throbber
IIIMIIIIIIIIIIII
`
`US'U'U'5629930A
`
`United States Patent
`
`[191
`
`[11] Patent Number:
`
`5,629,980
`
`Stefik et al.
`
`145] Date of Patent:
`
`May 13, 1997
`
`Weber. R.. "Digital Rights Management Technology”. Oct.
`1995.
`
`European Search Report for Conesponding European Appli-
`cation 953084203.
`
`(List continued on next page.)
`
`Primary .E:arm'ner—Sa1vatoIe Cangialosi
`Axioms}; Agent, or F':'rm—Richa.rd B. Domingo
`
`[57]
`
`ABSTRACT
`
`A system for controlling use and clistribulion of digital
`works. In the present invention. the owner of a digital work
`attaches usage rights to that work. Usage rights are granted
`by the “owner" of a digital work to “buyers” of the digital
`work. The usage tights define how a digital work may be
`used and further distributed by the buyer. Each right has
`associated with it certain optional specifications which out-
`line the conditions and fees upon which the right may be
`exercised. Digital works are stored in a repository. Arcposi-
`tory will process each request to access a digital work by
`examining the corresponding usage rights. Digital work
`playback devices, coupled to the repository containing the
`work. are used to play. display or print the work. Access to
`digital works for the purposes of transporting between
`repositories (e.g. copying. borrowing or transfer) is carried
`out using a digital work transport protocol. Access to digital
`works for the purposes of replay by :1 digital work playback
`device (eg. printing. displaying or executing) is carried out
`using a digital work playback protocol.
`
`31 Claims, 13 Drawing Sheets
`
`[54] SYSTEM FOR CONTROLLING THE
`DISTRIBUTION AND USE OF DIGITAL
`WORKS
`
`[75]
`
`Inventors: Mark J. Stefik. Woodside; Michalene
`M. Casey. Morgan Hill, both of Calif;
`
`[73] Assignee: Xerox Corporation. Stamford. Conn.
`
`[2]] Appl. No.: 344,042
`
`[22] Filed:
`
`Nov. 23, 19913
`
`........... HML N00
`..............
`Int. CL6
`[51]
`[52] US. Cl. .................................................................. 380M
`[53] Field of Search
`380M; 235.3330
`
`[56]
`
`References Cited
`
`U.S. Pfi£]'E.N'I' DOCUMENTS
`
`3,263,158
`4,529,870
`4.658.093
`4,924,378
`
`‘H1966 Janis
`7.31935 Chaum . . . . .
`4./1987 Hellman
`50990 Hersheyetal.
`
`....Hm...
`
`..
`
`
`
`380.34
`2351380
`... 330125
`364J200
`
`(List confinued on next page.)
`
`FOREIGN PATENT DOCUMENTS
`
`{H1989 European Pat. Off. _
`033270’!
`‘H1991 United Kingdom.
`2236603
`WOEEZCIIHZ lU199Q WIPO .
`9301550
`H1993 WIFO ............................. GUGF ll/34
`
`UTHER PUBLICATIONS
`
`Press Release From Eleccronic Publishing Resources. Inc.
`(EPR) entitled “National Semiconductor and EPR Partner
`for Information Metering,-‘Data Security Cards”. dated Mar.
`4. 1994.
`
`Outer cmmau
`
`I‘
`
`It
`--
`
`.
`h
`nvpwtedtn auoofllmry I
`”“°t‘.$:'i‘u'§§'.‘A'i“ '°
`
`
`
`Ropes‘-to
`1 lull:-‘nun
`SI-Juan Wn Iluooiilery I
`
`1'52
`
`I
`
`Bu
`lefloiitnry 2
`I
`art {or
`Muss Ta
`Aim Purpeil
`
` *9‘
`
`
`III Dollie
`I Cltlfii USIQI
`liver! In
`Riollll
`D‘
`
`
`
`Dlllrmlllnd Incest I-lay
`Bu Granted
`
`
`
`
`he
`he
`.
`Rep
`3!
`11'
`'IS
`3‘ in w..'i"r’..""
`
`Tlfmlglfifih Elihu
`,
`wan Emu
`uposhoryz
`
`
`fluwtilonl 1 and 2 Each
`firlnrlu Billing
`automation and ‘transmit
`to Oldirsnrvut
`
` T Exhibit 1005
`Page 00001
`
`
`Page 00001
`
`Apple Exhibit 1005
`
`

`
`5,629,980
`Page 2
`
`Hilts, P.. Mutter. 1., 1mdTaylor_. 3., “BOOKS While Uwait."
`Publishers Weekly Jan. 3, 1994. pp. 43-50.
`Strattner, .51.. “Cash register on a chip may revolutionize
`software pricing and distribution; Wave Systems Corp,"
`Computer Shopper: Copyright. Apr. 1994, vol. 14; No. 4:13.
`62; ISSN 0336-0556.
`
`O’Conncr. M.A.. “New distribution option for electronic
`pub1.ishers;iOpener data encryption andtnetering system for
`CD—ROM use; Colllmn.” C.‘D—ROM Professional. Copy-
`right. Mar. 1994, vol. 7: No. 2; p. 134; ISSN: 1049-0333.
`Willett, S._. “Metered PCS: Is your system watching you?;
`Wave Systems beta tests new technology,“ tnfowortd. Copy-
`right. Mny 2. 1994, p. 34.
`Linn. R..l.. "Copyright and Information Services in the
`Context of the National Research and. Education Networ
`."
`{MA Inreifectuoi Properly Project Proceedings; Ian. 1994.
`vol. 1. Issue 1. pp. 9-20.
`enitt, .11.. 11.11.. “Penniss.ions Headers and Contract Law.”
`IMA Intellectual Property Project Proceedings. Jan. 1994..
`vol. 1. Issue 1. pp. 2748.
`Upthegrove. L.. and Roberts. 12.. “Intellectual Property
`Header Descriptors: A Dynamic Approach.” MM In:etter.--
`tual Property Project Proceedings, Jan. 1994. vol. 1, Issue
`1, pp. 63-66.
`Sirbu. M.A.. "Inte1:11et Billing Service Design and Prototype
`Implementation." [MA Intellectual Property Project Pro-
`ceedings, Jan. 1994. VOL 1. Issue 1. pp. 67-80.
`Simmfll. 35.. and Godard, I.. “Metering and Licensing of
`Resources: Kala‘.-3 General Purpose Approach." IMA Intel-
`Iectuoi Prqoerry Project Proceedings, Jan. 1994. vol. 1,
`Issue 1. pp. 81-110.
`Kahn, R.E., “Deposit. Registration and Reccxrdation in an
`Electronic Copyright Management System." {MA Intellec-
`mo! Property Project Proceeofings, Jan. 1994. vol. 1, Issue
`1. pp. 111-120.
`Tfifgar. 1.13.. and Bonnet. Y.. “Dyed: A System for Using
`Physically Secure Coprooessors." [MA Intellectual Property
`Project Proceedings, Jan. 1994. vol. 1. Issue 1. pp. 121-152.
`Griswold. G.N.. “A Method for Protecting Copyxight on
`Networks." {MA Inteiiecntal Property Project Proceedings.
`Jan. 1994. vol. 1. Issue 1. pp. 169-173.
`Nelson. T.}I.. "A Publishing and Royalty Model for Net-
`worked Documents." IMA Intellectual Property Project Pro-
`ceedings, Jan. 1994. Vol. 1. Issue 1. 1313. 257-259.
`
`Page 00002
`
`U.S. PA'I'l1NT DOCUMENTS
`
`.....
`
`
`
`.
`.
`
`.
`
`.
`
`..
`
`33014
`33014
`3s0r23
`.. 36421103
`..
`
`38014
`3641900
`380!!!
`. 36-M106
`. 380125
`
`38034
`3951500
`- 330123
`2351492
`2351379
`350:4
`33014
`3309
`
`611990 Chouetal.
`4,932,054
`
`6.-‘I990
`4,937,353
`311990 Ryder,Sr.eta1.
`4,953,209
`4,951,142 1011990 El1io11etnl....
`4,9')'7.S94 1211990 Shear .........
`5,010,571
`-1-/1991 Katznelson ........
`5,014,234
`531991 Edwards. .11:
`.....
`5,093,913”
`611991 Iohnsou at al. ..
`5,041,923
`941991 Vfiedemer
`5,050.21}
`911991 Shear
`5,058,164 IOJ199l Blrneretal
`5,103,476
`4/I992 Waiteetal.
`5,113,519
`511992 Johnsonetal. ._
`5,145,499
`911992 Geflfrolin ..........
`5,159,132 1011992 Eiseie ...........
`5.191393
`311993 I..eRoux
`5204,39?
`411993 Wyman.
`5,235,642
`1111993 Wolaberetnl.
`5247575
`911993 Sprnglteetal.
`5,260,999 1111993 Wymnn
`5,263,151
`1111993 Janis ..
`3951600
`5,291,596
`SII994 Mila
`345/104
`5,339,091
`811.994 Yamnzalci et 91.
`. 33014
`5,432,849
`‘H1995 Jolinsonet al. ....
`380.-‘4
`5,438,508
`B11995 Wyman
`...... 380.14
`5,504,314
`411996 Miyahaxa .. .
`5530.235 V1996 Stefik et al.
`............................ 235880
`
`OTHER PUBLICATIONS
`
`U. Flasche et al._. Decentralized Processing of Documents.
`Camput. & Grophicx, vol. 10. No. 2. 1986. pp. 119-131.
`R. Mari e! 111., Superdistfibufion: The Concept and the
`Architecture. The Transactions of the IEICE, vol. 13 '13. No.
`'1'. 1990, Tokyo, JP, pp. 1133-1146".
`Weber, R.. "Metering Technologies For Digital Intellectual
`P.ropetty." A Report to the Interrtotionoi Federation of
`Repracfiacrion Rights Organizofions, Oct. 1994. pp. 1-29.
`Clark. EC. and Hoifinnn. LJ.. "Bits: A Smartcard Protected
`Operating System." Communications of the ACM, Nov.
`1994, vol. 37. No. 11. pp. 66-70.. and 94.
`Ross. P.E.. "D9111 guard”. Forbes, Jun. 6. 1994, p. 101,
`Saigh, W.K.. “Knowledge is Sacred." Video Poclcet/Page
`Reader Systems, Ltd, 1992.
`Kahn, R.E.. "Deposit, Registration and Recordnlion In An
`Electronic Copyright Management System,” Corporation
`for National Research initiatives. Virginia. Aug. 1992. pp.
`1-19.
`
`
`Page 00002
`
`

`
`U.S. Patent
`
`May 13,1997
`
`Sheet 1 of 13
`
`5,629,980
`
`10'!
`
`
`
`Creator Creates A
`Digital Work
`
`
`
`_
`Usage Rights Attached To
`Digital Work and
`Deposited In Repository 1
`
`
`
` Repository 2 Initiates A
`Session With Repository 1
`
`103
`
`
`Repository 2 Requests
`Access To Digital Work for
`A State Purpose
`
`104
`
`
`
`
` Repository 1 Checks Usage
`
`Rights of Digital Work To
`
`Determined If Access May
`Be Granted
`
`105
`
`102
`
`
`
`Access Denied
`
`Access Granted
`
`
`
`
`1 Transmits
`Repositor
`Digita Work To
`Repository 2
`
`
`
`Repository 1
`Terminates Session
`with Error
`
`
`
`Page 00003
`
`
`Repository‘! and 2 Each
`Generate Billing
`Information And Transmit
`
`To Credit Server
`
`
`
`
`
`Fig. 1
`
`
`Page 00003
`
`

`
`U.S. Patent
`
`may 13,1997
`
`Sheet 2 of 13
`
`5,629,980
`
`-
`Master
`I
`I Repository
`
`1
`5
`:
`
`Authorization
`Repository
`202
`
`Repository
`
`1
`-
`E
`Billing
`I
`I Clearinghouse .
`I
`303
`I
`
`I
`
`Page 00004
`
`
`Page 00004
`
`

`
`U.S. Patent
`
`May 13,1997
`
`Sheet 3 of 13
`
`5,629,980
`
`I ““““““““““““““““ " '” ‘I
`I
`I
`I
`I
`I
`I
`I
`.
`I
`1
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`In. _ — — — . _ _ _ _ _ _ _ _ _ , _ _ _ _ _ _ _ _ _ _ _ .1
`
`
`
`
`
`.
`Printer
`Repository
`402
`
`
`
`Repository
`404
`
`
`
`
`Page 00005
`
`
`
`Dis play!
`
`Execution
`
`Repository
`
`41 ‘I
`
`
`
`Execution
`
`Engine
`413
`
`41 5
`
`Repository
`
`
`Page 00005
`
`

`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 4 of 13
`
`5,629,980
`
`0
`
`20.000
`
`40.000
`
`60.000
`
`80,000
`
`
`
`Fig. 5
`
`0
`
`10,000
`
`30,000
`
` Text
`
`614
`
`Photo
`615
`
`Graphics
`616
`
`Sidebar
`61?
`
`Fig. 6
`
`1
`
`Page 00006
`
`
`Page 00006
`
`

`
`US. Patent
`
`May 13, 1997
`
`Sheet 5 of 13
`
`5,629,980
`
`700
`
`
`
`
`
`
`
`IIIIII
`
`Identifier
`701
`
`Sta rting Address
`702
`
`Length
`703
`
`Rights Portion
`704
`
`Parent Pointer
`705
`
`Child Pointer
`706
`
`
`
`
`
`
`
`
`
`Child Pointer
`706
`
`Fig. 7
`
`Top
`d-block
`820
`
`
`
`Fig. 8
`
`
`
`d-biock
`928
`(Sidebar)
`
`Fig. 9
`
`1
`
`Page 00007
`
`
`Page 00007
`
`

`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 6 of 13
`
`5,629,980
`
`1052
`
`Status
`Information
`
`Fig. 10
`
`Transactional
`Component
`1451
`
`Specification
`Component
`1452
`
`Copy Count
`1453
`
`Control
`1457
`
`
`
`
`Feesilncentives
`1454
`
`
`
`1456
`
`Fig. 14
`
`Page 00008
`
`
`Page 00008
`
`

`
`U.S. Patent
`
`May 13,1997
`
`Sheet 7 of 13
`
`5,629,980
`
`Identifier (Magazine)
`
`Starting Address (0)
`
`Length (100,000)
`4
`_
`Rig hts Portion
`(PRINTNIEW)
`
`Parent Pointer
`
`Child Pointers
`
`root
`d-block
`1 101
`
`P1
`
`
`
`
`
`
`
`
`
`
`Rights Portion
`
`d-block
`1 1 02
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identifier (Article 2)
`
`Starting Address (25,001)
`
`Length (25,000)
`
`Rights Portion
`(PRINTNIEW)
`
`Parent Pointer
`
`Child Pointers
`
`d-block
`1105
`
`Page 00009
`
`
`
`
`
`Identifier (Article 4)
`
`Starting Address (75,001)
`
`Length (25,000)
`
`Rights Portion
`(PRIN1'(I=ea))
`
`Ri hts Portion
`9
`(VIEW)
`
`Child Pointers
`
`cl-block
`1103
`
`
`
`Fig. 1 1
`
`Child Pointers
`
`d—b|ock
`1104
`
`
`
`
`Page 00009
`
`

`
`U.S. Patent
`
`May 13,1997
`
`Sheet 3 of 13
`
`5,629,980
`
`Processing
`Element
`1201
`
`Processor
`Memory
`1202
`
`Descfiptor
`Storage
`1203
`
`
`
`
`Repository Specfic
`Software
`Functioniservices
`1304
`
`Usage Transaction
`Handlers
`1303
`
`Page 00010
`
`Identification
`
`Certificates
`1 306
`
`
`
`
`Core Repository
`Servicesflransaction
`Handfing
`1 302
`
`
`
`Operating
`System
`1 301
`
`Fig. 13
`
`
`Page 00010
`
`

`
`U.S. Patent
`
`May 13,1997
`
`Sheet 9 of 13
`
`5,629,980
`
`1501 --Digital Work Rights: = (Rights*J
`7502 *'~—-Right := [Right-Code {Copy-Count} {Control-Spec} {Time-Spec }
`{Access-Spec} {Fee-Spec}J
`
`1503 --w Right-C ode := Render-Code | Transport-Code I File-Management-
`
`Codei, Derivative-Wo1'ka— Code I Configuration-C ode
`
`1504 v-—-Render-Code := [ Play: {Player Player-ID} | Print: {Printer: Printer-I.D}]
`
`1'505 ---Transporle Code := {Copy I Transfer | Loan {Remaining-Rights:
`
`Next-Set-of-Right5}]{[Next~C opy-Rights: Next-Set-of-Rights)}
`7505*‘-‘File-Management-C ode 1: Backup {Back-Up-Copy-Rights:
`
`Next-Set-of-Rights} I Restore I Delete I Folder
`
`I Directory {Name: Hide-Local I Hide-Remote}
`
`IParts: Hide-Local I I-Iide-Remote}
`‘I507--«Derivative-Works-C ode :=
`[Extract | Embed I Edit{P1-ocess:
`Process-[DI] {N ext-Copy-Rights :
`
`Next-Set~of Rights}
`7503 '~—-ConfiguratioI1-Code : = Install I Uoinstall
`1509 ----Next-Set-ofi Rights := {(Add: Set-Of~Rights)} {(De1ete'.
`
`Set-Of-Rights}} {{Replace: Set-Of-Rights }}{{Keep: Set-Of—Rights }}
`‘$70’:--Copy-C ount : = (Copieapoeitive-integer I 0 I Unlimited)
`7571 "--«Control-Spec := (Control: Iflestrictable I Unrestrictable}
`
`‘I512 '--Time-Spec := {{Fixed-Interval I Sliding-Interval I Meter-Time}
`
`{Unt:hargeah1e | Chargeah1e}]
`
`Until: Expiration-Date)
`1513 -*--' Fixed-Interval := From: Start-Time
`
`1514“:-Sliding-Interval : = Interval: Use-Duration
`15 ’ 5 "*--'Meter-Time: = Time-Remaining: Remaining-Use
`1516 ~—— Access~Spec := («[801 Security-Class} {Authorizatiom Authol-izat'1on—lD*}
`{Other-Authorization: Authorization-ID*} {Ticket Ticket-TDD
`1517-«Fee-Spec: = {Scheduled-Discount} Regular-Fee-Spec | Scheduled-Fee-Spec |
`
`Markup-Spec
`75 73 '*-Scheduled-Disc ount: = Scheduled-Discount: (Scheduled-Discount:
`
`| Incentive: } [Per-Use-Spec I Metered-Rate
`1'5I9--Regular-Fee-Spec := ({Fee:
`Spec I Best-Price-Spec | Call-For-Price-Spec]
`
`(Time-Spec Percentage)*}
`
`{Min: Money-Unit Per: Time-Spec}-IMax:
`
`Money-Unit Per: Time-Spec} To: Account-ID)
`
`‘I520 --——Pe r-Use-Spec: = Per~Uee: Money-unit
`1521 "--'Metered-Rate-Spec := Metered: Money-Unit Per: Time-Spec
`T522 '-~vBest-Price-Spec : = Best-Price: Money-unit Max: Money-unit
`7523"--Call-For-Price-Spec := Cail-For -Price
`7524"-- Scheduled-Fee-Spec: = (Schedule: {Time-Spec Regular-Fee-Spec)*)
`
`1525 -~——Ma1-kup-Spec: = Markup: percentage To: Account-ID
`
`Fig. 15
`
`_|
`
`Page 00011
`
`
`Page 00011
`
`

`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 10 of 13
`
`5,629,980
`
`REPOSITORY-1
`
`REPOSITORY-2
`
`‘I601
`
` Generate Re istration
`
`Iclenti Ier
`
`
`
`Message
`
`Decryfi Registration
`essage
`
`
`
`
`
`
`Transmit Registration
`Message
`
`Decrypt Performance
`Message
`
`
`Save Encrypted
`Repositor -1
`
`Registration! entifier
`
` Extract Re pository-1
`Identifier
`
`
`
`No
`
`Names 0.K.?
`
`
`
` Repository-1
`on Hotlist?
`
`No
`
`Generate Performance
`
`Message
`
`Transmit Performance
`Message
`
`
`
`
`
`
` Registration
`Identifier Same
`As One Sent?
`
`
`
`
`Time Accurate?
`
`
`es
`"'
`ms
`
`
`
` Nance Same
`As Original?
`
`
`
`
`
`No
`
`Repository 2
`Terminate Transaction
`
`Page 00012
`
`
`
`Repository- 1
`Terminate Transaction
`
`Fig. 1 6
`
`
`Page 00012
`
`

`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 11 of 13
`
`5,629,980
`
`REPOSITORY-1
`
`REPOSITORY-2
`
`1701
`
`1704
`
`Create a Session Key Pair
`
`Decrypt Second Key
`
`Encrypt Second Key Using
`Public Key of Repository-2
`
`Generate Timestamp
`Exchange Message
`
`
`
`
`
`
`
`
`
`
`Compare Current Time With
`Time From Repository-1
`
`1712
`
`
`Time
`
`Difference Exceed
`Tolerance?
`
`
`
`
`Yes
`
`Terminate Transaction
`
`Compute Ad'usted
`Time De ta
`
`Page 00013
`
`Save Time From Repository-1
`
`1711
`
`1705
`
`1706
`
`1709
`
`‘I710
`
`
`
`
`
`
`Transmit Encrypted Second
`Key To Repository-2
`
` Transmit Timestamp
`
`Exchange Message
`To Repository-1
`
`1 707
`
`1708
`
`Generate Timestamp
`Message
`
`Transmit Timestarnp
`messageroneposnory-2
`
`
`
`-
`
`
`
`
`Page 00013
`
`

`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 12 of 13
`
`5,629,980
`
`REQUESTER
`
`1803
`
`SERVER
`
`
`
`Server Generates
`Transaction Identifier
`
`Performs General
`
` Requester
`Tests
`
`Tests Passed
`
`1804
`
`
`
`Tests Failed
`
`
`
`
`
`Right
`Granted?
`
`Yes
`
`1802
`
`
`
`
`
`
`
`Time
`Based Conditions
`Satisfied?
`
`
`Do Not initiate
`Transaction
`
`
`
`
`
`
`
`
`Security And
`- ccess Condition
`
`
`
`opies in use For
`Decremerit Cofiy
`Right > Copy Count
`
`Count For Rig t
`
`Of Request?
`
`
`1813
`
`o
`'
`f
`eter_rn§ne Set 0
`Remaining Rights
`
` Right In
`Remaining Set
`of Rights?
`
`1811
`
`
`
`
`
`‘-°‘"‘
`R.
`'95: svtggfiged
`
`
`All Co '
`pies
`Loaned Out?
`
`Terminate Transaction
`
`
`
`Fee
`Conditions
`
`Satisfied‘!
`
`1817
`
`Decrerrierit Co ies In Use For
`RightBy Num er In Request
`
`1,818
`
`For Metered Use. Subtract
`Eia psed Time From Remaining
`Use Time For Right
`
`Fig. 18
`
`Page 00014
`
`
`
`
`
`
`
`1815
`
`1816
`
`W19
`
`
`
`Yes
`
`Perfom-1 usage
`Transaction Steps
`
`
`
`Initiate End-Charge Financial
`Transaction to Confirm Billing
`
`
`Page 00014
`
`

`
`US. Patent
`
`May'13,1997
`
`Sheet 13 of 13
`
`5,629,980
`
`SERVER
`
`(Cancel)
`Faii
`1912
`
`
`
`
`
`New
`Transaction
`1902
`
`
`
`
`
`
`
`Commit Report
`To Credit Server
`1m4
`
`————4
`
`Report Error
`To Credit Server
`1915
`
`‘
`,Ack
`hne
`I
`1901
`E
`....................................l..................
`1
`I
`I
`1,
`-— —|
`
`III
`
`JII I
`
`I
`I
`I
`. . . . . . . . . . . . . . . ..i
`CLIENT
`I
`‘
`:
`
`WaitFor
`Transaction
`1904
`
`Received
`1909
`
`
`
`No
`More
`Data
`
`I
`
`.
`Commit Report
`To Credit Server
`1916
`
`Report Error
`To Credit Server
`191 8
`
`Done
`1919
`
`Page 00015
`
`
`Page 00015
`
`

`
`1
`SYSTEM FOR CONTROLLING THE
`DBTRIBUTION AND USE OF DIGITAL
`WORKS
`
`FIELD OF THE INVENTION
`
`The present invention relates to the field of d.istn'bution
`and usage rights enforcement for digitally encoded works.
`
`BACKGROUND OF THE INVE‘-vI'l"IClN
`
`A fundamental issue facing the publishing and infot:ma~
`tion industries as they consider electronic publishing is how
`to prevent the unauthorized and unaccounted distribution or
`usage of elelstronically published materials. Electronically
`published materials are typically distributed in a digital form
`and recreated on a computer based system having the
`capability to recreate the materials. Audio and video
`recordings. software, books and multimedia works are all
`being electronically published Companies in these indus-
`nies receive royalties for each accounted for delivery of the
`materials. eg. the sale of an audio CI} at a retail outlet. Any
`unaccounted distribution of a work results in an unpaid
`royalty (c.g. copying the audio recording CD to another
`digital medium.)
`The ease in which electronically published works‘ can be
`"perfectly” reproduced and distributed is a major concern.
`‘The transmission of digital works over networks is com-
`rnonplace. One such widely used network is the Internet.
`The Internet is a widespread network. facility by which
`computer users in many universities. corporations and gov-
`ernment entities comrnnnicate and trade ideas and informa-
`tion. Computer bnIleti.n boards found on the Internet and
`commercial networks such as Compuserv and Prodigy
`allow for the posting and retrieving of digital information.
`Information services such as Dialog and LEXISINEXIS
`provide databases of current information on a wide variety
`of topics. Another factor which will exacerbate the situation
`is the development and expansion of the National Informa-
`tion In.t'1'asn'uct;ure (the N11). It is anticipated that, as the N1]
`grows. the transmission of digital works over networks will
`increase many times over. It would be desirable to utilize the
`N11 for distribution of digital works without the fear of
`widespread unauthorized copying.
`The most suaightforward way to curb unaccounted dis-
`tribution is to prevent unauthorized copying and transmis-
`sion. For existing matuials that are distributed in digital
`form. various safeguards are used. In the case of software.
`copy protection schemes which limit the number of copies
`that can be made or which corrupt the output when copying
`is detected have been employed. Another scheme causes
`software to become disabled after a predetermined period of
`time has lapsed A technique used for workstation based
`software is to require that a special hardware device must be
`present on the workstation in order for the software to run.
`e.g., see U.S. Pat. No. 4.932354 entitled “Method and
`Apparatus for Protecting Computer Sofiware Utilizing
`Coded Filter Networkin Conjunction with an Active Coded
`Hardware Device.“ Such devices are provided with the
`software and are commonly referred to as dougles.
`Yet another scheme is to distribute software. but which
`requires a "key” to enable it‘s use. This is employed in
`distribution schemes where "demos" of the software are
`provided on a medium along with the entire product. The
`demos can be freely used. but in ordm to use the acuial
`product, the key must be purchased. These scheme do not
`hinder copying of the software once the key is initially
`purchased.
`
`30
`
`45
`
`50
`
`65
`
`5,629,980
`
`2
`
`A system for ensuring that licenses are in place for using
`licensed products is described in PCT Publication W0
`93:"0155{l to Griswold entitled “License Management Sys-
`tem and Method.“ The licensed product may be any elec-
`tronically published worlt but is most effective for use with
`works that are used for extended periods of time such as
`sofiware programs. Griswoldrcquires that the licensed prod-
`uct contain softwarc to invoke a license check monitor at
`predetermined time intervals. The license cheek monitor
`generates request datagrarns which identify the Licensee. The
`request datagra.rn.s are sent to a license control System over
`an appropriate communication tacility. The license control
`system then checks the datagram to determine if the data-
`gram is from a valid licensee. The license control system
`then sends a reply datagram to the license check monitor
`indicating denial or approval of usage. The license control
`system will deny usage in the event that request datagrams
`go unanswered after a predetermined periodof time (which
`may indicate an unauthorized attempt to use the licensed
`product). In this system. usage is managed at a central
`location by the response datagrams. So for example if
`license fees have not been paid. access to the licensed
`product is terminated.
`It is argued by Griswold that the described system is
`advantageous because it can be implemented entirely in
`software. However, the system described by Griswold has
`liruilatlons. An izulportanl Iitnitation is that during the use of
`the licensed product. the user must always be coupled to an
`appropriate comrnunication facility in order to send and
`receive datagrams. This creates a dependency on the com-
`munication facility. So if the coturnunication facility is not
`available, the licensed product cannot be used. Moreover.
`some party must absorb the cost of communicating with the
`license server.
`
`A system for controlling the distt1'bution of digitally
`encoded books is embodied in a system available from VPR
`Systems. LTD. of St. Louis. Me. The VPR system is
`self-contained and is comprised of: (1) point of sale kiosks
`for storing and downloading of books. (2) personal storage
`medituns (cartridges) to which the books. are downloaded.
`and (3) readers for viewing the book. In a purchase
`transaction. at pin-chaser will purchase a voucher card rep-
`resenting the desired book. The voucher will contain suffin
`cient information to identify the hookpurchased and perhaps
`some demographic information relating to the sales trans-
`action. To download the book. the voucher and the cartridge
`are inserted into the kiosk.
`
`The VPR system may also be used as a library. In such an
`embodiment. the kiosk manages the number of “copiea" that
`may be checked out at one time. Further. the copy of the
`book is erased from the users ca.'ru'idge after a certain
`checkout time has expired However. individuals cannot
`loan books because the cartridges may only be used with the
`owners reader.
`
`The foregoing disuihtltion and protection schemes oper-
`ate in part by preventing subsequent distribution of the work.
`While this certainly prevents unauthorized disuibutions. it
`does -so by sacrificing the potential for subsequent revenue
`bearing uses. For example, it may be desirable to allow the
`lending of a purchased work to permit exposure of the work
`to potential buyers. Another example would be to permit the
`creation of a derivative work for a fee. Yet another example
`would be to permit copying the work for a fee (essentially
`purchasing it). Thus. it would be desirable to provide flex-
`ibility in how the owner of a digital work may allow it to be
`distributed.
`
`While flexibility in distribution is a concern. the owners
`of a work want to make sure they are paid for such
`
`Page 00016
`
`
`Page 00016
`
`

`
`3,629,980
`
`3
`distributions. In U.S. Pat. No. 4.977.594 to Shear. entitled
`“Database Usage Metering and Protection System and
`Method." a system for metering and billing for usage of
`infonrnation distributed on a CD-ROM is described The
`system requires the addition of a billing module to the
`computer system. The billing module may operate in a
`number of different ways. First. it may ptniodically com-
`tnnnicate billing data to a central billing facility. whereupon
`the user may be billed. Second. billing may occur by
`disconnecting the billing module and the user sending it to
`acentrsl billing facility Where the dalais read and a userbill
`generated.
`U.S. Pat. No. 5.247.575, Sprague et aL. entitled ‘Infor-
`mation Distribution System“. describes an information dis-
`n-ibution system which provides and charges only for user
`selected information. A plurallty of encrypted information
`packages (IPs) are provided at the user site. via high andior
`low density storage media andlor by broadcast transmission.
`Some of the E3 may be of no interest to the user. The E5
`of interest are selected by the user and are decrypted and
`stored Iomlly. The PS may be printed. displayed or even
`copied to other storage medias. The charges for the selected
`IP's are acctnnulated within a user apparatus and periodi-
`cally reported by telephone to a central amounting facility.
`The central accounting facility also issues keys to decrypt
`the Pa. The lceys are changed periodically. If the central
`accounting facility has not issued a new key for a particular
`user station, the station is unable to retrieve information
`from the system when the key is dranged.
`A system available from Wave Systems Corp. of
`Princeton. N.Y.. provides for metering of software usage on
`a personal computer. The system is installed onto a computer
`and collects information on what software is in use. encrypts
`it and then transmits the inforzmalion to a transaction center.
`From the transaction center, a bill is generated and sent to
`the user. The transaction center also maintains customer-
`
`accounts so that licensing fees may be forwarded directly to
`the software providers. Software operating under this system
`must be modified so that usage can be accounted.
`Known techniques for billing do not provide for billing of
`copies made of the work. For example. if data is copied from
`‘tire CD~ROM described in Shear. any subsequent use of the
`copy of the information cannot be metered or billed. In other
`words. the means for billing runs with the media rather than
`the underlying work. It would be desirable to have a
`distribution system where the means for billing is always
`transported with the work.
`
`SUMMARY OF ‘THE INVENHON
`
`A system for controlling use and distribution of digital
`works is disclosed. A digital work is any written. aural.
`graphical or video based work including computer programs
`that has been translated to or created in a digital form. and
`Which can be recreated using suita.bl.e- rendering means such
`as software programs. The present invention allows the
`owner of a digital work to attach usage rights to the work.
`The usagerights for the work define how it may be used and
`distributed. Digital works and their usage rights are stored in
`a secure repository. Digital works may only be accessed by
`other secure repositories.
`Usage rights for a digital work are embodied in a flexible
`and extensible usage rights grammar. Conoeptually, a right
`inthe usage rights grammarisalabcl attached toaprede-
`tennined behavior and conditions to exercising the right. For
`example, a COPY right denotes that a copy of the digital
`work may be made. A condition to exercising the right is the
`
`4
`
`requester must pass certain security criteria. Conditions may
`also be attached to limit the right itself. For example, a
`LOAN right may be defined so as to limit the duration of
`which a work may be b0ANed. Conditions may also
`include requirements that fees be paid.
`A repository is comprised of a storage means for storing
`a digital work and its attached usage rights, an external
`interfacefor receiving and transmitting data, aprooessor and
`a clock. A repository has two primary operating modes. at
`server mode and a requester mode. When operating in a
`server mode, the repository is responding no requests to
`access digital works. When Opomling in requester mode, the
`repository is requesting access to a digital work.
`Generally. a repository will process each request to access
`a digital work by examining the work's usage rights. For
`example. in a request to make a copy of a digital work. the
`digital workis examined to see if rights have been granted
`which would allow copies to be given out. If such a right has
`been granted. then conditions to exercise of the right are
`checked (e.g. a right to make 2 copies). If conditions
`associated with the right are satisfied. the copy can be made.
`Before transporting the digital work. any specified changes
`lo the set of usage rights in the copy are attached to the copy
`of the digital work.
`Repositories cornrnttnlcate utilizing a set of repository
`transactions. The repository transactions embody a set of
`protocols for establishing secure sessions connections
`between repositories, and for processing access requests to
`the digital works.
`Digital works are recreated on rendering systems. A
`rende.ri.ng system is cornpnised of at least a rendering reposi-
`tory and. a rendering device (e.g. a printer’. display or audio
`system) Rendering systems are internally secure. Access to
`digital works not contained within the rendering repository
`is accomplished via repository n-snsactions with an external
`repository containing the desired digital work.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a flowchart illustrating a simple instantiation of
`the operation of the currently preferred embodiment of the
`present invention.
`FIG. 2 is a block diagatn illustrating the various reposi—
`tory types and the repository transaction flow between them
`in the currently preferred embodiment of the present inven-
`rion.
`
`FIG. 3 is a block diagram of arepository coupled with a
`credit server in the currently preferred embodiment of the
`present invention.
`FIGS. 4:: and 4b are examples of rendering systems as
`may be ufilized in the currently preferred embodiment of the
`present invention.
`FIG. 5 illustrates a contents file layout for a digital work
`as may be utilized in the currently preferred embodiment of
`the present invention.
`FIG. 6 illustrates 2: contents file layout for an individual
`digital work of the digital work of FIG. 5 as may be utilized
`in the cturently preferred embodiment of the present inven-
`tion.
`
`20
`
`30
`
`35
`
`1-0
`
`60
`
`FIG. '7 illustrates the components of a description blockof
`the currently preferred embodiment of the present invention.
`FIG. 8 illustrates a description tree for the contents file
`layout of the digital work illustrated in FIG. 5.
`FIG. 9 illustrates a portion of a description tree corre-
`sponding to the individual digital work illustrated in FIG. 6.
`FIG. 10 illustrates a layout for the rights portion of a
`description block as may be utilized in the currently pre-
`ferred embodiment of the present invention.
`
`‘W
`
`Page00017
`
`
`Page 00017
`
`

`
`5
`
`5.629.980
`
`FIG. 11 is a description tree wherein certain d—hlocks have
`PRINT usage rights and is used to illustrate "strict" and
`"‘1enient" rules for resolving usage rights conflicts.
`FIG. 12 is a block diagram of the hardware components
`of a repository as are utilized in the currently preferred
`embodiment of the present invention.
`FIG. 13 is a block diagram of the ftrnctional (logical)
`components of a repository as are utilizedin the currently
`preferred embodiment of the present invention.
`FIG. 14 is diagram illustrating the basic components of a
`usage right in the currently prefmred embodiment of the
`present invention.
`FIG. 15 lists the usage rights grammar of the currently
`preferred embodiment of the present invention.
`FIG. 16 is a flowchart illustrating the steps of certificate
`delivery, hotlist checking and performance testing as per-
`tomred in a registration transaction as may be performed in
`the can-ently preferred embodiment of the present invention.
`FIG. 17 is s flowchart illustrating the steps of session
`information exchange and clock synchronization as may be
`performed in the currently preferred embodiment of the
`present invention. after each repository in the regisnarion
`transaction has successfully ccnrrpleted the steps described in
`FIG. 16.
`
`FIG. 18 is a flowchart i.llu5trat:ing the basic flow for a
`usage transaction. including the oommon opening and clos-
`ing step. as may he performed in the currently preferred
`ernhodiment of the present invention.
`FIG. 19 is a state diagram of server and client repositories
`in accordance with a transport protocol followed when
`moving a digital work from the server to the client
`repositories. as may be performed in the currently preferred
`embodiment of the present invention.
`
`DETAILED DESCRIPTION OF THE PREFERRED
`EMBODIMENT
`
`TABLE OF CON’I'EN'l'S
`
`OVERVIEW
`RENDERING SYSTEMS
`STRUCTURE OF DIGITAL WORKS
`
`KITACBIEINTG USAGE RIGHTS TO A DIGITAL WORK
`Resolving Conflicting Rights
`REPDSITORJES
`Repository Secrn-ity Classes
`Repository User Interface
`CREDIT SERVERS
`USAGE RIGHTS LANGUAGE
`Copy Count Specification
`Control Specification
`Time Specification
`Security Class and Authorzization Specification
`Usage Fees and Incentives Specification
`Examples of Sets of Usage Rights
`REPOSITORY TRANSACHONS
`Message Transmission
`Session Initiation Transactions
`Billing T

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket