throbber
(19)
`
`(12)
`
`sigma
`
`
`
`European
`Patent Office
`
`lllllllllllllllllllllllll|||||||||||l|||||l||l||||||||||||||l|l|||l|l|||||l
`
`(11)
`
`EP 1 349 045 B1
`
`EUROPEAN PATENT SPECIFICATION
`
`(45) Date of publication and mention
`of the grant of the patent:
`21.05.2008 Bulletin 2008/21
`
`(21) Application number: 03015128.6
`
`(22) Date of filing: 23.11.1995
`
`(51) Int Cl.:
`GOb‘F21/00‘2m-W)
`
`(54) System for controlling the distribution and use of digital works
`
`System zur Steuerung der Verteilung und Benutzung von Digitalwerken
`
`Syst‘eme pour commander la distribution et I’utilisation d’oeuvres numériques
`
`(84) Designated Contracting States:
`DE FR GB
`
`(30) Priority: 23.11.1994 US 344760
`
`(43) Date of publication of application:
`01.10.2003 Bulletin 2003/40
`
`(62) Document number(s) of the earlier application(s) in
`accordance with Art. 76 EPC:
`02028101.0 /1 293 860
`953084225 / 0 715 247
`
`(73) Proprietor: ContentGuard Holdings, Inc.
`Wilmington, DE 19803 (US)
`
`(72) Inventors:
`0 Stefik, Mark, J.
`Woodside,
`California 94062 (US)
`
`0 Pirolli, Peter, L.
`El Cerrito,
`California 94530 (US)
`
`(74) Representative: Griinecker, Kinkeldey,
`Stockmair & Schwanhéusser
`Anwaltssozietét
`
`Leopoldstrasse 4
`80802 Miinchen (DE)
`
`(56) References cited:
`EP-A- 0 538 216
`US-A- 5 260 999
`
`US-A- 4 882 752
`
`0 PERRI'I'I' H H: "Knowbots, Permissions Headers
`and Contract Law" PROCEEDINGS
`TECHNOLOGICAL STRATEGIES FOR
`PROTECTING INTELLECTUAL PROPERTY IN
`THE NETWORKED MULTIMEDIA
`
`ENVIRONMENT, XX, XX, 2 April 1993 (1 993-04-02),
`pages 39-50, XP002233403
`
`
`
`Note: Within nine months of the publication of the mention of the grant of the European patent in the European Patent
`Bulletin, any person may give notice to the European Patent Office of opposition to that patent, in accordance with the
`Implementing Regulations. Notice of opposition shall not be deemed to have been filed until the opposition fee has been
`paid. (Art. 99(1) European Patent Convention).
`
`Printed by Jouve, 75001 PARIS (FR)
`
`ContentGuard Exhibit 2005
`
`ZTE v. ContentGuard
`
`IPR2013-00133
`
`EP1349045B1
`
`

`

`Description
`
`EP 1 349 045 B1
`
`[0001] The present invention relates to the field of distribution and usage rights enforcementfordigitally encoded works.
`[0002] A fundamental issue facing the publishing and information industries as they consider electronic publishing is
`how to prevent the unauthorized and unaccounted distribution or usage of electronically published materials. Electron-
`ically published materials are typically distributed in a digital form and recreated on a computer based system having
`the capability to recreate the materials. Audio and video recordings, software, books and multimedia works are all being
`electronically published. Companies in these industries receive royalties for each accounted for delivery of the materials,
`e.g. the sale of an audio CD at a retail outlet. Any unaccounted distribution of a work results in an unpaid royalty (e.g.
`copying the audio recording CD to another digital medium.)
`[0003] The ease in which electronically published works can be "perfectly" reproduced and distributed is a major
`concern. The transmission of digital works over networks is commonplace. One such widely used network is the Internet.
`The Internet is a widespread networkfacility by which computer users in many universities, corporations and government
`entities communicate and trade ideas and information. Computer bulletin boards found on the Internet and commercial
`networks such as CompuServ and Prodigy allow forthe posting and retrieving of digital information. Information services
`such as Dialog and LEXIS/NEXIS provide databases of current information on a wide variety of topics. Another factor
`which will exacerbate the situation is the development and expansion ofthe National Information Infrastructure (the NH).
`It is anticipated that, as the NII grows, the transmission of digital works over networks will increase many times over. It
`would be desirable to utilize the NII for distribution of digital works without the fear of widespread unauthorized copying.
`[0004] The most straightforward way to curb unaccounted distribution is to prevent unauthorized copying and trans-
`mission. For existing materials that are distributed in digital form, various safeguards are used. In the case of software,
`copy protection schemes which limit the number of copies that can be made orwhich corrupt the output when copying
`is detected have been employed. Another scheme causes software to become disabled after a predetermined period
`of time has lapsed. A technique used for workstation based software is to require that a special hardware device must
`be present on the workstation in order forthe software to run, e.g., see USA-4,932,054 entitled "Method and Apparatus
`for Protecting Computer Software Utilizing Coded Filter Networkin Conjunction with an Active Coded Hardware Device."
`Such devices are provided with the software and are commonly referred to as dongles.
`[0005] Yet another scheme is to distribute software, but which requires a "key" to enable its use. This is employed in
`distribution schemes where "demos" of the software are provided on a medium along with the entire product. The demos
`can be freely used, but in order to use the actual product, the key must be purchased. These schemes do not hinder
`copying of the software once the key is initially purchased.
`[0006] US 5,260,999 discloses a license management system for software products in a computer system. A license
`server administers licenses for licensed products. Programs executing on the user CPUs are applications programs
`which have added to them a unit 19 that functions as a client stub. A call to a license server, which stores licenses for
`licensed products, is made through this stub and returns are received by this stub and passed on to the program. When
`execution of a program begins, a unit 18 is invoked to check on the availability of a license forthis particular node. The
`unit 18 sends a request to the license management program. A return is sent to the user node granting permission to
`continue.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`PERRI'I'I' H H: "Knowbots, Permission Headers and Contract Law" PROCEEDINGS TECHNOLOGICAL
`[0007]
`STRATEGIES FOR PROTECTING INTELLECTUAL PROPERTY IN THE NETWORKED MULTIMEDIA ENVIRON-
`
`45
`
`50
`
`55
`
`MENT, [Online] 30 April 1993, pages 39 to 50, Retrieved from the Internet on 2003-03-04
`<URL:http://www.ifla.org/documents/infopoI/copyright/perh2.txt>, describes a digital library concept of information ob-
`jects distributed throughout an electronic network. The objects reside on servers and can be retrieved remotely by users
`using clientworkstations. The digital library concept envisions retrieval of complete information resources and not merely
`bibliographic information. The digital library concept contemplates three basic architectural elements, a query (also called
`a knowbot), a permissions header attached to each information object, and a procedure for matching the query with the
`permissions header.
`[0008]
`It is therefore the object of the present invention to provide an improved repository for storing and controlling
`the use of digital works.
`[0009] This object is solved by the subject matter of the independent claim 1.
`[0010]
`Preferred embodiments are defined by the dependent claims.
`[0011] A system for controlling the distribution and use of digital works using digital tickets is disclosed. A ticket is an
`indicator that the ticket holder has already paid for or is othenNise entitled to some specified right, product or service. In
`the presentinvention, a "digital ticket" is used to enable the ticket holderto exercise usage rights specifying the requirement
`of the digital ticket. Usage rights are used to define how a digital work may be used or distributed. Specific instances of
`usage rights are used to indicate a particular manner of use or distribution. A usage right may specify a digital ticket
`which must be present before the right may be exercised. For example, a digital ticket may be specified in a Copy right
`of a digital work, so that exercise of the Copy right requires the party that desires a copy of the digital work be in possession
`
`

`

`EP 1 349 045 B1
`
`ofthe necessary digital ticket. After a copy ofthe digital work is successfully sent to the requesting party, the digital ticket
`is "punched" to indicate that a copy of the digital work has been made. When the ticket is "punched" a predetermined
`number of times, it may no longer be used.
`[0012] Digital works are stored in repositories. Repositories enforce the usage rights for digital works. Each repository
`has a "generic ticket agent’ which punches tickets. In some instances only the generic ticket agent is necessary. In other
`instances, punching by a "special ticket agent" residing on another repository may be desired. Punching by a "special
`ticket agent’ enables greater security and control of the digital work. For example, it can help prevent digital ticket forgery.
`Special ticket agents are also useful in situations where an external database needs to be updated or checked.
`[0013]
`A digital ticket is merely an instance of a digital work. Thus, a digital ticket may be distributed among repositories
`in the same fashion as other digital works.
`[0014] A digital ticket may be used in many commercial scenarios such as in the purchase of software and prepaid
`upgrades. A digital ticket may also be used to limit the number of times that a right may be exercised. For example, a
`user may purchase a copy of a digital work, along with the right to make up to 5 Copies. In this case, the Copy right
`would have associated therewith a digital ticket that can be punched up to 5 times. Other such commercial scenarios
`will become apparent from the detailed description.
`[0015] A system and method in accordance with the invention will now be described, by way of example, with reference
`to the accompanying drawings, in which:-
`
`is a flowchart illustrating a simple instantiation of the operation of the currently preferred embodiment of
`Figure 1
`the present invention.
`Figure 2 is a block diagram illustrating the various repository types and the repository transaction flow between them
`in the currently preferred embodiment of the present invention.
`Figure 3 is a block diagram of a repository coupled with a credit server in the currently preferred embodiment of the
`present invention.
`Figures 4a and 4b are examples of rendering systems as may be utilized in the currently preferred embodiment of
`the present invention.
`Figure 5 illustrates a contents file layout for a digital work as may be utilized in the currently preferred embodiment
`of the present invention.
`Figure 6 illustrates a contents file layout for an individual digital work of the digital work of Figure 5 as may be utilized
`in the currently preferred embodiment of the present invention.
`Figure 7 illustrates the components of a description block of the currently preferred embodiment of the present
`invention.
`
`Figure 8 illustrates a description tree for the contents file layout of the digital work illustrated in Figure 5.
`Figure 9 illustrates a portion of a description tree corresponding to the individual digital work illustrated in Figure 6.
`Figure 10 illustrates a layoutforthe rights portion of a description block as may be utilized in the currently preferred
`embodiment of the present invention.
`Figure 11 is a description tree wherein certain d-blocks have PRINT usage rights and is used to illustrate "strict"
`and "lenient" rules for resolving usage rights conflicts.
`Figure 12 is a block diagram of the hardware components of a repository as are utilized in the currently preferred
`embodiment of the present invention.
`Figure 13 is a block diagram of the functional (logical) components of a repository as are utilized in the currently
`preferred embodiment of the present invention.
`Figure 14 is diagram illustrating the basic components of a usage right in the currently preferred embodiment of the
`present invention.
`Figure 15 lists the usage rights grammar of the currently preferred embodiment of the present invention.
`Figure 16 is a flowchart illustrating the steps of certificate delivery, hotlist checking and performance testing as
`performed in a registration transaction as may be performed in the currently preferred embodiment of the present
`invention.
`
`Figure 17 is a flowchart illustrating the steps of session information exchange and clock synchronization as may be
`performed in the currently preferred embodiment of the present invention, after each repository in the registration
`transaction has successfully completed the steps described in Figure 16.
`Figure 18 is a flowchart illustrating the basic flow for a usage transaction, including the common opening and closing
`step, as may be performed in the currently preferred embodiment of the present invention.
`Figure 19 is a state diagram of server and client repositories in accordance with a transport protocol followed when
`moving a digital work from the server to the client repositories, as may be performed in the currently preferred
`embodiment of the present invention.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`

`

`OVERVIEW
`
`EP 1 349 045 B1
`
`[0016] A system for controlling use and distribution of digital works is disclosed. The present invention is directed to
`supporting commercial transactions involving digital works.
`[0017] Herein the terms "digital work", "work" and "content" refer to any work that has been reduced to a digital
`representation. This would include any audio, video, text, or multimedia work and any accompanying interpreter (e.g.
`software) that may be required for recreating the work. The term composite work refers to a digital work comprised of
`a collection of other digital works. The term "usage rights" or "rights" is a term which refers to rights granted to a recipient
`of a digital work. Generally, these rights define how a digital work can be used and if it can be further distributed. Each
`usage right may have one or more specified conditions which must be satisfied before the right may be exercised.
`[0018]
`Figure 1
`is a high level flowchart omitting various details but which demonstrates the basic operation of the
`present invention. Referring to Figure 1, a creator creates a digital work, step 101. The creator will then determine
`appropriate usage rights and fees, attach them to the digital work, and store them in Repository 1, step 102. The
`determination of appropriate usage rights and fees will depend on various economic factors. The digital work remains
`securely in Repository 1 until a request for access is received. The request for access begins with a session initiation
`by another repository. Here a Repository 2 initiates a session with Repository 1, step 103. As will be described in greater
`detail below, this session initiation includes steps which helps to insure that the respective repositories are trustworthy.
`Assuming that a session can be established, Repository 2 may then request access to the Digital Work for a stated
`purpose, step 104. The purpose may be, for example, to print the digital work orto obtain a copy of the digital work. The
`purpose will correspond to a specific usage right.
`in any event, Repository 1 checks the usage rights associated with
`the digital work to determine if the access to the digital work may be granted, step 105. The check of the usage rights
`essentially involves a determination of whether a right associated with the access request has been attached to the
`digital work and if all conditions associated with the right are satisfied. if the access is denied, repository 1 terminates
`the session with an error message, step 106. If access is granted, repository 1 transmits the digital work to repository
`2, step 1 07. Oncethe digital work has been transmittedto repository 2, repository 1 and 2 each generate billing information
`for the access which is transmitted to a credit server, step 108. Such double billing reporting is done to insure against
`attempts to circumvent the billing process.
`[0019]
`Figure 2 illustrates the basic interactions between repository types in the present invention. As will become
`apparent from Figure 2, the various repository types will serve different functions. It is fundamental that repositories will
`share a core set of functionality which will enable secure and trusted communications. Referring to Figure 2, a repository
`201 represents the general instance of a repository. The repository 201 has two modes of operation; a server mode and
`a requester mode. When in the server mode, the repository will be receiving and processing access requests to digital
`works. When in the requester mode, the repository will be initiating requests to access digital works. Repository 201 is
`general in the sense that its primary purpose is as an exchange medium for digital works. During the course of operation,
`the repository 201 may communicate with a plurality of other repositories, namely authorization repository 202, rendering
`repository 203 and master repository 204. Communication between repositories occurs utilizing a repository transaction
`protocol 205.
`[0020] Communication with an authorization repository 202 may occur when a digital work being accessed has a
`condition requiring an authorization. Conceptually, an authorization is a digital certificate such that possession of the
`certificate is required to gain access to the digital work. An authorization is itself a digital workthat can be moved between
`repositories and subjected to fees and usage rights conditions. An authorization may be required by both repositories
`involved in an access to a digital work.
`[0021] Communication with a rendering repository 203 occurs in connection with the rendering of a digital work. As
`will be described in greater detail below, a rendering repository is coupled with a rendering device (e.g. a printer device)
`to comprise a rendering system.
`[0022] Communication with a master repository 205 occurs in connection with obtaining an identification certificate.
`Identification certificates are the means by which a repository is identified as "trustworthy". The use of identification
`certificates is described below with respect to the registration transaction.
`[0023]
`Figure 3 illustrates the repository 201 coupled to a credit server 301. The credit server 301 is a device which
`accumulates billing information for the repository 201 . The credit server 301 communicates with repository 201 via billing
`transactions 302 to record billing transactions. Billing transactions are reported to a billing clearinghouse 303 by the
`credit server 301 on a periodic basis. The credit server 301 communicates to the billing clearinghouse 303 via clearing-
`house transactions 304. The clearinghouse transactions 304 enable a secure and encrypted transmission of information
`to the billing clearinghouse 303.
`
`RENDERING SYSTEMS
`
`[0024] A rendering system is generally defined as a system comprising a repository and a rendering device which can
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`

`

`EP 1 349 045 B1
`
`render a digital work into its desired form. Examples of a rendering system may be a computer system, a digital audio
`system, or a printer. A rendering system has the same security features as a repository. The coupling of a rendering
`repository with the rendering device may occur in a manner suitable for the type of rendering device.
`[0025]
`Figure 4a illustrates a printer as an example of a rendering system. Referring to Figure 4, printer system 401
`has contained therein a printer repository 402 and a print device 403. It should be noted that the the dashed line defining
`printer system 401 defines a secure system boundary. Communications within the boundary are assumed to be secure.
`Depending on the security level, the boundary also represents a barrier intended to provide physical integrity. The printer
`repository 402 is an instantiation of the rendering repository 205 of Figure 2. The printer repository 402 will in some
`instances contain an ephemeral copy of a digital work which remains until it is printed out by the print engine 403.
`In
`other instances, the printer repository 402 may contain digital works such as fonts, which will remain and can be billed
`based on use. This design assures that all communication lines between printers and printing devices are encrypted,
`unless they are within a physically secure boundary. This design feature eliminates a potential "fault" point through which
`the digital work could be improperly obtained. The printer device 403 represents the printer components used to create
`the printed output.
`[0026] Also illustrated in Figure 4a is the repository 404. The repository 404 is coupled to the printer repository 402.
`The repository 404 represents an external repository which contains digital works.
`[0027]
`Figure 4b is an example of a computer system as a rendering system. A computer system may constitute a
`"mufti-function" device since it may execute digital works (e.g. software programs) and display digital works (e.g. a
`digitized photograph). Logically, each rendering device can be viewed as having its own repository, although only one
`physical repository is needed. Referring to Figure 4b, a computer system 410 has contained therein a display/execution
`repository 411. The display/execution repository 411 is coupled to display device, 412 and execution device 413. The
`dashed box surrounding the computer system 410 represents a security boundary within which communications are
`assumed to be secure. The display/execution repository 411 is further coupled to a credit server 414 to report any fees
`to be billed for access to a digital work and a repository 415 for accessing digital works stored therein.
`
`STRUCTURE OF DIGITAL WORKS
`
`[0028] Usage rights are attached directly to digital works. Thus, it is important to understand the structure of a digital
`work. The structure of a digital work, in particular composite digital works, may be naturally organized into an acyclic
`structure such as a hierarchy. For example, a magazine has various articles and photographs which may have been
`created and are owned by different persons. Each ofthe articles and photographs may represent a node in a hierarchical
`structure. Consequently, controls, i.e. usage rights, may be placed on each node by the creator. By enabling control
`and fee billing to be associated with each node, a creator of a work can be assured that the rights and fees are not
`circumvented.
`
`In the currently preferred embodiment, the file information for a digital work is divided into two files: a "contents"
`[0029]
`file and a "description tree’ file. From the perspective of a repository, the "contents" file is a stream of addressable bytes
`whose format depends completely on the interpreter used to play, display or print the digital work. The description tree
`file makes it possible to examine the rights and fees for a work without reference to the content of the digital work.
`It
`should be noted that the term description tree as used herein refers to any type of acyclic structure used to represent
`the relationship between the various components of a digital work.
`[0030]
`Figure 5 illustrates the layout of a contents file. Referring to Figure 5, a digital work is comprised of story A 510,
`advertisement 51 1 , story B 512 and story C 513. It is assumed that the digital work is stored starting at a relative address
`of 0. Each of the parts of the digital work are stored linearly so that story A 510 is stored at approximately addresses
`0-30,000, advertisement 511 at addresses 30,001 -40,000, story B 512 at addresses 40,001 -60,000 and story C 513 at
`addresses 60,001 -85K. The detail of story A 510 is illustrated in Figure 6. Referring to Figure 6, the story A 510 is further
`broken down to show text 614 stored at address 0-1500, soldier photo 615 at addresses 1501-10,000, graphics 616
`stored at addresses 10,001-25,000 and sidebar 617 stored address 25,001-30,000. Note that the data in the contents
`file may be compressed (for saving storage) or encrypted (for security).
`[0031]
`From Figures 5 and 6 it is readily observed that a digital work can be represented by its component parts as
`a hierarchy. The description tree for a digital work is comprised of a set of related descriptor blocks (d-blocks). The
`contents of each d-block is described with respect to Figure 7. Referring to Figure 7, a d-block 700 includes an identifier
`701 which is a unique identifier forthe work in the repository, a starting address 702 providing the start address of the
`first byte of the work, a length 703 giving the number of bytes in the work, a rights portion 704 wherein the granted usage
`rights and their status data are maintained, a parent pointer 705 for pointing to a parent d—block and child pointers 706
`for pointing to the child d-blocks. In the currently preferred embodiment, the identifier 701 has two parts. The first part
`is a unique number assigned to the repository upon manufacture. The second part is a unique number assigned to the
`work upon creation. The rights portion 704 will contain a data structure, such as a look-up table, wherein the various
`information associated with a right is maintained. The information required by the respective usage rights is described
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`

`

`EP 1 349 045 B1
`
`in more detail below. D-blocks form a strict hierarchy. The top d-block of a work has no parent; all other d-blocks have
`one parent. The relationship of usage rights between parent and child d-blocks and how conflicts are resolved is described
`below.
`
`[0032] A special type of d-block is a "shell" d-block. A shell d-block adds no new content beyond the content of its
`parts. A shell d-block is used to add rights and fee information, typically by distributors of digital works.
`[0033]
`Figure 8 illustrates a description tree for the digital work of Figure 5. Referring to Figure 8, a top d-block 820
`for the digital work points to the various stories and advertisements contained therein. Here, the top d-block 820 points
`to d-block 821 (representing story A 510), d-block 822 (representing the advertisement 51 1), d-block 823 (representing
`story B 512) and and d-block 824 (representing story C 513).
`[0034] The portion of the description tree for Story A 510 is illustrated in Figure 9. D-block 925 represents text 614,
`d-block 926 represents photo 615, d-block 927 represents graphics 616 by and d-block 928 represents sidebar 617.
`[0035] The rights portion 704 of a descriptor block is further illustrated in Figure 10. Figure 10 illustrates a structure
`which is repeated in the rights portion 704 for each right. Referring to Figure 10, each right will have a right code field
`1050 and status information field 1052. The right code field 1050 will contain a unique code assigned to a right. The
`status information field 1052 will contain information relating to the state of a right and the digital work. Such information
`is indicated below in Table 1. The rights as stored in the rights portion 704 may typically be in numerical order based
`on the right code.
`
`TABLE 1
`
`Property
`
`Value
`
`Copies -in-Use
`
`Number
`
`Use
`
`A counter of the number of copies of a work that are in use. lncremented when
`another copy is used; decremented when use is completed.
`lndicatorofthe maximum numberoftime-unitsthata document can be loaned out
`
`Loaner-Copy
`
`lndicatorthatthe current work is a loaned out copy of an authorized digital work.
`
`
`
`Document-Descr
`
`String
`
`Indicator of the remaining time of use on a metered document right.
`
`A string containing various identifying information about a document. The exact
`format of this is not specified, but it can include information such as a publisher
`name, author name, ISBN number, and so on.
`
`A handle identifying a revenue ownerfora digital work. This is used for reporting
`usage fees.
`
`Publication-Date
`
`The date that the digital work was published.
`
`History-list
`
`History-Rec
`
`A list of events recording the repostories and dates for operations that copy,
`transfer, backup, or restore a digital work.
`
`DIGITAL WORK STATE INFORMATION
`
`[0036] The approach for representing digtal works by separating description data from content assumes that parts of
`afile are contiguous buttakes no position on the actual representation of content. In particular, it is neutral to the question
`of whether content representation may take an object oriented approach. It would be natural to represent content as
`objects. In principle, it may be convenient to have content objects that include the billing structure and rights information
`that is represented in the d-blocks. Such variations in the design of the representation are possible and are viable
`alternatives but may introduce processing overhead, e.g. the interpretation of the objects.
`[0037] Digital works are stored in a repository as part of a hierarchical file system. Folders (also termed directories
`and sub-directories) contain the digital works as well as other folders. Digital works and folders in a folder are ordered
`in alphabetical order. The digital works are typed to reflect howthe files are used. Usage rights can be attached to folders
`so that the folder itself is treated as a digital work. Access to the folder would then be handled in the same fashion as
`any other digital work As will be described in more detail below, the contents of the folder are subject to their own rights.
`Moreover, file management rights may be attached to the folder which define how folder contents can be managed.
`
`A'ITACHING USAGE RIGHTS TO A DIGITAL WORK
`
`It is fundamental to the present invention that the usage rights are treated as part of the digital work. As the
`[0038]
`digital work is distributed, the scope of the granted usage rights will remain the same or may be narrowed. For example,
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`

`

`EP 1 349 045 B1
`
`when a digital work is transferred from a document serverto a repository, the usage rights may include the right to loan
`a copy for a predetermined period of time (called the original rights). When the repository loans out a copy of the digital
`work, the usage rights in the loaner copy (called the next set of rights) could be set to prohibit any further rights to loan
`out the copy. The basic idea is that one cannot grant more rights than they have.
`[0039] The attachment of usage rights into a digital work may occur in a variety of ways. If the usage rights will be the
`same for an entire digital work, they could be attached when the digital work is processed for deposit in the digital work
`server. In the case of a digital work having different usage rights for the various components, this can be done as the
`digital work is being created. An authoring tool or digital work assembling tool could be utilized which provides for an
`automated process of attaching the usage rights.
`[0040] As will be described below, when a digital work is copied, transferred or loaned, a "next set of rights" can be
`specified. The "next set of rights" will be attached to the digital work as it is transported.
`
`Resolving Conflicting Rights
`
`[0041] Because each part of a digital work may have its own usage rights, there will be instances where the rights of
`a "contained part" are different from its parent or container part. As a result, conflict rules must be established to dictate
`when and how a right may be exercised. The hierarchical structure of a digital work facilitates the enforcement of such
`rules. A "strict" rule would be as follows: a right for a part in a digital work is sanctioned if and only if it is sanctioned for
`the part, for ancestor d-blocks containing the part and for all descendent d-blocks. By sanctioned, it is meant that (1)
`each of the respective parts must have the right, and (2) any conditions for exercising the right are satisfied.
`[0042]
`It also possible to implement the present invention using a more lenient rule. In the more lenient rule, access
`to the part may be enabled to the descendent parts which have the right, but access is denied to the descendents which
`do not.
`
`[0043] An example of applying both the strict rule and lenient is illustrated with reference to Figure 11. Referring to
`Figure 11, arootd-block1101 has child d-blocks1102-1105. In this case, root d-block represents a magazine, and each
`of the child d-blocks1102-1105 represent articles in the magazine. Suppose that a request is made to PRINT the digital
`work represented by rootd-block 1101 wherein the strict rule is followed. The rights for the root d-block 1101 and child
`d-blocks1102-1105 are then examined. Rootd-block 1101 and child d-blocks 1102 and 1 105 have been granted PRINT
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket