`
`mom.
`
`:m
`
`mm
`
`OE
`
`
`
`m:.DmH~:.._.<mtmyma
`
`IE}omtéozm
`
`>wV_
`
`
`
`w._.DmH~:L.<zmhea
`
`
`
`I._.H3omtéozm
`
`>wv_
`
`m8
`
`m._E>wV_
`
`
`
`m_._E>m_V_
`
`
`
`
`
`m:EV_mE>m_v_Eomxm
`
`Sm
`
`.m._EOHmzH:o<z
`
`_m._EDHmzEo<z
`
`
`
`..:.:.DmE._L.<mtmzma
`
`IE3omtzozm
`
`>wv_
`
`
`
`mmmzozmmo:._ozH
`
`
`
`ammom._.mOn=.,:mo
`
`zofiéfifizme
`
`mzEo<z
`
`.$2058
`
`zoE<z~_EzH
`
`w._.DmE._.._.<E56
`
`IE3omtzbzm
`
`>wv_
`
`
`
`mzEo<zmmo:._ozH
`
`.59
`
`om3o.:<nommmzoz
`
`no:58$030.:
`
`mEo._xm
`
`zo:<zmou_zH
`
`E2058
`
`Sm
`
`m8
`
`45
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3001
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3001
`
`
`
`
`EP 0 679 977 A1
`
`mmom
`
`zo:<zmon_E
`
`
`
`H653mmo3ozHIE3m:<E:
`
`
`
`mzEo<zEon?on.E85
`
`we.9mzEo<z
`
`
`
`E2058Em:wEon_§
`
`moH2300Qz<
`
`
`
`>wv_>mv_
`
`
`
`IE3om_EEozm_I53om_EEozm
`
`_m:_Emy.Eon=>:mjmmy
`
`
`
`mSm5E<zm:m»mmH3mHmhH<mtmgma
`
`
`
`
`my>wv_
`
`
`
`mSm5E<zmzmamFDmHm»»<wtmzwa
`
`
`
`
`
`
`
`IE3omtéozmIE3omriozm
`
`mjmDHmzEo<zman.DHmzEo<z
`
`
`
`
`
`m:.EV_m8_>wV_Eomxm
`
`Sm
`
`mam
`
`:m
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3002
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3002
`
`
`
`
`
`«modmm©_
`
`moo_
`
`_mo_
`
`\/\moysom
`
`»m¥
`
`
`
`mmumzfitmm..©_mm._.Dn_ZOO
`
`EP 0 679 977 A1
`
`»mozmz
`
`<Howz
`
`op>moo
`
`»mozmz
`
`<Homz
`
`mwumz<m»
`
`»wxmmo_
`
`zoH»m>mozm
`
`zoH»<zmmo
`
`zoH»m»mowo
`
`zoH»<mmmo
`
`mzH:o<z
`
`zoH~<oHuHkzmoH
`
`m4Hu
`
`<k<D
`
`
`
`mmkzsoopmomxmn
`
`47
`
`»mozmz
`
`<_omz
`
`OH»moo
`
`»mozwz
`
`<Homz
`
`zoH»m>mozm
`
`zoH»<mmmo
`
`zoH»m»momo
`
`zoH»<mm¢o
`
`m4Hm>m¥
`
`
`
`>m¥xmzokmnou
`
`
`
`>mxposoomma
`
`
`kmomxm
`
`
`
`>uHDOZDH89mz=._o<zm<m._o-
`
`
`
`zoHH<mmmoHmomxmwmOHM.
`
`<._.<o
`
`8wk:9QmzEo<z-
`
`
`
`.._<>mm._.zH.35n
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3003
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3003
`
`
`
`
`
`
`
`
`
`
`
`
`85
`
`ymtazoo
`
`m.=u_my
`
`
`
`>wv_$20520u
`
`
`
`>m_V_580$..
`
`89
`
`zofiniozm
`
`zocfimmo
`
`
`
`._.wOm<._./\/N05B9
`
`zocaceomo
`
`zo:.§mn_o
`
`:9:too
`
`
`
`«Sm:Eozmz
`
`89
`
`EomfiE00
`
`9.9mzEo<z
`
`
`
`sow:éozmz
`
`
`
`
`
`m_zEo<zm<m._o.
`
`mmm:4<>mm:=._SE-zflmmamoo_omuHo:mom<z899oz<m>m:E.my_
`
`
`
`EP 0 679 977 A1
`
`
`
`
`<55m5mEt.<momnomno
`
`
`
`
`
`
`
`mwpzsooEomxw:
`
`
`
`mzEo<zmomaom1
`
`DH
`
`mzEo<z
`
`mm,Sn_zoo
`
`89
`
`
`
`
`
`
`
`
`
`zoC<oECzmQzoctéozmzofinzeomozomutoo
`
`
`
`E.<oEhazooEomé.:53
`
`
`
`
`
`
`
`4<>mm»zH._<E._-Eomi.9mzEo<z9mzioé-mE3%
`
`58:
`
`
`
`man.zo:.§w._ozoC<mmn_oEozmz
`
`
`
`
`
`:535mm.oHn_
`
`DHmzEo<z
`
`
`m:.3mEC.<ymSn_zoo
`89zotfimaoESE
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3004
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3004
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`0 ""'°""" "““"'
`
`EUROPEAN SEARCH REPORT
`-
`
`“”""“°"""""'
`EP 95 10 5400
`
`DOCUMENTS CONSIDERED TO BE RELEVANT
`
`H0-A-94 07204 (UNILOC)
`' abstract; figures 41,Z.8 '
`line 5 '
`* page 6,
`line 11 - page 9,
`' page 10,
`line 3 - line 10 '
`' page 12,
`line 7 - page 17,
`
`line 13 '
`
`mucmon (In(.C|.6)
`
`1,9
`
`
`
`G06F1/00
`G06F1Z/14
`
`
`
`
`
`
`
`
`
`X
`
`
`
`
`
`
` GB-A-2 136 175 (ATALLA)
`
`' the whole document '
`
`line 1 '
`line 50 '
`
`EP-A-0 268 139 (IBM)
`' column 1,
`line 1 - column 3,
`' column 6,
`line 7 - column 7,
`column 9,
`line 20 - line 29 '
`column 19,
`line 9 - line 50 '
`column 21,
`line 6 - line 18 '
`
`IIII
`
`claims 2,9 ' EP-A-0 561 685 (FUJITSU)
`
`' the whole document '
`
`
`
`Plnzoturch
`
`Dlndphnllhnud
`
`B-1-
`
`THE HAGUE
`
`25 July 1995
`
`Povell, D
`
`CA1'I1G0lYOF(II'l>2D l)0(‘.U'MD\"l'S
`
`EE
`
`
`
`'l':mu-yuphdal: uluiyhg lhcjvemion
`l::a:I.lap::nIlo¢:nun.bupH::belm,or
`g
`Iflalhfilhglnn
`R
`Xzpu-tluxlulyrdevlatlfulauhau
`Dmnuanaltdtalhthc
`..
`Y:parda:luIyrdanm|1u:|H:ulliIhul)tha'
`
`
`L:4na:nmIdtu(uo¢am:uu
`5
`bcnmanohbenncutqry
`__..........................—.....—.—.._..............
`g
`A:latno|pp't:lhct.poui
`
`
`t:naahadI.|esx-opnalhnflparvupundhg
`-.
`0:nm—i|madIsdnsnn
`
` H
`Pzintandhielncnnmt
`2
`.
`
`
`
`
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3005
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3005
`
`
`
`Europfiiechee Patentamt
`
`European Patent Office
`
`Office européen des brevets
`
`lllllllllllllillllllllllllllllllllllllllllllllllilllllllliillililll
`
`(11)
`
`EP 0 715 243 A1
`
`(12)
`
`EUROPEAN PATENT APPLICATION
`
`(43) Date of publication:
`05.06.1996 Bulletin 1996/23
`
`(51) |ntC|.5: G06F 1/00, GO6F 17/60
`
`(21) Application number: 953084142
`
`(22) Date of filing: 23.11.1995
`
`(84) Designated Contracting States:
`DE FR GB
`
`(30) Priority: 23.11.1994 US 344773
`
`(71) Applicant: XEROX CORPORATION
`Rochester New York 14644 (US)
`
`(72) inventors:
`0 Steflk, Mark J.
`Woodslde, California 94062 (US)
`
`- Plrolll, Peter L.T.
`El Cerrrlto, California 94530 (US)
`- Merkle, Ralph C.
`Sunnyvale, California 94087 (US)
`
`(74) Representative: Goode, Ian Roy et al
`Rank Xerox Ltd
`Patent Department
`Parkway
`Marlow Bucklnghamshlre SL7 1YL (GB)
`
`-
`
`
`
`(54)
`
`System for controlling the distribution and use of digital works having a fee reporting
`mechanism
`
`A fee accounting mechanism for reponing fees
`(57)
`associated with the distribution and use of digital works.
`Usage rights and fees are attached to digital works. The
`usage rights define how the digital work may be used or
`further distributed. Usage fees are specified as part oi
`a usage right. The digital works and their usage rights
`and fees are stored in repositories (201). The repositor-
`
`ies control access to the digital works. Upon determina-
`tion that the exercise of a usage right requires a fee, the
`repository generates a tee reporting transaction (302).
`Fee reporting is done to a credit sewer (301). The credit
`server collects the fee information and periodically
`transmits it to a billing clearinghouse (303).
`
`Repository
`
`5
`Billing
`Clearinghouse 3
`303
`E
`
`Fig. 3
`
`
`Prhzed byJouve, 75am PARIS (FR)
`
`EP0715243A1
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3006
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3006
`
`
`
`Description
`
`EP 0 715 243 A1
`
`The present invention relates to the field of distribution and usage rights enforcement for digitally encoded works.
`A fundamental issue facing the publishing and information industries as they consider electronic publishing is how
`to prevent the unauthorized and unaccounted distribution or usage of electronically published materials. Electronically
`published materials are typically distributed in a digital form and recreated on a computer based system having the
`capability to recreate the materials. Audio and video recordings, software, books and multimedia works are all being
`electronically published. Companies in these industries receive royalties for each accounted for delivery of the mate-
`rials, e.g. the sale of an audio CD at a retail outlet. Any unaccounted distribution of a work results in an unpaid royalty
`(e.g. copying the audio recording CD to another digital medium.)
`The ease in which electronically published works can be ‘perfectly’ reproduced and distributed is a major concern.
`The transmission of digital works over networks is commonplace. One such widely used network is the Internet. The
`Internet is a widespread network facility by which computer users in many universities, corporations and government
`entities communicate and trade ideas and information. Computer bulletin boards found on the Intemet and commercial
`networks such as Compuserv and Prodigy allow for the posting and retrieving of digital information. lnforrnation services
`such as Dialog and LEXIS/NEXIS provide databases of current information on a wide variety of topics. Another factor
`which will exacerbate the situation is the development and expansion of the National lnforrnation Infrastructure (the
`NH). It is anticipated that, as the Nll grows, the transmission of digital works over networks will increase many times
`over. It would be desirable to utilize the NH for distribution of digital works without the fear of widespread unauthorized
`copying.
`
`The most straightforward way to curb unaccounted distribution is to prevent unauthorized copying and transmis-
`sion. For existing materials that are distributed in digital form, various safeguards are used. in the case of software,
`copy protection schemes which limit the number of copies that can be made or which corrupt the output when copying
`is detected have been employed. Another scheme causes software to become disabled after a predetermined period
`of time has lapsed. A technique used for workstation based software is to require that a special hardware device must
`be present on the workstation in order for the software to run, e.g., see US-A—4,932,054 entitled ‘Method and Apparatus
`for Protecting Computer Software Utilizing Coded Filter Network in Conjunction with an Active Coded Hardware Device.
`‘ Such devices are provided with the software and are commonly referred to as dongles.
`Yet another scheme is to distribute software, but which requires a ‘key’ to enable its use. This is employed in
`distribution schemes where ‘demos’ of the software are provided on a medium along with the entire product. The
`demos can be freely used, but in order to use the actual product, the key must be purchased. These schemes do not
`hinder copying of the software once the key is initially purchased.
`It is an object of the present invention to provide an improved system and method for controlling the use and
`distribution of digital works.
`The invention accordingly provides a system and method as claimed in the accompanying claims.
`In a system for the control of distribution and use of digital works, a fee reporting mechanism for reporting fees
`associated with such distribution and use is disclosed. The system includes a means for attaching usage rights to a
`digital work. The usage rights define how the digital work may be used or further distributed by a possessor of the
`digital work. Usage fees are specified as part of a usage right. The ability to report usage fees may be a condition to
`the exercise of a usage right. Further, different fees may be assigned to different usage rights.
`The present invention enables various usage fee scenarios to be used. Fees may be assessed on a per use basis,
`on a metered basis or based on a predetermined schedule. Fees may also be discounted on a predetermined schedule,
`or they can be marked-up a predetermined percentage (e.g. as a distributor fee). Fee reporting may also be deferred
`to a later time, to accommodate special deals, rebates or some other external information not yet available.
`The present invention supports usage fees in an additive fashion. Usage fees may be reponed for a composite
`digital work, i.e. a digital work comprised of a plurality of discrete digital works each having their own usage rights, and
`for distributors of digital works. Accordingly, fees to multiple revenue owners can be reported.
`Usage fee reporting is done to a credit server. The credit server collects the fee information and periodically trans-
`mits it to a billing clearinghouse. Alternatively, the credit sewer may have a pre-allocated credit which is decremented
`as fees are incurred. in this alternative embodiment, the credit server would have to be periodically reallocated with
`credits to enable further use.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`50
`
`A system and method in accordance with the invention will now be described, by way of example, with reference
`to the accompanying drawings, in which:-
`.
`
`55
`
`is a flowchart illustrating a simple instantiation of the operation of the currently preferred embodiment of
`Figure 1
`the present invention.
`
`Figure 2 is a block diagram illustrating the various repository types and the repository transaction flow between
`them in the currently preferred embodiment of the present invention.
`Figure 3 is a block diagram of a repository coupled with a credit server in the currently preferred embodiment of
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3007
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3007
`
`
`
`EP 0 715 243 A1
`
`the present invention.
`Figures 4a and 4b are examples of rendering systems as may be utilized in the currently preferred embodiment
`of the present invention.
`Figure 5 illustrates a contents file layout for a digital work as may be utilized in the currently preferred embodiment
`of the present invention.
`Figure 6 illustrates a contents file layout for an individual digital work of the digital work of Figure 5 as may be
`utilized in the currently preferred embodiment of the present invention.
`Figure 7 illustrates the components of a description block of the currently preferred embodiment of the present
`invention.
`
`Figure 8 illustrates a description tree for the contents file layout of the digital work illustrated in Figure 5.
`Figure 9 illustrates a portion of a description tree corresponding to the individual digital work illustrated in Figure 6.
`Figure 10 illustrates a layout for the rights portion of a description block as may be utilized in the currently preferred
`embodiment of the present invention.
`Figure 11 is a description tree wherein certain d-blocks have PRINT usage rights and is used to illustrate 'strict'
`and "lenient' rules for resolving usage rights conflicts.
`'
`Figure 12 is a block diagram of the hardware components of a repository as are utilized in the currently preferred
`embodiment of the present invention.
`Figure 13 is a block diagram of the functional (logical) components of a repository as are utilized in the currently
`preferred embodiment of the present invention.
`Figure 14 is diagram illustrating the basic components of a usage right in the currently preferred embodiment of
`the present invention.
`Figure 15 lists the usage rights grammar of the currently preferred embodiment of the present invention.
`Figure 16 is a flowchart illustrating the steps of certificate delivery, hotlist checking and performance testing as
`performed in a registration transaction as may be performed in the currently preferred embodiment of the present
`invention.
`
`Figure 17 is a flowchart illustrating the steps of session information exchange and clock synchronization as may
`be perlorrned in the currently preferred embodiment of the present invention, after each repository in the registration
`transaction has successfully completed the steps described in Figure 16.
`Figure 18 is a flowchart illustrating the basic flow for a usage transaction, including the common opening and
`closing step, as may be pertormed in the currently preferred embodiment of the present invention.
`Figure 19 is a state diagram of server and client repositories in accordance with a transport protocol followed when
`moving a digital workfrom the server to the client repositories, as may be performed in the currently preferred embod-
`iment of the present invention.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`OVERVIEW
`
`40
`
`A system for controlling use and distribution of digital works is disclosed. The present invention is directed to
`supporting commercial transactions involving digital works.
`Herein the terms ‘digital work‘, 'work' and 'content' refer to any work that has been reduced to a digital repre-
`sentation. This would include any audio, video, text, or multimedia work and any accompanying interpreter (e.g. soft-
`ware) that may be required for recreating the work. The term composite work refers to a digital work comprised of a
`collection of other digital works. The term ‘usage rights‘ or ‘rights’ is a term which refers to rights granted to a recipient
`of a digital work. Generally, these rights define how a digital work can be used and if it can be further distributed. Each
`usage right may have one or more specified conditions which must be satisfied before the right may be exercised.
`Figure 1 is a high level flowchart omitting various details but which demonstrates the basic operation of the present
`invention. Referring to Figure 1, a creator creates a digital work, step 101. The creator will then determine appropriate
`usage rights and fees, attach them to the digital work, and store them in Repository 1, step 102. The determination of
`appropriate usage rights and fees will depend on various economic factors. The digital work remains securely in Re-
`pository 1 until a request for access is received. The request for access begins with a session initiation by another
`repository. Here a Repository 2 initiates a session with Repository 1, step 103. As will be described in greater detail
`below, this session initiation includes steps which helps to insure that the respective repositories are trustworthy. As-
`suming that a session can be established, Repository 2 may then request access to the Digital Work for a stated
`purpose, step 104. The purpose may be, for example, to print the digital work or to obtain a copy of the digital work.
`The purpose will correspond to a specific usage right. In any event, Repository 1 checks the usage rights associated
`with the digital work to determine if the access to the digital work may be granted, step 105. The check of the usage
`rights essentially involves a determination of whether a right associated with the access request has been attached to
`the digital work and if all conditions associated with the right are satisfied. If the access is denied, repository 1 terminates
`the session with an error message, step 106. If access is granted, repository 1 transmits the digital work to repository
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3008
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3008
`
`
`
`EP 0 715 243 A1
`
`2, step 107. Once the digital work has been transmitted to repository 2, repository 1 and 2 each generate billing infor-
`mation for the access which is transmitted to a credit server, step 108. Such double billing reporting is done to insure
`against attempts to circumvent the billing process.
`Figure 2 illustrates the basic interactions between repository types in the present invention. As will become apparent
`from Figure 2, the various repository types wi|l'serve different functions. it is fundamental that repositories will share
`a core set of functionality which will enable secure and trusted communications. Referring to Figure 2, a repository
`201 represents the general instance of a repository. The repository 201 has two modes of operation; a server mode
`and a requester mode. When in the server mode, the repository will be receiving and processing access requests to
`digital works. When in the requester mode. the repository will be initiating requests to access digital works. Repository
`201 is general in the sense that its primary purpose is as an exchange medium for digital works. During the course of
`operation, the repository 201 may communicate with a plurality of other repositories, namely authorization repository
`202, rendering repository 203 and master repository 204. Communication between repositories occurs utilizing a re-
`pository transaction protocol 205.
`Communication with an authorization repository 202 may occur when a digital work being accessed has a condition
`requiring an authorization. Conceptually, an authorization is a digital certificate such that possession of the certificate
`is required to gain access to the digital work. An authorization is itself a digital work that can be moved between
`repositories and subjected to fees and usage rights conditions. An authorization may be required by both repositories
`involved in an access to a digital work.
`Communication with a rendering repository 203 occurs in connection with the rendering of a digital work. As will
`be described in greater detail below, a rendering repository is coupled with a rendering device (e.g. a printer device)
`to comprise a rendering system.
`Communication with a master repository 205 occurs in connection with obtaining an identification certificate. iden-
`tification certificates are the means by which a repository is identified as 'trustworthy'. The use of identification certif-
`icates is described below with respect to the registration transaction.
`Figure 3 illustrates the repository 201 coupled to a credit server 301. The credit server 301 is a device which
`accumulates billing information for the repository 201. The credit server 301 communicates with repository 201 via
`billing transactions 302 to record billing transactions. Billing transactions are reported to a billing clearinghouse 303
`by the credit server 301 on a periodic basis. The credit server 301 communicates to the billing clearinghouse 303 via
`clearinghouse transactions 304. The clearinghouse transactions 304 enable a secure and encrypted transmission of
`information to the billing clearinghouse 303.
`
`FiENDEFilNG SYSTEMS
`
`A rendering system is generally defined as a system comprising a repository and a rendering device which can
`render a digital work into its desired form. Examples of a rendering system may be a computer system, a digital audio
`system, or a printer. A rendering system has the same security features as a repository. The coupling of a rendering
`repository with the rendering device may occur in a manner suitable for the type of rendering device.
`Figure 4a illustrates a printer as an example of a rendering system. Referring to Figure 4, printer system 401 has
`contained therein a printer repository 402 and a print device 403. it should be noted that the the dashed line defining
`printer system 401 defines a secure system boundary. Communications within the boundary are assumed to be secure.
`Depending on the security level, the boundary also represents a barrier intended to provide physical integrity. The
`printer repository 402 is an instantiation of the rendering repository 205 of Figure 2. The printer repository 402 will in
`some instances contain an ephemeral copy of a digital work which remains until it is printed out by the print engine
`403. In other instances, the printer repository 402 may contain digital works such as fonts, which will remain and can
`be billed based on use. This design assures that all communication lines between printers and printing devices are
`encrypted, unless they are within a physically secure boundary. This design feature eliminates a potential 'fault' point
`through which the digital work could be improperly obtained. The printer device 403 represents the printer components
`used to create the printed output.
`
`Also illustrated in Figure 4a is the repository 404. The repository 404 is coupled to the printer repository 402. The
`repository 404 represents an external repository which contains digital works.
`Figure 4b is an example of a computer system as a rendering system. A computer system may constitute a ‘multi-
`function' device since it may execute digital works (e.g. software programs) and display digital works (e.g. a digitized
`photograph). Logically, each rendering device can be viewed as having its own repository, although only one physical
`repository is needed. Referring to Figure 4b, a computer system 410 has contained therein a display/execution repos-
`itory 411. The display/execution repository 411 is coupled to display device, 412 and execution device 413. The dashed
`box surrounding the computer system 410 represents a security boundary within which communications are assumed
`to be secure. The display/execution repository 411 is further coupled to a credit server 414 to report any fees to be
`billed for access to a digital work and a repository 415 for accessing digital works stored therein.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`50
`
`55
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3009
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3009
`
`
`
`STRUCTURE OF DIGITAL WORKS
`
`EP 0 715 243 A1
`
`Usage rights are attached directly to digital works. Thus, it is important to understand the structure of a digital work.
`The structure of a digital work, in particular composite digital works, may be naturally organized into an acyclic structure
`such as a hierarchy. For example, a magazine has various articles and photographs which may have been created
`and are owned by diflerent persons. Each of the articles and photographs may represent a node in a hierarchical
`structure. Consequently, controls, i.e. usage rights, may be placed on each node by the creator. By enabling control
`and lee billing to be associated with each node, a creator of a work can be assured that the rights and fees are not
`circumvented.
`
`In the currently preferred embodiment, the file information for a digital work is divided into two files: a 'contents'
`file and a ‘description tree‘ file. From the perspective of a repository, the "contents' file is a stream of addressable
`bytes whose format depends completely on the interpreter used to play, display or print the digital work. The description
`tree file makes it possible to examine the rights and fees for a work without reference to the content of the digital work.
`It should be noted that the tenn description tree as used herein refers to any type of acyclic structure used to represent
`the relationship between the various components of a digital work.
`Figure 5 illustrates the layout of a contents file. Referring to Figure 5, a digital work is comprised of story A 510,
`advertisement 511, story B 512 and story C 513.
`It is assumed that the digital work is stored starting at a relative
`address of 0. Each of the pans of the digital work are stored linearly so that story A 510 is stored at approximately
`addresses 0-30,000, advertisement 511 at addresses 30,001-40,000, story B 512 at addresses 40,001-60,000 and
`story C 513 at addresses 60,001-85K. The detail of story A 510 is illustrated in Figure 6. Referring to Figure 6, the
`story A 510 is further broken down to show text 614 stored at address 0-1500, soldier photo 615 at addresses
`1501-10,000, graphics 616 stored at addresses 10,001 -25,000 and sidebar 617 stored address 25,001 -30,000. Note
`that the data in the contents file may be compressed (for saving storage) or encrypted (for security).
`From Figures 5 and 6 it is readily observed that a digital work can be represented by its component parts as a
`hierarchy. The description tree for a digital work is comprised of a set of related descriptor blocks (d-blocks). The
`contents of each d-block is described with respect to Figure 7. Referring to Figure 7, a d~block 700 includes an identifier
`701 which is a unique identifier for the work in the repository, a starting address 702 providing the start address of the
`first byte of the work, a length 703 giving the number of bytes in the work, a rights ponion 704 wherein the granted
`usage rights and their status data are maintained, a parent pointer 705 for pointing to a parent d~b|ock and child pointers
`706 for pointing to the child d~blocks. In the currently preferred embodiment, the identifier 701 has two parts. The first
`part is a unique number assigned to the repository upon manufacture. The second part is a unique number assigned
`to the work upon creation. The rights portion 704 will contain a data structure, such as a look-up table, wherein the
`various information associated with a right is maintained. The infonnation required by the respective usage rights is
`described in more detail below. D-blocks fonn a strict hierarchy. The top d-block of a work has no parent; all other d-
`blocks have one parent. The relationship of usage rights between parent and child d~b|ocks and how conflicts are
`resolved is described below.
`
`A special type of d~block is a 'shell' d-block. A shell d-block adds no new content beyond the content of its parts.
`A shell d-block is used to add rights and fee information, typically by distributors of digital works.
`Figure 8 illustrates a description tree for the digital work of Figure 5. Referring to Figure 8. a top d~b|ock 820 for
`the digital work points to the various stories and advertisements contained therein. Here, the top d~b|ock 820 points to
`d-block 821 (representing story A 510), d-block 822 (representing the advertisement 511), d-block 823 (representing
`story B 512) and and d-block 824 (representing story C 513).
`The portion of the description tree for Story A 510 is illustrated in Figure 9. D~b|ock 925 represents text 614, d-
`block 926 represents photo 615, d-block 927 represents graphics 616 by and d-block 928 represents sidebar 617.
`The rights portion 704 of a descriptor block is further illustrated in Figure 10. Figure 10 illustrates a structure which
`is repeated in the rights portion 704 for each right. Referring to Figure 10, each right will have a right code field 1050
`and status infomiation field 1052. The right code field 1050 will contain a unique code assigned to a right. The status
`information field 1052 will contain infonnation relating to the state of a right and the digital work. Such information is
`indicated below in Table 1. The rights as stored in the rights portion 704 may typically be in numerical order based on
`the right code.
`
`10
`
`20
`
`25
`
`30
`
`40
`
`50
`
`Petitioner Apple Inc. — Exhibit 1002, p. 3010
`
`Petitioner Apple Inc. - Exhibit 1002, p. 3010
`
`
`
`70
`
`20
`
`25
`
`30
`
`35
`
`40
`
`50
`
`55
`
`EP 0 715 243 A1
`
`TABLE 1
`
`
`
`DIGITAL WOFIK STATE INFOFIMATION
`
`Prope
`
`Copies-in-Use
`
`Loan—Period
`
`Loaner-Copy
`
`Fiemaining—'l'Ime
`Document-Descr
`
`String
`
`A counter of the number of copies of a work that are in use. incremented when
`another copy is used; decremented when use is completed.
`
`out
`
`Indicatorof the maximum numberoftime-units thata document can be loaned
`Indicator that the current work is a loaned out copy of an authorized digital work.
`indicator of the remaining time of use on a metered document right.
`A string containing various identifying information about a document. The exact
`format of this is not specified, but it can include information such as a publisher
`name, author name, ISBN number. and so on.
`
`'
`
`Ftevenue-Owner
`Publication-Date
`History-list
`
`History-Flec
`
`
`
`
`
`A handle identifying a revenue ownerfor a digital work. This is used reporting
`usage fees.
`The date that the digital work was published.
`A list of events recording the repostories and dates for operations that copy,
`transfer, backup, or restore a digital work.
`
`The approach for representing digtal works by separating description data from content assumes that parts of a
`file are contiguous but takes no position on the actual representation of content. In particular, it is neutral to the question
`of whether content representation may take an object oriented approach. It would be natural to represent content as
`objects. In principle, it may be convenient to have content objects that include the billing structure and rights information
`that is represented in the d-blocks. Such variations in the design of the representation are possible and are viable
`alternatives but may introduce processing overhead, e.g. the interpretation of the objects.
`Digital works are stored in a repository as part of a hierarchical file system. Folders (also termed directories and
`sub—directories) contain the digital works as well as other folders. Digital works and folders in a folder are ordered in
`alphabetical order. The digital works are typed to reflect how the files are used. Usage rights can be attached to folders
`so that the folder itself is treated as a digital work. Access to the folder would then be handled in the same fashion as
`any other digital work As will be described in more detail below, the contents of the folder are subject to their own rights.
`Moreover, file management rights may be attached to the folder which define how folder contents can be managed.
`
`ATTACHING USAGE RIGHTS TO A DIGITAL WOFIK
`
`It is fundamental to the present invention that the usage rights are treated as part of the digital work As the digital
`work is distributed, the scope of the granted usage rights will remain the same or may be narrowed. For example, when
`a digital work is transferred from a document server to a repository, the usage rights may include the right to loan a
`copy for a predetermined period of time (called the original rights). When the repository loans out a copy of the digital
`work, the usage rights in the leaner copy (called the next set of rights) could be set to prohibit any further rights to loan
`out the copy. The basic idea is that one cannot grant more rights than they have.
`The attachment of usage rights into a digital work may occur in a variety of ways. If the usage rights will be the
`same for an entire digital work, they could be attached when the digital work is processed for deposit in the digital work
`sewer. In the case of a digital work having different usage rights for the various components, this can be done as the
`digital work is being created. An authoring tool or digital work assembling tool could be utilized which provides for an
`automated process of attaching the usage rights.
`_
`As will be described below, when a digital work is copied, transferred or loaned, a ‘next set of rights‘ can be
`specified. The'next set of rights" will be attached to the digital work as it is transported.
`
`Resolving Conflicting Rights
`
`Because each part of a digital work may have its own usage rights. there will be instances where the rights of a
`‘contained part‘ are different from its parent or container part. As a result, conflict rules must be established to dictate
`when and how a right may be exercised. The hierarchical structure of a digital work facilitates the enforcement of such
`rules. A "strict" rule would be as follows: a