`
`PCTIUS00/13798
`
`- 20-
`
`it is straightforward to design a music appliance to respond to usage limits of zero (e.g.
`
`“do not copy") and infinity (e.g. "unrestricted copying permitted," and “unrestricted playing
`
`permitted"). The device simply examines one or more hits in the vratennark data, and permits i
`
`(or refuses) an operation based on the value thereof.
`
`Implementation of the other usage-control restrictions can proceed in various ways.
`
`Generally speaking, the stored music can be altered to give effect to the usagecontrol
`
`restrictions. For example, if the music is "record-once,” than at the time of recording, the
`
`appliance can allcr the music. in a fashion indicating that it now has “do not record" status. This
`
`alteration can be done, c.g., by changing the watermark data embedded in the stored music (or
`
`adding Waterrnarlc data), by changing other data stored in association with the music, etc. If the
`
`original signal is stored (as opposed, e.g., to a streaming signal, such as an intcrnct or wireless
`transmssion), it too should be so-altered.
`-
`
`Likewise with playback limitations. The number ofplaybacks remaining can, e.g.. be
`
`encoded in an updated watermark in the music, be tracked in a separate counter, etc.
`
`More particularly considering the “copy once" usage restriction, an illustrative
`
`embodiment provides two distinct watermark payload hits: a "copy once“ bit and a “copy
`
`never" bit. when originally distributed (whether by intcrnct, wireless, or otherwise), the "copy
`
`once" bit is set, and the "copy never“ hit is on-set.
`
`When music encoded in this fashion is provided to a compliant recording device, the
`
`device is authorized to make one copy. (A compliant device is one that recognizes encoded
`
`watermark data, and behaves as dictated by the watermark.) When this privilege is exercised,
`
`the recording device must alter the data to ensure that no further copying is possible. In the
`
`illustrated embodiment, this alteration is effected by the recording device adding a second
`
`watermark to both the music, with the “copy never" bit asserted. The second watermark must
`
`generally be encoded in an "orthogonai” domain, so that it will be detectable notwithstanding
`
`the continued presence of the original watermark. Compliant equipment must then check for
`
`‘both watermarks, and refuse to copy ifeithcr is found to have the "copy never" hit asserted.
`
`One advantage to this arrangement is that ifthe watermark signal has undergone some
`
`form of corruption (e.g. scaling or resampiing), the first waterrnark may have been weakened.
`
`In contrast, the second watermark will be native to the corrupted signal, and thus he more easily
`
`detected. (The corruption may aiso contribute to the orthogonality of one watermark relative to
`
`the other, since the two watermarks may not have precisely the same time base or other
`
`foundation.)
`
`Samsung Ex. 1220 p. 251
`
`
`
`W0 G0l?l)S23
`
`PCTIUSOO/13798
`
`-21-
`
`An alternative approach is not to encode the "copy never" hit in the original rnt1sic,hut
`
`leave this bit (in whatever manifestation) blank (i.e. neither “l" nor "0”}. In transform-based
`
`watermark techniques, this can mean leaving transform coefficient(s) corresponding to the
`
`“copy never" hit unchanged. If the watermarking is effected in the temporal sample domain
`
`(or spatial domain, for image data). this can mean leaving certain samples (pixels) unmotiified.
`The recording device can then alter the transform coefficients and/or samples as necessary to
`
`assert the previously-uncncodcd “copy never" bit when the permitted recording is made.
`
`In such a system, compliant recording devices check for the “copy never" hit in the
`
`sole watermark, and refuse to make a copy if it is asserted {ignoring the vaiue of any “copy
`
`once" bit).
`
`A third approach to “copy once” is to set both the “copy once” and “copy never” bits.
`
`but set the former bit very weakly {e.g. using lower gain andfor high frequency DCT
`
`coefficients that do not survive certain processing). The trail “copy once" bit is designed not to
`
`survive common corruptions, e.g., rcsarnpliog, scaling, digital to anaiog conversion, etc. To
`
`further assure that the “copy once“ bit is lost, the recording device can deliberately add a weak
`
`noise signal that masks this bit (c.g. by adding a noise signal in the frequency band whose DCT
`
`coefficient conveys the “copy once” bit). In contrast, the “never copy” bit is unchanged and
`
`reliably detectable.
`
`In such a system, compliant devices check for the “copy once" bit in the sole
`
`watermark, and refuse to make a copy if it is not detected as set.
`
`These three exompies are but illustrations of many possihie techniques for changing the
`
`rights associated with a work. Many other techniques are known. See, e.g., the proposals for
`
`watermaflcbased copy controi systems for digital video at the Copy Protection Technical
`
`Working Group, ht_tQ:f/www.dvcc.co:rt/ditsgg', from which certain of the foregoing examples are
`drawn. See also Bloom et al, “Copy Protection for DVD Vi:ico,"1EEE Proceedings, Special
`Issue on Identification and Protection of Multimedia Information, June. 1999.
`
`Scaleahiiitgg
`
`One feature that is desirable in many detector embodiments is scalcabiiity. This refers
`
`to the ability of a detector to scale its computational demands to match the computational
`
`resources availabic to it. If a detector is running on a high performance Pentium III
`
`workstation, it should be “doing more” than if the same detector is running on it slow
`
`microcontrollcr. One way scalability can be achieved is by processing more or less chunks of
`
`input data (cg. temporal excerpts of music, or blocksimacroblocks of pixels in a frame ofvideo
`
`Samsung Ex. 1220 p. 252
`
`
`
`W0 00!‘!0523
`
`PCTfUSO0I13798
`
`- 22-
`
`data) to decode watermarks. For example, an input audio stream might be broken into chunks
`
`of one second each. A fast processor may complete decoding of each chunk in less than a
`
`second permitting it successively to process each chunk in the data stream. In contrast, a slow
`
`processor may require two and a half seconds to decode the watermark from a chunk. While it
`
`is processing a first chunk, the second and third pass by ttmiecoded. The processor next grabs
`
`and processes the fourth chunk, permitting the fifth and sixth to pass by un-encoded.
`
`The detector running on the fast processor is clearly more difficult to “fool," and yields
`
`a decoded watermark oi‘ higher confidence. But both systems decode the watermark, and both
`
`operate in “real time."
`
`The skipping of input data in the temporal (cg. music or video} or spatial (e.g. image
`
`or video) domain is but one example of how scaleabilrty can be achieved. Many other
`
`approaches are known to those skilled in the art. Some of these alternatives rely on spending
`
`more or less time in the data analysis phases of watermark decoding, such as crosscorrclation
`
`operations.
`
`Reference has been made to watennarked UIDS as referringto a database‘ from which
`
`"larger data strings {e.g. web addresses, musician names. etc.) can be retrieved. In some
`
`embodiments, the data record referenced by a UID can, in turn, point to several other database
`
`records. By such arrangements, it is often possible to reduce the payload of the watermark,
`
`since 2 single UID reference can lead to several different data records.
`
`Production Tools
`
`In the prior art, the watermark embedded in a source material is typically consistent and
`
`static through a work — unchanging fi'om beginning to end. But as will be recognized from the
`
`foregoing, there are many applications that are better served by changing the watermark data
`
`dynamically during the course of the work. According to another aspect of the invention, a
`production tool is provided that facilitates the selection and embedding of dynamically-
`
`changing watermark data. One such embodiment is a software program having at user interface
`
`that graphically displays the different watermark fields that are being embedded in a work, and
`
`presents a library of data (textuatly or by icons) that can be inserted into each field, and/or
`
`permits the ‘user to type in data to be encoded.
`
`r-‘mother control on the U1 controls the advance
`
`and rewind of the media, permitting the user to determine the location at which different
`
`watermark data begins and ends. Graphical paradigms known from video- and audio-editing
`
`tools can be used to indicate the starting and ending framesisamples for each different
`
`watermark payload.
`
`Samsung Ex. 1220 p. 253
`
`
`
`W0 00170523
`
`PCT/USD(lll3'T98
`
`- 23-
`
`Such a tool can be of the standalone variety,’ or can be integrated into the desktop
`
`audio- and video- production and editing tools offered by vendors such as Avid, Adobe, Jaleo.
`
`Pinnacle Systems, SoundForge, Sonic Foundry, Xing Technology. Prosoniq, and Sonic
`
`Desktop Software.
`
`Paygent-Based Systems
`
`Another aspect ofthe present invention is the use ofanonyrnous payment tokens that
`
`can be used to obtain content on the web. In one embodiment, a token comprises a 128-bit
`
`pseudo-random number, to which additional bits identifying an issuing bank (or other issuing
`
`institution) are appended. (The additional bits can be the II’ address of a web sewer of the
`
`bank, a routing number identifying the bank for electronic wire transfers, or other identifier.)
`
`The l28—bit. numbers are randomly generated by the bank ~ commonly as needed— and each
`
`represents a fixed increment of money, e.g. ten cents.
`
`A consumer wishing to have a store of currency for such commerce pays the bank, e.g.,
`
`$10 in exchange for 100 tokens. These tokens are iimisferrcd electronically to disk or other
`
`storage in the consumer‘s computer in response, e.g., to a credit card authorization, or may be
`
`provided by diskette or other storage medium over the counter at a bank branch (in which case
`
`the consumer thereafter copies the numbers into storage of his or her computer}. (Outlets other
`
`than banks can of course be employed for distributing such numbers, much in the manner that
`
`convenience and many grocery stores commonly issue money orders.)
`
`Imagine that the consumer wishes to View the final quarter of a Trailblazer basketball
`
`game that aired on television a week ago. (The consumer may have either missed the game, or
`
`may have seen it but wants to see the last quarter again.) The user directs a web browser to a
`
`web site maintained for such purpose and performs a search to identify the desired program.
`
`(Typically, the web site is maintained by the proprietor that holds the copyright in the materiai,
`
`but this need not be the case. Some material may be available at several web sites, e.g.,
`
`maintained by ABC Sports, the National Basketball Association, and Sports Illustrated.) The
`
`search can use any of various known search engines, e.g., Infoseek, Verity, ete., and can permit
`
`searching by title terms, keywords, date of airing, copyright owner, etc. By typing in, e.g.. the
`
`keyword ‘Trailblazers' and the date ‘M26199,’ the consumer is presented a listing of videos
`
`available for download. One, hopefully, is the requested game. With each listing is an
`
`indication of an associated nominal charge (e.g. 80 cents}.
`
`On clicking on a hypertext link associated with the desired basketball game, the viewer
`
`is presented a further screen with one or more options. The first of the listed options is the
`
`Samsung Ex. 1220 p. 254
`
`
`
`W0 El0l7(J523
`
`PCTIUSQDI13798
`
`- 24-
`
`entire game, with commercials. The charge is the nominal charge presented tn the earlier
`
`screen (i.e. 80 cents). Other options may include the first, second, third, and fourth quarters of
`
`the game individually, each of which — save the East, costs 20 cents. The last may be charged at
`
`a premium rate, eg., 30 cents. Clicking on the desired video option yields a further screen
`
`through which payment is effected.
`
`To pay for the requested video, the consumer instructs his or her computer to transfer
`
`three of the earlier-purchased tokens over the web to the video provider. Various user interface
`
`metaphors can be employed to facilitate this transfer, e.g., permitting the user to type the
`
`amount of money to he transferred in a dialog "box presented onscreen, or droppingfdragging
`
`icons representing tokens from an on-screen “wa1let" to an on-screen “ticket booth" (or over‘ an
`
`icon or thumbnail representing the desired content), clicking on an “increment” counter
`
`displayed adjacent the listing of the content, etc. Once the consumer has authorized a transfer
`
`of suffi cicnt tokens, the consumer’s computer sends to the web site (or to such other web
`
`address as HTML encoding in the viewed web page may indicate) the tokens. This
`
`transmission simply takes the form of the three 328+ bit numbers (the ‘-1-’ indicating the bank
`
`identifier) — in whatever packet or other format may be used by the intemet link. Once
`
`dispatched in this manner, the tokens are deleted from the user’s computer, or simply marked as
`
`spent. (Of course, in other embodiments, 3 record of the expenditure may be stored in the
`
`consumer‘s computer, e.g., with the token contents and a record ofthe audio or video purchase
`
`to which they were applied.)
`
`Since the amount of money is nominal, no encryption is provided in this embodiment,
`
`although encryption can natumlly be provided in other embodiments (c.g.. either in sending the
`
`tokens from the user to the web site, or earlier, in sending the tokens to the user). As will be
`
`seen, provided that the media provider immcdinteiy sends the tokens to the bank in real time,
`
`encryption is a nice feature but not mandatory
`On receipt of the token data, the web site immediately routes the token data to the
`
`identified bank, together with an identifier of the media provider or account to which the funds
`
`represented thereby are to be credited. The bank checks whether the 128-bit numbers have
`
`been issued by that bank, and whether they have already been spent. If the numbers are valid,
`
`the bank updates its disk-based records to indicate that the three tokens have been spent and
`
`that the bank now owes the media supplier 30 cents, which it may either pay immediately (e.g.,
`
`by crediting to an account identified by the media provider) or as one lump sum at the end of
`
`the month. The bank then sends a message to the web site confirrning that the tokens were valid
`
`Samsung Ex. 1220 p. 255
`
`
`
`WO 09170523
`
`PCT/U880!l 3798
`
`.25-
`
`and credited to the requested account. (Optionally, a message can be sent to the purchaser of
`
`the tokens (if lcnown), reporting that the tokens have been redeemed.)
`
`In response, the web site begins delivery of the requested video to the consumer. In the
`
`illustrated embodiment, the video is watermarked prior to delivery, but otherwise sent in
`
`unencryptcd fashion, typically in streaming format, but optionally in file format. (Encryption
`
`can be used in other embodiments.) The watermarking in the illustrated embodiment is
`
`accomplished on—the—fly and can include various data, including the date of downloading, the
`
`download site, the destination IP address, the identity of the purchaser (if known), etc.
`
`The large size of the video and the small charge assessed therefor provide disincentives
`
`for the consumer making illicit copies. (Especially as to archival material whose value decays
`
`with time, there is not. much after-rnarkcl demand that could be served by illicit copies, making
`
`third party compilation of such material for redistribution financially unattractive. First run
`
`video, and material that keeps a high value over time, would not be as well suited for such
`
`distribution, and could better employ technology disclosed elsewhere herein.)
`
`In some embodiments, the integrity of the received video is checked on receipt. This
`
`feature is described below in the section entitled Watermark-Based Receipts.
`
`In the illustrative system. nothing in the tokens indicates the identity of the purchaser.
`
`The web site knows the I? address of the site to which video was delivered, but need not
`
`otherwise know the identity of the purchaser. The bank would probably maintain a record of
`
`who purchased the tokens, but need not. In any event, such tokens could thereafter be
`
`exchanged among consumers, resulting in anonymity from the bank. if desired.
`
`As described above, the video excerpts from which the consumer can select include
`
`commercials. At some sites, video may he provided from which the commercials have been
`
`excised, or which is delivered in a manner that skips past the commercials without transmitting
`
`same to the consumer. Such video will naturally command a premium price. In some
`
`embodiments, the difference in price is electronically credited as compensation to accounts
`
`maintained for (or by) the advertisers, whose advertisements are not being viewed by such
`
`consumers. (The identification of advertisers to be credited is desirably permanently encoded
`
`in the video, either throughout the video (if the video has had the commercials removed
`
`therefrom), or by data in the commercials themselves (which commercials are shipped for
`
`transmission to the consumer, but can still be decoded at the video head-end. Such encoding
`
`can be by ind:-and watermarking or otherwise.)
`
`Samsung Ex. 1220 p. 256
`
`
`
`W0 i10i7B523
`
`PCTI'USfl0l13798
`
`. 26.
`
`While the foregoing discussion particularly considered video as the desired content, the
`
`same principles are equaiiy applicable in connection with audio, still imagery, and other
`content.
`
`The token-based payment method is but one of many that can be employed; the
`
`literature relating to on-line payment mechanisms is extensive. and all such systems can
`
`generally be here—emp1oyed.
`
`Tracking 128-bit tokens can be a logistical probiern for the bank. One approach is to
`
`have a memory with 10”" locations, and at each location store a two-bit value (eg. Oflrncvcr
`
`issucd;,01=issued but not spent; l0=issued and spent; lE=reserved). More complete data couid
`
`alternatively be stored, but such a memory would be irnpractically large.
`
`One alternative approach is to hash each I28-hit number, when issued, to a much
`
`smaller key value (e.g. 20 bits). A memory with 109° locations can be indexcdrby this key.
`Each such location can include four data: an issued lZ8~bit token number that hashes to that
`
`value, first and second date fields indicating the date/time on which that token was issued and
`
`redeemed, respectively, and a link specifying the address of a next memory location. That next
`
`memory location (outside of the original I02” locations) can include four more data, this time
`
`for a second issued=i28-bit token number that hashed to the original key value, two date fields,
`
`and again with a link to a subsequent storage location, etc.
`
`When a 128-bit random number is generated, the original memory location indexed by
`
`the hash code of that number is checked for an earlier number of the identical value {to avoid
`
`issuance of duplicate tokens). Each successive location in the Einltcd chain of memory
`
`iocations is checked for the same 128-bit number. When the end of the linked chain is reached,
`
`the bank knows that the 128-bit random number has not previously been issued, and writes that
`
`number in the last-addressed location, together with the date of issuance, and a link to a next
`
`storage location.
`
`When a 128-bit token is received, the same linkediist processing occurs to identify 3
`
`first location, and to thereafter step through each subsequent location until a match is found
`
`between the token number and the number stored in one of the linketf memory locations. When
`
`found, that number is marked as redeemed by writing a redemption date/time in the
`
`corresponding field. If the scorch reaches the end of the linked chain without finding a match
`
`between the stored numbers and the token number, the token is treated as invalid (ie. not issued
`
`by that bank}.
`
`Other manners of tracking the large number of possible token numbers can of course be
`
`used; the foregoing is just exemplary. Or the tokens needn’t be tracked at all. Such an
`
`Samsung Ex. 1220 p. 257
`
`
`
`W0 (l0l‘f9523
`
`PCTlUS90."l3798
`
`- 27-
`
`arrangement is highly practical if the token has sufficient bits. With the illustrated 128 bits, for
`
`example, the Chan cc of two identicai tokens being issued is infinitesimaily small, so checking
`
`for duplicate issuance can he omitted if desired. In such case, the bank can simply maintain an
`
`ordered list of the token numbers still outstanding and valid. As new tokens are dispensed,
`
`their token numbers are added to the list. As tokens are redeemed, their numbers are deleted
`
`from the list. Known list processing techniques can be employed to speed such search, update.
`and delete actions.
`
`Watermark-Based Receipts
`
`Paydor-content applications commonly assume that if content is transmitted from a
`
`server (or liead—end, etc.), it is necessarily received. Sometimes this assumption is wrong.
`
`Network outages and intcrmptiorts and internet traffic load can diminish (e.g., dropped video
`
`frames), or even negate (e.g., faiied delivery), expected consumer cttjcytrtcnt of content. In
`
`such cases, the consumer is left to haggle with the content provider in order to obtain an
`
`adjustment, or refund, of assessed charges.
`
`Watermarks provide a mechanism for confirming receipt of content. If a watermark is
`
`detected continuously during a download or other delivery event, a software program (or
`
`hardware device) can issue an electronic receipt attesting that the content was properly
`
`delivered." This receipt can be stored, and/or sent to the content distributor to confirm delivery.
`
`In one embodiment, a content receiving device (c.g., computer, television or set-top box.
`
`audio appliance, etc.) periodically decodes a watermark from the received content to con firm its
`
`continued reception. For example, every five seconds a watermark detector can decode the
`
`watermark and make a record of the decoded data (or simply record the fact of continued
`
`detection of the same watermark). When a changed watcrrnark is detected (i.c., reception of a
`
`different content object begin 5), the duration of the previously-received content is logged, and a
`
`receipt is issued.
`
`In a related embodiment, the last portion (c.g., 5 seconds. frame, etc.) of the content
`
`hears it different “end of content" watermark that triggers issuance of a receipt. Such a
`
`watermark can indicate the length of the content, to serve as a cross-check against the periodic
`
`watermark polling. (E.g., ifpctiodic sampling at 2 second intervals yields 545 samples
`
`corresponding to the same content, and if the “end of content" watermark indicates that the
`
`content was 1090 seconds long, then receipt of the entire content can be confirmed.)
`
`In another embodiment, the watermark can change during the course of the content by
`
`including, e.g.. a datum that increments every frame or other increment of time (e.g., flame
`
`Samsung Ex. 1220 p. 258
`
`
`
`W0 90179523
`
`PCTHJSOOI13198
`
`. 23,.
`
`number, time stamp, ete.). A watermark detector can monitor the continued incrementing of
`
`this datum throughout the content to confirm that no part was garbled (which would destroy the
`
`watermark) or was otherwise missing. Again, at the end of deiivery, the receiving system can
`issue a confirmation that XXX frames/seconds/etc. of the identified content were received.
`
`One application of such technology is to biil for content based on receipt, rather than
`
`transmission. Moreover, billings can be adjusted based on percentage of content-value
`
`received. If delivery is interrupted mid-way through (e.g., by the consumer disabling the
`
`content-receiving device). the nominal biihng for the content can be halved. Some prolonged
`
`content, e.g,, televised/web-broadcast university classes, cannot be “consumed" in one session,
`
`and are thus particularly well suited for such pay—as—you-consume billing.
`
`Another application of such technology is in advertising verification. ?resently, ads are
`
`tracked by transmission or._ less frequently, by detection of an embedded code on receipt (6.13 .
`
`Nielsen Media Research’s patents 5,850,249 and 5,733,025). However. such reception-
`
`detectors — once triggered — generally do not further note the length of time that the advertising
`
`was received, so the same data is produced regardless ofwhether only five or 511)’ seconds of a
`
`commercial is presented. Watermark monitoring as contemplated herein allows the duration of
`
`the advertising impression to be precisely tracked,
`
`In one application of this technology, recipients of advertising are provided incentives
`
`for viewing advertising in its entirety. For example, a content-receiving device can include a
`
`watermark detector that issues a receipt for each advertisement that is heard/viewed in its
`
`entirety. These receipts can be redeemed, e.g., for content tokens as described elsewhere
`
`herein, for monetary value, etc. In some embodiments, receipts are generic and can all be
`
`applied to a desired premium, regardless of the advertisements through which they were earned.
`
`In other embodiments, the receipts are associated with the particular advertisers (or class of
`
`advertisers). Thus, a TV viewer who accumulates 50 receipts from advertising originating from
`
`Procter & Gamble may be able to redeem same for a coupon good for $2.50 off any Procter &
`
`Gambia product, or receipts from Delta Airlines may be redeemed for Delta frequency flier
`
`miles (e.g.. at a rate ofone mile per minute of advertising). Such incentives are particularly
`
`useful in new forms of media that give the consumer enhanced opportunities to fast-forward or
`
`otherwise skip advertising.
`
`(Although the foregoing “receipt“ concept has been described in conjunction with
`
`watermarl-t data (and use of watermark technology is believed to be inherently advantageous in
`
`this application), the same principles can iikewise be implemented with ancillary data conveyed
`
`by other means.)
`
`Samsung Ex. 1220 p. 259
`
`
`
`W0 l]€II7ElS23
`
`PCTIUSED/13793
`
`Master Global Address
`
`As suggested above, it is desirable that each piece of content have a web address {the
`
`"Master Global Address" {MGA), or "Master 1? Address") associated with it. Such address is
`
`typicaliy conveyed with the content, e.g., by an Ii’ address watermarked therein.
`
`Consider a consumer who downloads a streaming video having an English ianguage
`
`soundtrack. The viewer may not speak English, or may otherwise prefer to listen to the
`
`snun dtraclr in another language. The user can decode the watennarlt data embedded in the
`
`video and initiate a link to the associated web address. There the user is presented with a list of
`
`soundtracks for that content object in other languages. The viewer can click on the desired
`
`tanguage and receive same via a second simultaneous transmission (c.g., a second socket
`
`channel). The consurnefs audio/‘video appliance can substitute the desired audio track for the
`
`default English track.
`
`If the streaming video and the alternative soundtrack are hosted on the same server,
`
`synchronization is straightforward. The process governing transmission of the alternative
`
`soundtrack identifies the process that is streaming video to the same IP address. Based on
`
`SMPTE, or other timefframc data, the former process syncs to the latter. (If the two data
`
`streams don’t originate through the same server, time/frame data can be relayed as necessary to
`
`the alternative soundtrack server to effect synchronization.)
`
`Another application of the Master Global Address is to serve as a point to which
`
`monitoring stations can report the presence, or passage, of content. Consider. for example, a
`
`copyright-aware node through which content signals pass, e..g., a computer node on a network,
`
`a satellite transponder, etc. Whenever the node detects passage of a media object (e.g., by
`
`reference to a fiie extension, such as MP3, IPG, AV], etc.), it sends a “ping“ over the internet to
`
`the address encoded in the object, simply reporting passage of the object. Similar monitoring
`
`facilities can be provided in end user computers, e.g., reporting FileOpen, Filesave, Printing, or
`
`other use of content bearing MGA data.
`
`This system can be expanded to include "ping" and “pong" phases of operation. When
`
`a software application (or a user appliance, such as it video or audio playback device)
`
`encounters a media object (e.g.. at time of file open. at time ofplayback, etc), it pings the
`
`MGA site to report the encounter. The MGA site “pongs” back, responding with instructions
`
`appropriate to the encounter. For example, ifthe object requires payment of a fee before fuii
`
`functionality or access is to be granted, the MGA site can respond to the application with
`
`instructions that the object be used (e.g., picyed back) oniy in some crippled state preventing
`
`Samsung Ex. 1220 p. 260
`
`
`
`W0 00f7l3523
`
`PCTiUSlliJfi3798
`
`- 30..
`
`the i.iser’s full enjoyment (e.g., impaired resolution, or impaired sound quality, or excerpts only,
`
`etc). The MGA site can also inform the user application of the terms (e.g., payment) by which
`
`full functionality can be obtained. The application can graphically or audibly present such
`
`information to the user, who can authorize a payment, if desired, so that the content can be
`
`enjoyed in a less- (or un-) crippled state. On receipt of the payment authorization, the MGA site
`
`can inform the user application that enhanced aceessiusage rights have been purchased, and that
`
`the apptication may proceed accordingly.
`
`Yet another application of the MGA is to present the user of a content object a menu of
`
`options that is customized to that object.
`
`in current graphical operating systems, when a user ciicks on an icon {e.g.. with the
`
`right mouse button), a menu is presented detailing actions that can be undertaken in connection
`
`with the icon, or the tile represented thereby. Such options are prteprogrammed (i.e., static),
`
`and are typically determined by the operating system based soleiy on the fits extension.
`
`In accordance with this aspect of the present invention, ciiclcing on an icon representing
`
`a media object initiates an internet link to the MGA site associated with the object. The MGA
`
`site responds with data that is used to customize the menu of options presented to the user in
`
`connection with that particular object.
`
`Consider an icon representing a lI’G image fiie. Righsclicking on the icon may yieid a
`
`menu that gives the user Various options presented by the operating system (e.g., delete,
`
`compress, rename), and additionai options customized in accordance with data item the
`
`object's MGA site. These customized options may include, e.g.,
`
`(a) open in 100x150 pixel format for free;
`
`(1)) open in 480x640 pixel format for ten cents;
`
`(c) open in 960xl280 pi:-tel format for twenty cents;
`
`(d) purchase rights to use this image in a newsletter having a circulation of under 1000
`
`for S 1.25;
`
`(e) display a comptete listing of license options.
`
`Clicking on options (b) or {c) initiates a commerce application through which funds are
`
`electronically transferred to the MGA site (by the above-described tokens or otherwise}. In
`
`response, the MGA site responds (e.g.. with TCP/ll’ or HTML instructions) authorizing an
`
`application on the uscr’s computer to open the file in the requested manner. (The dc fault
`
`application for IPG applications can then automatically be launched, or the computer may first
`
`query the user whether another application should be used instead.)
`
`Samsung Ex. 1220 p. 261
`
`
`
`WO 00173523
`
`PC'I'IUS{IElli3798
`
`-31-
`
`Clicking on option (:1) proceeds as above, and permits full use of the image on the
`
`computer. Moreover. the M619; site sends a digital certificate to the users computer
`
`rnemoriaiizing the usage rights purchased by the consumer.
`
`In this particular arrangement, no access control is placed on the content, c.g., by
`
`encryption. secure container technology. or the like. The nominal fees. and the ease of
`
`licensing, make it simple for the user to “do the right thing” and avoid copyright liability. In
`
`other embodirncnts,of course, known access control techniques can be used to limit use of the
`
`object until the requisite payment has been made.
`
`Naturally, records of all such transactions are also logged at the MGA site.
`
`Clicking on option (e) opens a browser window on the user‘s computer to a web site
`
`that presents a complete listing oflicensc options available for that image. (The address of this
`
`web site is included in customization data relayed to the user device from the MGA site, but not
`
`explicitly shown to the user on the menu.) Through such web site, the user can select desired
`
`rights, effect payment, and receive the neces