throbber
W0 0Df70523
`
`PCTIUS00/13798
`
`- 20-
`
`it is straightforward to design a music appliance to respond to usage limits of zero (e.g.
`
`“do not copy") and infinity (e.g. "unrestricted copying permitted," and “unrestricted playing
`
`permitted"). The device simply examines one or more hits in the vratennark data, and permits i
`
`(or refuses) an operation based on the value thereof.
`
`Implementation of the other usage-control restrictions can proceed in various ways.
`
`Generally speaking, the stored music can be altered to give effect to the usagecontrol
`
`restrictions. For example, if the music is "record-once,” than at the time of recording, the
`
`appliance can allcr the music. in a fashion indicating that it now has “do not record" status. This
`
`alteration can be done, c.g., by changing the watermark data embedded in the stored music (or
`
`adding Waterrnarlc data), by changing other data stored in association with the music, etc. If the
`
`original signal is stored (as opposed, e.g., to a streaming signal, such as an intcrnct or wireless
`transmssion), it too should be so-altered.
`-
`
`Likewise with playback limitations. The number ofplaybacks remaining can, e.g.. be
`
`encoded in an updated watermark in the music, be tracked in a separate counter, etc.
`
`More particularly considering the “copy once" usage restriction, an illustrative
`
`embodiment provides two distinct watermark payload hits: a "copy once“ bit and a “copy
`
`never" bit. when originally distributed (whether by intcrnct, wireless, or otherwise), the "copy
`
`once" bit is set, and the "copy never“ hit is on-set.
`
`When music encoded in this fashion is provided to a compliant recording device, the
`
`device is authorized to make one copy. (A compliant device is one that recognizes encoded
`
`watermark data, and behaves as dictated by the watermark.) When this privilege is exercised,
`
`the recording device must alter the data to ensure that no further copying is possible. In the
`
`illustrated embodiment, this alteration is effected by the recording device adding a second
`
`watermark to both the music, with the “copy never" bit asserted. The second watermark must
`
`generally be encoded in an "orthogonai” domain, so that it will be detectable notwithstanding
`
`the continued presence of the original watermark. Compliant equipment must then check for
`
`‘both watermarks, and refuse to copy ifeithcr is found to have the "copy never" hit asserted.
`
`One advantage to this arrangement is that ifthe watermark signal has undergone some
`
`form of corruption (e.g. scaling or resampiing), the first waterrnark may have been weakened.
`
`In contrast, the second watermark will be native to the corrupted signal, and thus he more easily
`
`detected. (The corruption may aiso contribute to the orthogonality of one watermark relative to
`
`the other, since the two watermarks may not have precisely the same time base or other
`
`foundation.)
`
`Samsung Ex. 1220 p. 251
`
`

`
`W0 G0l?l)S23
`
`PCTIUSOO/13798
`
`-21-
`
`An alternative approach is not to encode the "copy never" hit in the original rnt1sic,hut
`
`leave this bit (in whatever manifestation) blank (i.e. neither “l" nor "0”}. In transform-based
`
`watermark techniques, this can mean leaving transform coefficient(s) corresponding to the
`
`“copy never" hit unchanged. If the watermarking is effected in the temporal sample domain
`
`(or spatial domain, for image data). this can mean leaving certain samples (pixels) unmotiified.
`The recording device can then alter the transform coefficients and/or samples as necessary to
`
`assert the previously-uncncodcd “copy never" bit when the permitted recording is made.
`
`In such a system, compliant recording devices check for the “copy never" hit in the
`
`sole watermark, and refuse to make a copy if it is asserted {ignoring the vaiue of any “copy
`
`once" bit).
`
`A third approach to “copy once” is to set both the “copy once” and “copy never” bits.
`
`but set the former bit very weakly {e.g. using lower gain andfor high frequency DCT
`
`coefficients that do not survive certain processing). The trail “copy once" bit is designed not to
`
`survive common corruptions, e.g., rcsarnpliog, scaling, digital to anaiog conversion, etc. To
`
`further assure that the “copy once“ bit is lost, the recording device can deliberately add a weak
`
`noise signal that masks this bit (c.g. by adding a noise signal in the frequency band whose DCT
`
`coefficient conveys the “copy once” bit). In contrast, the “never copy” bit is unchanged and
`
`reliably detectable.
`
`In such a system, compliant devices check for the “copy once" bit in the sole
`
`watermark, and refuse to make a copy if it is not detected as set.
`
`These three exompies are but illustrations of many possihie techniques for changing the
`
`rights associated with a work. Many other techniques are known. See, e.g., the proposals for
`
`watermaflcbased copy controi systems for digital video at the Copy Protection Technical
`
`Working Group, ht_tQ:f/www.dvcc.co:rt/ditsgg', from which certain of the foregoing examples are
`drawn. See also Bloom et al, “Copy Protection for DVD Vi:ico,"1EEE Proceedings, Special
`Issue on Identification and Protection of Multimedia Information, June. 1999.
`
`Scaleahiiitgg
`
`One feature that is desirable in many detector embodiments is scalcabiiity. This refers
`
`to the ability of a detector to scale its computational demands to match the computational
`
`resources availabic to it. If a detector is running on a high performance Pentium III
`
`workstation, it should be “doing more” than if the same detector is running on it slow
`
`microcontrollcr. One way scalability can be achieved is by processing more or less chunks of
`
`input data (cg. temporal excerpts of music, or blocksimacroblocks of pixels in a frame ofvideo
`
`Samsung Ex. 1220 p. 252
`
`

`
`W0 00!‘!0523
`
`PCTfUSO0I13798
`
`- 22-
`
`data) to decode watermarks. For example, an input audio stream might be broken into chunks
`
`of one second each. A fast processor may complete decoding of each chunk in less than a
`
`second permitting it successively to process each chunk in the data stream. In contrast, a slow
`
`processor may require two and a half seconds to decode the watermark from a chunk. While it
`
`is processing a first chunk, the second and third pass by ttmiecoded. The processor next grabs
`
`and processes the fourth chunk, permitting the fifth and sixth to pass by un-encoded.
`
`The detector running on the fast processor is clearly more difficult to “fool," and yields
`
`a decoded watermark oi‘ higher confidence. But both systems decode the watermark, and both
`
`operate in “real time."
`
`The skipping of input data in the temporal (cg. music or video} or spatial (e.g. image
`
`or video) domain is but one example of how scaleabilrty can be achieved. Many other
`
`approaches are known to those skilled in the art. Some of these alternatives rely on spending
`
`more or less time in the data analysis phases of watermark decoding, such as crosscorrclation
`
`operations.
`
`Reference has been made to watennarked UIDS as referringto a database‘ from which
`
`"larger data strings {e.g. web addresses, musician names. etc.) can be retrieved. In some
`
`embodiments, the data record referenced by a UID can, in turn, point to several other database
`
`records. By such arrangements, it is often possible to reduce the payload of the watermark,
`
`since 2 single UID reference can lead to several different data records.
`
`Production Tools
`
`In the prior art, the watermark embedded in a source material is typically consistent and
`
`static through a work — unchanging fi'om beginning to end. But as will be recognized from the
`
`foregoing, there are many applications that are better served by changing the watermark data
`
`dynamically during the course of the work. According to another aspect of the invention, a
`production tool is provided that facilitates the selection and embedding of dynamically-
`
`changing watermark data. One such embodiment is a software program having at user interface
`
`that graphically displays the different watermark fields that are being embedded in a work, and
`
`presents a library of data (textuatly or by icons) that can be inserted into each field, and/or
`
`permits the ‘user to type in data to be encoded.
`
`r-‘mother control on the U1 controls the advance
`
`and rewind of the media, permitting the user to determine the location at which different
`
`watermark data begins and ends. Graphical paradigms known from video- and audio-editing
`
`tools can be used to indicate the starting and ending framesisamples for each different
`
`watermark payload.
`
`Samsung Ex. 1220 p. 253
`
`

`
`W0 00170523
`
`PCT/USD(lll3'T98
`
`- 23-
`
`Such a tool can be of the standalone variety,’ or can be integrated into the desktop
`
`audio- and video- production and editing tools offered by vendors such as Avid, Adobe, Jaleo.
`
`Pinnacle Systems, SoundForge, Sonic Foundry, Xing Technology. Prosoniq, and Sonic
`
`Desktop Software.
`
`Paygent-Based Systems
`
`Another aspect ofthe present invention is the use ofanonyrnous payment tokens that
`
`can be used to obtain content on the web. In one embodiment, a token comprises a 128-bit
`
`pseudo-random number, to which additional bits identifying an issuing bank (or other issuing
`
`institution) are appended. (The additional bits can be the II’ address of a web sewer of the
`
`bank, a routing number identifying the bank for electronic wire transfers, or other identifier.)
`
`The l28—bit. numbers are randomly generated by the bank ~ commonly as needed— and each
`
`represents a fixed increment of money, e.g. ten cents.
`
`A consumer wishing to have a store of currency for such commerce pays the bank, e.g.,
`
`$10 in exchange for 100 tokens. These tokens are iimisferrcd electronically to disk or other
`
`storage in the consumer‘s computer in response, e.g., to a credit card authorization, or may be
`
`provided by diskette or other storage medium over the counter at a bank branch (in which case
`
`the consumer thereafter copies the numbers into storage of his or her computer}. (Outlets other
`
`than banks can of course be employed for distributing such numbers, much in the manner that
`
`convenience and many grocery stores commonly issue money orders.)
`
`Imagine that the consumer wishes to View the final quarter of a Trailblazer basketball
`
`game that aired on television a week ago. (The consumer may have either missed the game, or
`
`may have seen it but wants to see the last quarter again.) The user directs a web browser to a
`
`web site maintained for such purpose and performs a search to identify the desired program.
`
`(Typically, the web site is maintained by the proprietor that holds the copyright in the materiai,
`
`but this need not be the case. Some material may be available at several web sites, e.g.,
`
`maintained by ABC Sports, the National Basketball Association, and Sports Illustrated.) The
`
`search can use any of various known search engines, e.g., Infoseek, Verity, ete., and can permit
`
`searching by title terms, keywords, date of airing, copyright owner, etc. By typing in, e.g.. the
`
`keyword ‘Trailblazers' and the date ‘M26199,’ the consumer is presented a listing of videos
`
`available for download. One, hopefully, is the requested game. With each listing is an
`
`indication of an associated nominal charge (e.g. 80 cents}.
`
`On clicking on a hypertext link associated with the desired basketball game, the viewer
`
`is presented a further screen with one or more options. The first of the listed options is the
`
`Samsung Ex. 1220 p. 254
`
`

`
`W0 El0l7(J523
`
`PCTIUSQDI13798
`
`- 24-
`
`entire game, with commercials. The charge is the nominal charge presented tn the earlier
`
`screen (i.e. 80 cents). Other options may include the first, second, third, and fourth quarters of
`
`the game individually, each of which — save the East, costs 20 cents. The last may be charged at
`
`a premium rate, eg., 30 cents. Clicking on the desired video option yields a further screen
`
`through which payment is effected.
`
`To pay for the requested video, the consumer instructs his or her computer to transfer
`
`three of the earlier-purchased tokens over the web to the video provider. Various user interface
`
`metaphors can be employed to facilitate this transfer, e.g., permitting the user to type the
`
`amount of money to he transferred in a dialog "box presented onscreen, or droppingfdragging
`
`icons representing tokens from an on-screen “wa1let" to an on-screen “ticket booth" (or over‘ an
`
`icon or thumbnail representing the desired content), clicking on an “increment” counter
`
`displayed adjacent the listing of the content, etc. Once the consumer has authorized a transfer
`
`of suffi cicnt tokens, the consumer’s computer sends to the web site (or to such other web
`
`address as HTML encoding in the viewed web page may indicate) the tokens. This
`
`transmission simply takes the form of the three 328+ bit numbers (the ‘-1-’ indicating the bank
`
`identifier) — in whatever packet or other format may be used by the intemet link. Once
`
`dispatched in this manner, the tokens are deleted from the user’s computer, or simply marked as
`
`spent. (Of course, in other embodiments, 3 record of the expenditure may be stored in the
`
`consumer‘s computer, e.g., with the token contents and a record ofthe audio or video purchase
`
`to which they were applied.)
`
`Since the amount of money is nominal, no encryption is provided in this embodiment,
`
`although encryption can natumlly be provided in other embodiments (c.g.. either in sending the
`
`tokens from the user to the web site, or earlier, in sending the tokens to the user). As will be
`
`seen, provided that the media provider immcdinteiy sends the tokens to the bank in real time,
`
`encryption is a nice feature but not mandatory
`On receipt of the token data, the web site immediately routes the token data to the
`
`identified bank, together with an identifier of the media provider or account to which the funds
`
`represented thereby are to be credited. The bank checks whether the 128-bit numbers have
`
`been issued by that bank, and whether they have already been spent. If the numbers are valid,
`
`the bank updates its disk-based records to indicate that the three tokens have been spent and
`
`that the bank now owes the media supplier 30 cents, which it may either pay immediately (e.g.,
`
`by crediting to an account identified by the media provider) or as one lump sum at the end of
`
`the month. The bank then sends a message to the web site confirrning that the tokens were valid
`
`Samsung Ex. 1220 p. 255
`
`

`
`WO 09170523
`
`PCT/U880!l 3798
`
`.25-
`
`and credited to the requested account. (Optionally, a message can be sent to the purchaser of
`
`the tokens (if lcnown), reporting that the tokens have been redeemed.)
`
`In response, the web site begins delivery of the requested video to the consumer. In the
`
`illustrated embodiment, the video is watermarked prior to delivery, but otherwise sent in
`
`unencryptcd fashion, typically in streaming format, but optionally in file format. (Encryption
`
`can be used in other embodiments.) The watermarking in the illustrated embodiment is
`
`accomplished on—the—fly and can include various data, including the date of downloading, the
`
`download site, the destination IP address, the identity of the purchaser (if known), etc.
`
`The large size of the video and the small charge assessed therefor provide disincentives
`
`for the consumer making illicit copies. (Especially as to archival material whose value decays
`
`with time, there is not. much after-rnarkcl demand that could be served by illicit copies, making
`
`third party compilation of such material for redistribution financially unattractive. First run
`
`video, and material that keeps a high value over time, would not be as well suited for such
`
`distribution, and could better employ technology disclosed elsewhere herein.)
`
`In some embodiments, the integrity of the received video is checked on receipt. This
`
`feature is described below in the section entitled Watermark-Based Receipts.
`
`In the illustrative system. nothing in the tokens indicates the identity of the purchaser.
`
`The web site knows the I? address of the site to which video was delivered, but need not
`
`otherwise know the identity of the purchaser. The bank would probably maintain a record of
`
`who purchased the tokens, but need not. In any event, such tokens could thereafter be
`
`exchanged among consumers, resulting in anonymity from the bank. if desired.
`
`As described above, the video excerpts from which the consumer can select include
`
`commercials. At some sites, video may he provided from which the commercials have been
`
`excised, or which is delivered in a manner that skips past the commercials without transmitting
`
`same to the consumer. Such video will naturally command a premium price. In some
`
`embodiments, the difference in price is electronically credited as compensation to accounts
`
`maintained for (or by) the advertisers, whose advertisements are not being viewed by such
`
`consumers. (The identification of advertisers to be credited is desirably permanently encoded
`
`in the video, either throughout the video (if the video has had the commercials removed
`
`therefrom), or by data in the commercials themselves (which commercials are shipped for
`
`transmission to the consumer, but can still be decoded at the video head-end. Such encoding
`
`can be by ind:-and watermarking or otherwise.)
`
`Samsung Ex. 1220 p. 256
`
`

`
`W0 i10i7B523
`
`PCTI'USfl0l13798
`
`. 26.
`
`While the foregoing discussion particularly considered video as the desired content, the
`
`same principles are equaiiy applicable in connection with audio, still imagery, and other
`content.
`
`The token-based payment method is but one of many that can be employed; the
`
`literature relating to on-line payment mechanisms is extensive. and all such systems can
`
`generally be here—emp1oyed.
`
`Tracking 128-bit tokens can be a logistical probiern for the bank. One approach is to
`
`have a memory with 10”" locations, and at each location store a two-bit value (eg. Oflrncvcr
`
`issucd;,01=issued but not spent; l0=issued and spent; lE=reserved). More complete data couid
`
`alternatively be stored, but such a memory would be irnpractically large.
`
`One alternative approach is to hash each I28-hit number, when issued, to a much
`
`smaller key value (e.g. 20 bits). A memory with 109° locations can be indexcdrby this key.
`Each such location can include four data: an issued lZ8~bit token number that hashes to that
`
`value, first and second date fields indicating the date/time on which that token was issued and
`
`redeemed, respectively, and a link specifying the address of a next memory location. That next
`
`memory location (outside of the original I02” locations) can include four more data, this time
`
`for a second issued=i28-bit token number that hashed to the original key value, two date fields,
`
`and again with a link to a subsequent storage location, etc.
`
`When a 128-bit random number is generated, the original memory location indexed by
`
`the hash code of that number is checked for an earlier number of the identical value {to avoid
`
`issuance of duplicate tokens). Each successive location in the Einltcd chain of memory
`
`iocations is checked for the same 128-bit number. When the end of the linked chain is reached,
`
`the bank knows that the 128-bit random number has not previously been issued, and writes that
`
`number in the last-addressed location, together with the date of issuance, and a link to a next
`
`storage location.
`
`When a 128-bit token is received, the same linkediist processing occurs to identify 3
`
`first location, and to thereafter step through each subsequent location until a match is found
`
`between the token number and the number stored in one of the linketf memory locations. When
`
`found, that number is marked as redeemed by writing a redemption date/time in the
`
`corresponding field. If the scorch reaches the end of the linked chain without finding a match
`
`between the stored numbers and the token number, the token is treated as invalid (ie. not issued
`
`by that bank}.
`
`Other manners of tracking the large number of possible token numbers can of course be
`
`used; the foregoing is just exemplary. Or the tokens needn’t be tracked at all. Such an
`
`Samsung Ex. 1220 p. 257
`
`

`
`W0 (l0l‘f9523
`
`PCTlUS90."l3798
`
`- 27-
`
`arrangement is highly practical if the token has sufficient bits. With the illustrated 128 bits, for
`
`example, the Chan cc of two identicai tokens being issued is infinitesimaily small, so checking
`
`for duplicate issuance can he omitted if desired. In such case, the bank can simply maintain an
`
`ordered list of the token numbers still outstanding and valid. As new tokens are dispensed,
`
`their token numbers are added to the list. As tokens are redeemed, their numbers are deleted
`
`from the list. Known list processing techniques can be employed to speed such search, update.
`and delete actions.
`
`Watermark-Based Receipts
`
`Paydor-content applications commonly assume that if content is transmitted from a
`
`server (or liead—end, etc.), it is necessarily received. Sometimes this assumption is wrong.
`
`Network outages and intcrmptiorts and internet traffic load can diminish (e.g., dropped video
`
`frames), or even negate (e.g., faiied delivery), expected consumer cttjcytrtcnt of content. In
`
`such cases, the consumer is left to haggle with the content provider in order to obtain an
`
`adjustment, or refund, of assessed charges.
`
`Watermarks provide a mechanism for confirming receipt of content. If a watermark is
`
`detected continuously during a download or other delivery event, a software program (or
`
`hardware device) can issue an electronic receipt attesting that the content was properly
`
`delivered." This receipt can be stored, and/or sent to the content distributor to confirm delivery.
`
`In one embodiment, a content receiving device (c.g., computer, television or set-top box.
`
`audio appliance, etc.) periodically decodes a watermark from the received content to con firm its
`
`continued reception. For example, every five seconds a watermark detector can decode the
`
`watermark and make a record of the decoded data (or simply record the fact of continued
`
`detection of the same watermark). When a changed watcrrnark is detected (i.c., reception of a
`
`different content object begin 5), the duration of the previously-received content is logged, and a
`
`receipt is issued.
`
`In a related embodiment, the last portion (c.g., 5 seconds. frame, etc.) of the content
`
`hears it different “end of content" watermark that triggers issuance of a receipt. Such a
`
`watermark can indicate the length of the content, to serve as a cross-check against the periodic
`
`watermark polling. (E.g., ifpctiodic sampling at 2 second intervals yields 545 samples
`
`corresponding to the same content, and if the “end of content" watermark indicates that the
`
`content was 1090 seconds long, then receipt of the entire content can be confirmed.)
`
`In another embodiment, the watermark can change during the course of the content by
`
`including, e.g.. a datum that increments every frame or other increment of time (e.g., flame
`
`Samsung Ex. 1220 p. 258
`
`

`
`W0 90179523
`
`PCTHJSOOI13198
`
`. 23,.
`
`number, time stamp, ete.). A watermark detector can monitor the continued incrementing of
`
`this datum throughout the content to confirm that no part was garbled (which would destroy the
`
`watermark) or was otherwise missing. Again, at the end of deiivery, the receiving system can
`issue a confirmation that XXX frames/seconds/etc. of the identified content were received.
`
`One application of such technology is to biil for content based on receipt, rather than
`
`transmission. Moreover, billings can be adjusted based on percentage of content-value
`
`received. If delivery is interrupted mid-way through (e.g., by the consumer disabling the
`
`content-receiving device). the nominal biihng for the content can be halved. Some prolonged
`
`content, e.g,, televised/web-broadcast university classes, cannot be “consumed" in one session,
`
`and are thus particularly well suited for such pay—as—you-consume billing.
`
`Another application of such technology is in advertising verification. ?resently, ads are
`
`tracked by transmission or._ less frequently, by detection of an embedded code on receipt (6.13 .
`
`Nielsen Media Research’s patents 5,850,249 and 5,733,025). However. such reception-
`
`detectors — once triggered — generally do not further note the length of time that the advertising
`
`was received, so the same data is produced regardless ofwhether only five or 511)’ seconds of a
`
`commercial is presented. Watermark monitoring as contemplated herein allows the duration of
`
`the advertising impression to be precisely tracked,
`
`In one application of this technology, recipients of advertising are provided incentives
`
`for viewing advertising in its entirety. For example, a content-receiving device can include a
`
`watermark detector that issues a receipt for each advertisement that is heard/viewed in its
`
`entirety. These receipts can be redeemed, e.g., for content tokens as described elsewhere
`
`herein, for monetary value, etc. In some embodiments, receipts are generic and can all be
`
`applied to a desired premium, regardless of the advertisements through which they were earned.
`
`In other embodiments, the receipts are associated with the particular advertisers (or class of
`
`advertisers). Thus, a TV viewer who accumulates 50 receipts from advertising originating from
`
`Procter & Gamble may be able to redeem same for a coupon good for $2.50 off any Procter &
`
`Gambia product, or receipts from Delta Airlines may be redeemed for Delta frequency flier
`
`miles (e.g.. at a rate ofone mile per minute of advertising). Such incentives are particularly
`
`useful in new forms of media that give the consumer enhanced opportunities to fast-forward or
`
`otherwise skip advertising.
`
`(Although the foregoing “receipt“ concept has been described in conjunction with
`
`watermarl-t data (and use of watermark technology is believed to be inherently advantageous in
`
`this application), the same principles can iikewise be implemented with ancillary data conveyed
`
`by other means.)
`
`Samsung Ex. 1220 p. 259
`
`

`
`W0 l]€II7ElS23
`
`PCTIUSED/13793
`
`Master Global Address
`
`As suggested above, it is desirable that each piece of content have a web address {the
`
`"Master Global Address" {MGA), or "Master 1? Address") associated with it. Such address is
`
`typicaliy conveyed with the content, e.g., by an Ii’ address watermarked therein.
`
`Consider a consumer who downloads a streaming video having an English ianguage
`
`soundtrack. The viewer may not speak English, or may otherwise prefer to listen to the
`
`snun dtraclr in another language. The user can decode the watennarlt data embedded in the
`
`video and initiate a link to the associated web address. There the user is presented with a list of
`
`soundtracks for that content object in other languages. The viewer can click on the desired
`
`tanguage and receive same via a second simultaneous transmission (c.g., a second socket
`
`channel). The consurnefs audio/‘video appliance can substitute the desired audio track for the
`
`default English track.
`
`If the streaming video and the alternative soundtrack are hosted on the same server,
`
`synchronization is straightforward. The process governing transmission of the alternative
`
`soundtrack identifies the process that is streaming video to the same IP address. Based on
`
`SMPTE, or other timefframc data, the former process syncs to the latter. (If the two data
`
`streams don’t originate through the same server, time/frame data can be relayed as necessary to
`
`the alternative soundtrack server to effect synchronization.)
`
`Another application of the Master Global Address is to serve as a point to which
`
`monitoring stations can report the presence, or passage, of content. Consider. for example, a
`
`copyright-aware node through which content signals pass, e..g., a computer node on a network,
`
`a satellite transponder, etc. Whenever the node detects passage of a media object (e.g., by
`
`reference to a fiie extension, such as MP3, IPG, AV], etc.), it sends a “ping“ over the internet to
`
`the address encoded in the object, simply reporting passage of the object. Similar monitoring
`
`facilities can be provided in end user computers, e.g., reporting FileOpen, Filesave, Printing, or
`
`other use of content bearing MGA data.
`
`This system can be expanded to include "ping" and “pong" phases of operation. When
`
`a software application (or a user appliance, such as it video or audio playback device)
`
`encounters a media object (e.g.. at time of file open. at time ofplayback, etc), it pings the
`
`MGA site to report the encounter. The MGA site “pongs” back, responding with instructions
`
`appropriate to the encounter. For example, ifthe object requires payment of a fee before fuii
`
`functionality or access is to be granted, the MGA site can respond to the application with
`
`instructions that the object be used (e.g., picyed back) oniy in some crippled state preventing
`
`Samsung Ex. 1220 p. 260
`
`

`
`W0 00f7l3523
`
`PCTiUSlliJfi3798
`
`- 30..
`
`the i.iser’s full enjoyment (e.g., impaired resolution, or impaired sound quality, or excerpts only,
`
`etc). The MGA site can also inform the user application of the terms (e.g., payment) by which
`
`full functionality can be obtained. The application can graphically or audibly present such
`
`information to the user, who can authorize a payment, if desired, so that the content can be
`
`enjoyed in a less- (or un-) crippled state. On receipt of the payment authorization, the MGA site
`
`can inform the user application that enhanced aceessiusage rights have been purchased, and that
`
`the apptication may proceed accordingly.
`
`Yet another application of the MGA is to present the user of a content object a menu of
`
`options that is customized to that object.
`
`in current graphical operating systems, when a user ciicks on an icon {e.g.. with the
`
`right mouse button), a menu is presented detailing actions that can be undertaken in connection
`
`with the icon, or the tile represented thereby. Such options are prteprogrammed (i.e., static),
`
`and are typically determined by the operating system based soleiy on the fits extension.
`
`In accordance with this aspect of the present invention, ciiclcing on an icon representing
`
`a media object initiates an internet link to the MGA site associated with the object. The MGA
`
`site responds with data that is used to customize the menu of options presented to the user in
`
`connection with that particular object.
`
`Consider an icon representing a lI’G image fiie. Righsclicking on the icon may yieid a
`
`menu that gives the user Various options presented by the operating system (e.g., delete,
`
`compress, rename), and additionai options customized in accordance with data item the
`
`object's MGA site. These customized options may include, e.g.,
`
`(a) open in 100x150 pixel format for free;
`
`(1)) open in 480x640 pixel format for ten cents;
`
`(c) open in 960xl280 pi:-tel format for twenty cents;
`
`(d) purchase rights to use this image in a newsletter having a circulation of under 1000
`
`for S 1.25;
`
`(e) display a comptete listing of license options.
`
`Clicking on options (b) or {c) initiates a commerce application through which funds are
`
`electronically transferred to the MGA site (by the above-described tokens or otherwise}. In
`
`response, the MGA site responds (e.g.. with TCP/ll’ or HTML instructions) authorizing an
`
`application on the uscr’s computer to open the file in the requested manner. (The dc fault
`
`application for IPG applications can then automatically be launched, or the computer may first
`
`query the user whether another application should be used instead.)
`
`Samsung Ex. 1220 p. 261
`
`

`
`WO 00173523
`
`PC'I'IUS{IElli3798
`
`-31-
`
`Clicking on option (:1) proceeds as above, and permits full use of the image on the
`
`computer. Moreover. the M619; site sends a digital certificate to the users computer
`
`rnemoriaiizing the usage rights purchased by the consumer.
`
`In this particular arrangement, no access control is placed on the content, c.g., by
`
`encryption. secure container technology. or the like. The nominal fees. and the ease of
`
`licensing, make it simple for the user to “do the right thing” and avoid copyright liability. In
`
`other embodirncnts,of course, known access control techniques can be used to limit use of the
`
`object until the requisite payment has been made.
`
`Naturally, records of all such transactions are also logged at the MGA site.
`
`Clicking on option (e) opens a browser window on the user‘s computer to a web site
`
`that presents a complete listing oflicensc options available for that image. (The address of this
`
`web site is included in customization data relayed to the user device from the MGA site, but not
`
`explicitly shown to the user on the menu.) Through such web site, the user can select desired
`
`rights, effect payment, and receive the neces

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket