardware,software, and/or firmware. Hence, there are several possible vehicles bywhich the processes and/or devices and/or other technologies describedherein may be effected, none of which is inherently superior to theother in that any vehicle to be utilized is a choice dependent upon thecontext in which the vehicle will be deployed and the specific concerns(e.g., speed, flexibility, or predictability) of the implementer, any ofwhich may vary. Those skilled in the art will recognize that opticalaspects of implementations will typically employ optically-orientedhardware, software, and or firmware.

In addition, those skilled in the art will appreciate that themechanisms of the subject matter described herein are capable of beingdistributed as a program product in a variety of forms, and that anillustrative embodiment of the subject matter described herein appliesequally regardless of the particular type of signal-bearing media usedto actually carry out the distribution. Examples of a signal-bearingmedia include, but are not limited to, the following: recordable typemedia such as floppy disks, hard disk drives, CD ROMs, digital tape, andcomputer memory; and transmission type media such as digital and analogcommunication links using TDM or IP based communication links (e.g.,packet links).

It will be understood by those within the art that, in general, termsused herein, and especially in the appended claims (e.g., bodies of theappended claims) are generally intended as “open” terms (e.g., the term“including” should be interpreted as “including but not limited to,” theterm “having” should be interpreted as “having at least,” the term“includes” should be interpreted as “includes but is not limited to,”etc.). It will be further understood by those within the art that if aspecific number of an introduced claim recitation is intended, such anintent will be explicitly recited in the claim, and in the absence ofsuch recitation no such intent is present. For example, as an aid tounderstanding, the following appended claims may contain usage of theintroductory phrases “at least one” and “one or more” to introduce claimrecitations. However, the use of such phrases should not be construed toimply that the introduction of a claim recitation by the indefinitearticles “a” or “an” limits any particular claim containing suchintroduced claim recitation to inventions containing only one suchrecitation, even when the same claim includes the introductory phrases“one or more” or “at least one” and indefinite articles such as “a” or“an” (e.g., “a” and/or “an” should typically be interpreted to mean “atleast one” or “one or more”); the same holds true for the use ofdefinite articles used to introduce claim recitations. In addition, evenif a specific number of an introduced claim recitation is explicitlyrecited, those skilled in the art will recognize that such recitationshould typically be interpreted to mean at least the recited number(e.g., the bare recitation of “two recitations,” without othermodifiers, typically means at least two recitations, or two or morerecitations). Furthermore, in those instances where a conventionanalogous to “at least one of A, B, and C, etc.” is used, in generalsuch a construction is intended in the sense one having skill in the artwould understand the convention (e.g., “a system having at least one ofA, B, and C” would include but not be limited to systems that have Aalone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.). In those instances where aconvention analogous to “at least one of A, B, or C, etc.” is used, ingeneral such a construction is intended in the sense one having skill inthe art would understand the convention (e.g., “a system having at leastone of A, B, or C” would include but not be limited to systems that haveA alone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.).

The herein described aspects depict different components containedwithin, or connected with, different other components. It is to beunderstood that such depicted architectures are merely exemplary, andthat in fact many other architectures can be implemented which achievethe same functionality. In a conceptual sense, any arrangement ofcomponents to achieve the same functionality is effectively “associated”such that the desired functionality is achieved. Hence, any twocomponents herein combined to achieve a particular functionality can beseen as “associated with” each other such that the desired functionalityis achieved, irrespective of architectures or intermedial components.Likewise, any two components so associated can also be viewed as being“operably connected,” or “operably coupled,” to each other to achievethe desired functionality. Any two components capable of being soassociated can also be viewed as being “operably couplable” to eachother to achieve the desired functionality. Specific examples ofoperably couplable include but are not limited to physically mateableand/or physically interacting components and/or wirelessly interactableand/or wirelessly interacting components.

While various aspects and embodiments have been disclosed herein, otheraspects and embodiments will be apparent to those skilled in the art.The various aspects and embodiments disclosed herein are for purposes ofillustration and are not intended to be limiting, with the true scopeand spirit being indicated by the following claims.

1. A method implemented in a computing environment, the methodcomprising: receiving an indication of a selected watermark; andincorporating a human-perceivable manifestation of the selectedwatermark in each visual area of at least two human-visual areasdisplaying an output of an authorized program running in the computingenvironment.
 2. A method implemented in a computing environment, themethod comprising: receiving an indication of a selected watermark;restricting access to the selected watermark to an authorized programrunning in the computing environment; and incorporating ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output of theauthorized program.
 3. The method of claim 2, wherein the receiving anindication of a selected watermark further includes: receiving auser-originated watermark.
 4. The method of claim 2, wherein thereceiving an indication of a selected watermark further includes:receiving an indication of a user selected watermark.
 5. The method ofclaim 2, wherein the receiving an indication of a selected watermarkfurther includes: receiving an indication of a watermark selected by auser from at least two watermarks.
 6. (canceled)
 7. The method of claim2, wherein the receiving an indication of a selected watermark furtherincludes: receiving an indication of a watermark selected by a user froma library of watermarks that includes at least two human-differentiablewatermarks.
 8. (canceled)
 9. The method of claim 2, wherein thereceiving an indication of a selected watermark further includes:receiving an indication of a selection of a watermark generated inresponse to an algorithm.
 10. The method of claim 2, wherein thereceiving an indication of a selected watermark further includes:selecting a watermark from at least two human-differentiable watermarksin response to an algorithm.
 11. The method of claim 2, wherein thereceiving an indication of a selected watermark further includes:receiving an indication of a selected watermark, the selected watermarkincluding at least one of a human-differentiable visible watermarkand/or human-differentiable audible watermark.
 12. The method of claim2, wherein the receiving an indication of a selected watermark furtherincludes: receiving an indication of a selected watermark, the selectedwatermark including an icon.
 13. The method of claim 2, wherein thereceiving an indication of a selected watermark further includes:receiving an indication of a selected watermark, the selected watermarkincluding at least one of a visual aspect, an acoustical aspect, a username, a biometric identifier, a fingerprint, a word, a symbol, agraphic, a picture, and/or an avatar.
 14. The method of claim 2, whereinthe receiving an indication of a selected watermark further includes:receiving an indication of a selected watermark, the selected watermarkincluding an image having a variation.
 15. The method of claim 2,wherein the receiving an indication of a selected watermark furtherincludes: receiving an indication of a selected watermark, the selectedwatermark including at least one of a temporal variation, a randomvariation, a pseudo random variation, a movement variation, a rotation,a rotation variation, a shape variation, a color variation, aperspective variation, a size variation, and/or a feature variation. 16.The method of claim 2, wherein the restricting access to the selectedwatermark to an authorized program running in the computing environmentfurther includes: restricting the authorized program to a read access, awrite access, and/or an update access to the selected watermark.
 17. Themethod of claim 2, wherein the restricting access to the selectedwatermark to an authorized program running in the computing environmentfurther includes: limiting access to the selected watermark to anoperating system.
 18. The method of claim 2, wherein the restrictingaccess to the selected watermark to an authorized program running in thecomputing environment further includes: allowing an application programauthorized by a human-user access to the selected watermark.
 19. Themethod of claim 2, wherein the restricting access to the selectedwatermark to an authorized program running in the computing environmentfurther includes: allowing access to the selected watermark by anapplication program, the application program including at least one of abrowser, a web browser, a word processing program, and/or a databasemanagement program.
 20. The method of claim 2, wherein the restrictingaccess to the selected watermark to an authorized program running in thecomputing environment further includes: allowing an operating system andat least one selected application program access to the selectedwatermark.
 21. The method of claim 2, wherein the incorporating ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output of theauthorized program running in the computing environment furtherincludes: incorporating a human-perceivable manifestation of theselected watermark in each visual area of at least two human-visualareas displaying an output of the authorized program running in thecomputing environment and/or another program running in the computingenvironment.
 22. The method of claim 2, wherein the incorporating ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output of theauthorized program running in the computing environment furtherincludes: using an application program interface to incorporate ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output of theauthorized program running in the computing environment.
 23. The methodof claim 2, wherein the incorporating a human-perceivable manifestationof the selected watermark in each visual area of at least twohuman-visual areas displaying an output of the authorized programrunning in the computing environment further includes: synchronizing ahuman-visually-differentiable dynamic aspect of the selected watermarkwhen the selected watermark is simultaneously displayed in at least twohuman-visual areas outputted by the authorized program running in thecomputing environment.
 24. The method of claim 2, wherein theincorporating a human-perceivable manifestation of the selectedwatermark in each visual area of at least two human-visual areasdisplaying an output of the authorized program running in the computingenvironment further includes: incorporating a human-perceivablemanifestation of the selected watermark in one visual area of at leasttwo human-visual areas displaying an output of the authorized programrunning in the computing environment in response to a mouse-over of aportion of the one visual area.
 25. The method of claim 2, wherein theincorporating a human-perceivable manifestation of the selectedwatermark in each visual area of at least two human-visual areasdisplaying an output of the authorized program running in the computingenvironment further includes: incorporating a human-perceivablemanifestation of the selected watermark in one visual area of at leasttwo human-visual areas displaying an output of the authorized programrunning in the computing environment in response to a mouse-over of aportion of another visual area.
 26. The method of claim 2, wherein theincorporating a human-perceivable manifestation of the selectedwatermark in each visual area of at least two human-visual areasdisplaying an output of the authorized program running in the computingenvironment further includes: incorporating a human-perceivablemanifestation of the selected watermark in all visual areas displayingan output of the authorized program running in the computingenvironment.
 27. (canceled)
 28. The method of claim 2, wherein theincorporating a human-perceivable manifestation of the selectedwatermark in each visual area of at least two human-visual areasdisplaying an output of the authorized program running in the computingenvironment further includes: incorporating a human-perceivablemanifestation of the selected watermark in each visual area of at leasttwo popup visual areas displaying an output of the authorized programrunning in the computing environment.
 29. The method of claim 2, whereinthe incorporating a human-perceivable manifestation of the selectedwatermark in each visual area of at least two human-visual areasdisplaying an output of the authorized program running in the computingenvironment further includes: incorporating a human-perceivablemanifestation of the selected watermark in each visual area of at leasttwo human-visual areas displaying an output of an operating systemrunning in the computing environment.
 30. (canceled)
 31. (canceled) 32.The method of claim 2, wherein the incorporating a human-perceivablemanifestation of the selected watermark in each visual area of at leasttwo human-visual areas displaying an output of the authorized programrunning in the computing environment further includes: incorporating ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output for humanviewing of the authorized program running in the computing environment.33. The method of claim 2, wherein the incorporating a human-perceivablemanifestation of the selected watermark in each visual area of at leasttwo human-visual areas displaying an output of the authorized programrunning in the computing environment further includes: incorporating ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output of theauthorized program running in the computing environment unless otherwisedirected by an operating system of the computing environment.
 34. Themethod of claim 2, wherein the incorporating a human-perceivablemanifestation of the selected watermark in each visual area of at leasttwo human-visual areas displaying an output of the authorized programrunning in the computing environment further includes: incorporating ahuman-perceivable manifestation of the selected watermark in eachgraphical display area of at least two display areas displaying anoutput of the authorized program running in the computing environment.35. The method of claim 2, wherein the incorporating a human-perceivablemanifestation of the selected watermark in each visual area of at leasttwo human-visual areas displaying an output of the authorized programrunning in the computing environment further includes: incorporating ahuman-perceivable manifestation of the selected watermark in each visualsurface of at least two visual surfaces displaying an output of theauthorized program running in the computing environment.
 36. The methodof claim 2, wherein the incorporating a human-perceivable manifestationof the selected watermark in each visual area of at least twohuman-visual areas displaying an output of the authorized programrunning in the computing environment further includes: incorporating ahuman-perceivable manifestation of the selected watermark in each visualarea of at least two human-visual areas displaying an output andallowing a user input with respect to the authorized program running inthe computing environment.
 37. The method of claim 2, furthercomprising: in response to a received a human-initiated input,suppressing a visual area displaying an output that does not include theselected watermark.
 38. The method of claim 2, further comprising:automatically suppressing a visual area displaying an output that doesnot include the selected watermark.
 39. A computing device comprising:an information store configured by computer program that includescomputer program instructions; and the computer program instructionsbeing operable to perform a process in a computer processor, the processincluding: receiving an indication of a selected watermark; allowing acontrol program privileges in the selected watermark; and associatinghuman-perceivable manifestation of the selected watermark with eachvisual area of at least two visual areas generated for a human viewabledisplay of an output of the operating system.
 40. The device of claim39, wherein the process including receiving an indication of a selectedwatermark further includes: a process including receiving an indicationof a selected watermark, the selected watermark including at least oneof a user-originated watermark, a user selected watermark, a watermarkselected by a user from at least two watermarks, a watermark selected bya user from a library of watermarks that includes at least twohuman-differentiable watermarks, a watermark selected from at least twohuman-differentiable polymorphic watermarks, a watermark generated inresponse to an algorithm, and/or a watermark selected from at least twohuman-differentiable watermarks in response to an algorithm.
 41. Thedevice of claim 39, wherein the process including allowing a controlprogram privileges in the selected watermark further includes: a processincluding allowing a control program full privileges in the selectedwatermark and limited privileges in the selected watermark for all otherprograms.
 42. The device of claim 39, wherein the process includingallowing a control program privileges in the selected watermark furtherincludes: a process including allowing at least one of an operatingsystem, a database management system, and/or a communications protocolprivileges in the selected watermark.
 43. The device of claim 39,wherein the process including allowing a control program privileges inthe selected watermark further includes: a process including allowing atleast one of an operating system, a database management system, and/or acommunications protocol privileges in the selected watermark.
 44. Thedevice of claim 39, wherein the process including allowing a controlprogram privileges in the selected watermark further includes: a processincluding allowing a control program full privileges in the selectedwatermark and another program a limited privilege in the selectedwatermark.
 45. The device of claim 39, wherein the process includingallowing a control program privileges in the selected watermark furtherincludes: a process including allowing a control program full privilegesin the selected watermark and another program a read-only privilege inthe selected watermark.
 46. The device of claim 39, wherein the processincluding allowing a control program privileges in the selectedwatermark further includes: a process including allowing a controlprogram full privileges in the selected watermark and denying anotherprogram privileges in the selected watermark.
 47. The device of claim39, further comprising: a display surface operable to display eachvisual area of at least two visual areas generated for a human viewingof an output of the operating system.
 48. The device of claim 39,further comprising: a user interface operable to receive an indicationof the selected watermark in response to a user action.
 49. A computerprogram product comprising: (a) program instructions operable to performa process in a computing device of a computing environment, the processincluding: receiving an indication of a selected watermark; allowing anoperating system privileges in the selected watermark; and associating avisible manifestation of the selected watermark with each visual area ofat least two human-visual areas generated for displaying an output ofthe operating system; and (b) a computer-readable signal-bearing mediumbearing the program instructions.
 50. The computer program product ofclaim 49, wherein the allowing an operating system privileges in theselected watermark further includes: allowing an operating system fullprivileges in the selected watermark.
 51. The computer program productof claim 49, wherein the allowing an operating system privileges in theselected watermark further includes: allowing an operating system fullprivileges in the selected watermark and allowing another programlimited privileges in the selected watermark.
 52. The computer programproduct of claim 49, wherein the allowing an operating system privilegesin the selected watermark further includes: allowing an operating systemfull privileges in the selected watermark and allowing another programread-only privileges in the selected watermark.
 53. The computer programproduct of claim 49, wherein the computer-readable signal-bearing mediumincludes a computer storage medium.
 54. The computer program product ofclaim 49, wherein the computer-readable signal-bearing medium includes acommunication medium.