`Downs et al.
`
`US006226618B1
`US 6,226,618 B1
`May 1, 2001
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`(54)
`
`(75)
`
`ELECTRONIC CONTENT DELIVERY
`SYSTEM
`
`Inventors: Edgar Downs, Fort Lauderdale;
`George Gregory Gruse, Lighthouse
`Point; Marco M. Hurtado, Boca
`Raton; Christopher T. Lehman, Delray
`Beach; Kenneth Louis Milsted,
`Boynton Beach, all of FL (US); J e?'rey
`B. Lotspiech, San Jose, CA (US)
`
`(73)
`
`Assignee: International Business Machines
`Corporation, Armonk, NY (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21)
`(22)
`
`(51)
`
`(52)
`
`(58)
`
`(56)
`
`Appl. No.: 09/133,519
`Filed:
`Aug. 13, 1998
`
`Int. Cl.7 ...................................................... .. H04L 9/00
`
`US. Cl. ................................... .. 705/1; 705/1; 705/26;
`705/27; 705/51; 705/53; 705/57; 705/59;
`705/71; 380/4; 380/23; 380/24; 380/25;
`380/44; 380/279; 380/281; 380/282
`
`Field of Search .................................. .. 705/4, 51, 53,
`705/57, 59, 71, 26, 27; 380/4, 44, 23, 25,
`281, 282, 279; 707/9
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,200,770
`4,218,582
`4,272,810
`4,405,829
`4,424,414
`4,463,387
`4,528,643
`4,731,840
`4,757,534
`
`4/1980 Hellman et al. .
`8/1980 Hellman et al. .
`6/1981 Gates et al. .
`9/1983 Rivest et al. .
`1/1984 Hellman et al. .
`7/1984 Hashimoto et al. .
`7/1985 Freeny, Jr. .
`3/1988 MnisZeWski et al. .
`7/1988 Matyas et al. .
`
`4,782,529
`4,803,725
`4,809,327
`4,825,306
`4,868,687
`
`11/1988 Shima .
`2/1989 Horne et al. .
`2/1989 Shima .
`4/1989 Robers .
`9/1989 Penn et al. .
`(List continued on neXt page.)
`
`OTHER PUBLICATIONS
`J. Linn, “Privacy Enhancement for Internet Electronic Mail:
`Part I: Message Encryption and Authentication Procedures”,
`RFC 1421, Feb., 1993, pp. 1—37.
`S. Kent, “Privacy Enhancement or Internet Electronic Mail:
`Part II: Certi?cate—Based Key Management”. RFC 1422,
`Feb., 1993, pp. 1—28.
`D. Balenson, “Privace Enhancement for Internet Mail: Part
`III: Algorithms, Modes, and Indenti?ers”, RFC 1423, Feb.
`1993, pp. 1—13.
`B. Kaliski, “Privacy Enhancement for Internet Electronic
`Mail: Part IV: Key Certi?cation and Related Services”, RFC
`1424, Feb. 1993, pp. 1—8.
`* cited by examiner
`Primary Examiner—James P. Trammell
`Assistant Examiner—Nga B. Nguyen
`(74) Attorney, Agent, or Firm—Steven J. Meyers; Steven J.
`Soucar; Fleit, Kain, Gibbons, Gutman & Bongini PL.
`(57)
`ABSTRACT
`
`Disclosed is a method and apparatus of securely providing
`data to a user’s system. The data is encrypted so as to only
`be decryptable by a data decrypting key, the data decrypting
`key being encrypted using a ?rst public key, and the
`encrypted data being accessible to the user’s system, the
`method comprising the steps of: transferring the encrypted
`data decrypting key to a clearing house that possesses a ?rst
`private key, Which corresponds to the ?rst public key;
`decrypting the data decrypting key using the ?rst private
`key; re-encrypting the data decrypting key using a second
`public key; transferring the re-encrypted data decrypting key
`to the user’s system, the user’s system possessing a second
`private key, Which corresponds to the second public key; and
`decrypting the re-encrypted data decrypting key using the
`second private key.
`
`26 Claims, 20 Drawing Sheets
`
`I. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
`_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __.|
`
`CO T
`P O
`(S)
`N ENT R VIDER
`
`l
`|
`
`I WOHKFLOW
`' MANAGER
`l
`TOOL
`|
`l
`I
`|
`|
`|
`|
`
`156
`
`CONTENT
`PROMOTIONS
`
`109
`
`SECURE CONTAINER PACKER TOOL
`
`I
`
`M ETADATA SC
`
`CONTENT SC
`
`173
`
`l3
`TRANSACTION SC
`
`TRANSACTION lD
`
`CLRNGH
`
`OFFER SC
`
`cmmeu
`
`OFFER SC
`
`Petitioner Apple Inc. - Ex. 1014, p. 1
`
`
`
`US 6,226,618 B1
`Page 2
`
`US. PATENT DOCUMENTS
`
`4,868,877
`4,878,246
`4,879,747
`4,905,163
`4,926,479
`4,944,006
`4,995,082
`5,005,200
`5,130,792
`5,159,634
`5,191,573
`5,214,702
`5,220,604
`5,224,163
`5,224,166
`5,260,788
`5,261,002
`5,276,901
`5,315,658
`5,319,705
`5,347,580
`5,355,302
`5,369,705
`5,371,794
`5,412,717
`5,420,927
`5,497,421
`
`9/1989
`10/1989
`11/1989
`2/1990
`5/1990
`7/1990
`2/1991
`4/1991
`7/1992
`10/1992
`3/1993
`5/1993
`6/1993
`6/1993
`6/1993
`11/1993
`11/1993
`1/1994
`5/1994
`6/1994
`9/1994
`10/1994
`11/1994
`12/1994
`5/1995
`5/1995
`3/1996
`
`Fischer .
`
`Pastor et al. .
`Leighton et al. .
`Garber et al. .
`Goldwasser et al. .
`Citta et al. .
`
`Schnorr .
`
`Fischer .
`Tindell et al. .
`
`Reeds, III .
`Hair .
`
`Fischer .
`Gasser et al. .
`Gasser et al. .
`
`Hartman, Jr. .
`Takano et al. .
`Perlman et al. .
`Howell et al. .
`
`Micali .
`Halter et al. .
`Molva et al. .
`Martin et al. .
`Bird et al. .
`Dif?e et al. .
`
`Fischer .
`
`Micali .
`Kaufman et al. .
`
`5,509,071
`5,519,778
`5,537,475
`5,557,541
`5,581,479
`5,588,060
`5,592,664
`5,604,804
`5,606,617
`5,636,139
`5,646,992
`5,646,998
`5,666,420
`5,673,316
`5,675,734
`5,706,347
`5,710,887
`5,745,574
`5,765,152
`5,796,841
`5,864,620
`5,889,860
`5,892,900
`5,915,025
`5,982,892
`5,991,399
`5,999,629
`
`4/1996
`5/1996
`7/1996
`9/1996
`12/1996
`12/1996
`1/1997
`2/1997
`2/1997
`6/1997
`7/1997
`7/1997
`9/1997
`9/1997
`10/1997
`1/1998
`1/1998
`4/1998
`6/1998
`8/1998
`1/1999
`3/1999
`4/1999
`12/1999
`11/1999
`11/1999
`12/1999
`
`Petrie, Jr. et al. .
`Leighton et al. .
`
`Micali .
`
`Schulhof et al. .
`McLaughlin et al. .
`
`AZiZ .
`
`Starkey .
`
`Micali .
`
`Brands .
`McLaughlin et al. .
`Subler et al. .
`
`Stambler .
`
`Micali .
`
`Auerbach et al. .
`
`Hair .
`
`Burke et al. ......................... .. 705/71
`Chelliah et al. .
`
`Muftic .
`
`Erickson ................................ .. 707/9
`Cordery et al. .
`
`Pettitt ..................................... .. 380/4
`
`Eller et al.
`Ginter et al. .
`
`..................... .. 705/51
`
`Taguchi et al. ...................... .. 380/44
`Hicks et al. ......................... .. 705/71
`
`Graunke et al. ................... .. 380/279
`
`Heer et al. ........................... .. 705/51
`
`Petitioner Apple Inc. - Ex. 1014, p. 2
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 1 0f 20
`
`US 6,226,618 B1
`
`Ow ImEmO
`
`zozEo
`
`0m mmHEO
`
`» +
`
`A
`
`_J______.
`
`H
`U
`F
`
`Petitioner Apple Inc. - Ex. 1014, p. 3
`
`
`
`mtmmm;
`
`
`
`
`
`.<._.<D<._.m=>_QmFO/xmkxm
`
`
`
`Emmo_EmfizooEmmfloomp.zOEwSOo<"a4:4meNM“MAT—OO_DD<mO_In_<~n—muFZMFZOO_
`
`
`
`
`
`
`
`
`
`_|mm;mm:03
`
`
`
`_
`
`US. Patent
`
`1
`
`6,SU
`
`1B
`
`ES_
`
` ____m._f_QR“o_m_5:9023:005.A|m©_moEmEZ
`
`
`S_zoEowEozzo_5<mz<E
`m..................................-elrfi.wEmaAmvmmohwhzmpzoo
`
`
`
`55on_m.mmosoEEwhzoo_m,_Em:92m_
`wGuM29330__$2_a:_
`
`9|._OO._.ZO_.r<_.=OZOOmm
`_ESE_m2_02.50:
`
` ____________mOmmmooEV...........................................j
`
`wk“
`
`ZO_._.O<mZ<m._.
`
`004
`
`FZDOOO<
`
`OmIMHEO
`
`
`
`._<._._O_n_0_ZOE._.UMI_M
`
`Petitioner Apple Inc. - EX. 1014, p. 4
`
`Petitioner Apple Inc. - Ex. 1014, p. 4
`
`
`
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet 3 0f 20
`
`US 6,226,618 B1
`
`______________________
`
`1
`
`avmmaozozfifid
`
`UN.bNHN
`
`Q5
`
`mmIDFODmHmd‘mmg
`
`ZO_wm=>_mZ<m._.NE
`
`6
`
`Km“
`
`mmsozm.®OmmmszZ
`
`mmdezm
`
`<._.<D
`
`mmDOmw
`
`me_<._.ZOO
`
`mmxo<n_
`
`mmDOmm
`
`mmz_<._.ZOO
`
`m_m>._<z<
`
`Q3
`
`.EDD<
`
`mOOJ
`
`Ems—0.530
`
`m0_>mm_w
`
`m0<n_mm:.2_
`
`.er=>_><n_
`
`ZO_._.<n:mm>
`
`m0<u_mm_._.z_
`
`02:45
`
`_>_m:.m>mm5m
`
`Petitioner Apple Inc. - EX. 1014, p. 5
`
`Petitioner Apple Inc. - Ex. 1014, p. 5
`
`
`
`
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet 4 0f 20
`
`US 6,226,618 B1
`
`maxim
`
`zO_._.<o_..nE<
`
`
`
`._OE.zOoblue/n50
`
`oz_xm<§mmb§>
`
`zO_E>mOmo
`
`OzEOomo
`
`
`
`zo_._.<mmo._.m_._><‘_n_
`
`
`
`:202>m<mmj
`
`OZEEOOmE
`
`on
`
`>m<mmj
`
`zOEOijo
`
`mmsomw
`
`mmzcfizoo
`
`mOmmmanE
`
`km“
`
`
`
`HZMHZOO
`
`
`
`.5205.>m<mmj
`
`OS
`
`QN.DNK
`
`Petitioner Apple Inc. - EX. 1014, p. 6
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1014, p. 6
`
`
`
`
`
`
`
`
`U
`
`Cta
`
`10
`
`02f05whS
`
`6,SU
`
`1B816
`
`6,@0200n3%:
`
`mew
`
`zo_5<mz<E
`
`o.
`
`N.UNK
`
`PIozmdé/
`
`S.Sm
`
`nNew
`
`m.m1,_y0m8m
`
`mom
`
`NON
`
`NO
`N
`
`ZO_._.<O_:_n_n_<
`
`D_
`
`mew
`
`00m.
`
`Petitioner Apple Inc. - EX. 1014, p. 7
`
`Petitioner Apple Inc. - Ex. 1014, p. 7
`
`
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet 6 0f 20
`
`US 6,226,618 B1
`
`
`
`mmz_<._.ZOOmmDOmm
`
`HZwHZOO
`
`Hmmgo
`
`@mlm
`
`but/mozm
`
`.LNdOEiL-i.
`
`HZMHZOO
`
`IO_I._.m_>__2>m
`
`>m§
`
`Hmmgo
`
`mUNK
`
` 5.655
`
`
`
`EmoaEv.Emma
`
`lfiEfl+l
`
`
`
`
`
`mislm-oEEEEwszzoo
`
`Petitioner Apple Inc. - EX. 1014, p. 8
`
`Petitioner Apple Inc. - Ex. 1014, p. 8
`
`
`
`
`
`
`US. Patent
`
`m
`
`1
`
`WEE/Om
`
`S
`
`3H
`
`mtm2>>0m
`
`H.
`
`S3
`
`m._.<0_n=.rmw0
`
`yl
`2,fly.mmEzoo@>m¥oEE§2>m
`
`
`1m?uWwAfll
`
`D.”—
`
`0m
`
`
` om®MEmmaExBmoaI7-o_Em__>__2>mm=2<z%aUH“.mtmzioNMHUD-ESEmma+a
`Fzmkzoo
`
`
`
`
`
`Emma®All$25200mmaomm
`
`mEmma
`
`kzmkzoo
`
`2,6
`
`1B
`
`mV“ER%,AlEmfizoo
`
`Petitioner Apple Inc. - EX. 1014, p. 9
`
`Petitioner Apple Inc. - Ex. 1014, p. 9
`
`
`
`
`
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet8 0f20
`
`US 6,226,618 B1
`
`
`2m.mum___,.......m.m.m-_2m.mmmmmmmkmNE.wvnn_.......................mmwfiumvmmzwmmMszm_mmwfilfimwzwmmmfiwq"uMnuMSm\Ea:
`
`
`
`
`
`
`
`02:5:szEEzooHlllllllllllllllllllllllllln10w1\|||:|::1:11:11:IIunuuuuunllzrxllllllluullIIIIIIIIII}:LzoEorEzmcfizEzoo_£95zoEo::zmo:zEzoo""wmm:--,,._HHHHHHHmwwNHHHmmwfiemmzwmemflflaflH:--HHHHHHHH....mm"mom\Ea:
`
`
`
`
`
`
`
`
`
`.8N.._3.SSvS.N.ES..M.l....Ml..Sdmwmmmwmmxmmwmu:mmmwmmmmnmwwmmwwmomwmmwuwmunwma”muH:amvumamssm§aHmHWHmousnaSHH”®"0_”N"O“S.mO.BU9UBUN"!”muons
`
`mumufium“u“W“NWNNmN"3"N””W“u"NuM
`N”mo”3_Bu9HMD“9mmm”m9
`mfimu.WmS.
`
`
`
`
`
`
`
`HUEHOHOUWOHEUO”0m2“male"mlfm3OUNHWWUSUOUHO_Suuoudul_3"0“3“d.NV.d“NOuduoniduvflwnaMUOHWUMHENHMHN”H.minNumanu%nHHMHEAnwuduw
`
`
`
`
`
`GHGHSUO_HG”H”S“Ii"S"S"S_Eu"n_3"d
`
`
`
`
`wHmH.ON
`SNOJJCINOO Eleven
`
`- I BNllél—é-c-J‘Ei-911I'Cir-IV
`
`NOIiVZIHnOHiflV
`ESNEOI'I
`
`NOILVOHIHEIA
`NOIiOVSNVtLL
`
`AmvmmaozozE/md
`
`_
`
`BNISSEOOHd OS
`
`we
`
`m.DNHN
`
`Em:02m2
`
`
`
`AmvmmoSmo"Rm
`
`
`
`
`
`
`
`_mAmvaOFwO_ZO_n_._.Om_|_m_vaEm—DSOIQPZMHZOO
`
`Petitioner Apple Inc. - EX. 1014, p. 10
`
`Petitioner Apple Inc. - Ex. 1014, p. 10
`
`
`
`
`
`US. Patent
`
`1
`
`ae%
`
`02
`
`U
`
`6
`
`2
`
`1B
`
`0205demm:
`8mEm:ozm
`
`
`
`
`
`I:@550Emfizoo2:05
`AAmvmmokm
`
`9m0<w3
`
`pm@0200
`
`.__<Eo@omimto
`
`
`
`Amvomamino
`
`Emfizoo
`
`02:on
`
`Amme
`
`F:
`
`
`
`My.III.Ir"Mm8
`
`3.5mmHimwm
`
`,m8
`
`3%Sm2§
`
`Q.
`
`
`
`
`
`._.Z.n._._.ZOO8Ia,amino:AmvmmoSoEbUN,“%-OZ_m<mn_O
`
`o.zoonmnE
`
`
`
`ZO_._.O<wZ<I._.IOZIJO-@_QNQ
`
`Petitioner Apple Inc. - EX. 1014, p. 11
`
`Petitioner Apple Inc. - Ex. 1014, p. 11
`
`
`
`
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet 10 0f 20
`
`US 6,226,618 B1
`
`
`
`
`
`m—émdndEa...ca65388“..mEmmoooEEEmmmm"u
`
`
`
`29.66826
`
`Batu:0Elm
`
`
`
`
`
`W
`
`mmzoac=<5“£22.
`
`
`
`Ema—is.30E{05>
`
`mOhomEDEma:
`
`
`
`52..2.3300Euwoz».
`
`20901.2
`
`
`
`
`
`w>3>
`
`
`
`,1.6.53i.,,.,.,xw
`
`0555.5".0.:
`
`
`
`z::tangwiuficomar1:1ha
`
`.Tlllalu,
`dd.=:66.>28:22
`
`Petitioner Apple Inc. - EX. 1014, p. 12
`
`Petitioner Apple Inc. - Ex. 1014, p. 12
`
`
`
`
`U.S. Patent
`US. Patent
`
`May 1, 2001
`May 1, 2001
`
`Sheet 11 0f 20
`Sheet 11 0f 20
`
`US 6,226,618 B1
`US 6,226,618 B1
`
`mlcw.
`
`
`
`
`
`HmMDOmmHZmFZOO>>mZ
`
`OZEE<EIMH<>><H<D<Fm2OF<EOHD<
`
`ZO_._.m_DOO<
`
`
`
`
`
`mm“k
`
`.400+."ozammoomn."Fzmezoo.
`
`Oz_wmw00mn_m_mn_
`
`ZO_mmmmn=>_OODZ<
`
`HZwHZOO
`
`
`
`JOEFZOO>._._._<DO
`
`kaDQOmQ
`
`OZ_1_._<>><
`
`\ZO:.O<
`
`
`
`<F<D<Hm§._<DZ<_>_
`
`>m._.Zm_
`
`
`
`
`
`ZO_F<2IOmZ_wZOrEDZOOmO<mD
`
`%.QNK
`
`
`
`kzmfiwmmmama.er—FZOO
`
`
`
`>,_._I_<DO:_<Z_n_
`
`m02<m3mw<
`
`OmFZmFZOOom<._.<D<Hm__>_
`
`
`
`ZO_._.<m_mOZO_._.<mEO
`
`me_>mm_n5m
`
`mm<mij
`
`.E<Q<EE
`
`.oz<”z©F§§wm<
`
`.,._oo:Ezm
`
`’-
`
`KR:
`
`Petitioner Apple Inc. - EX. 1014, p. 13
`
`Petitioner Apple Inc. - Ex. 1014, p. 13
`
`
`
`
`
`
`
`
`
`US. Patent
`
`a
`
`0
`
`1
`
`6
`
`1B81
`
`2_1,_mm>mmm
`mommzzoomy_10250.3
`
`
` ommmEoM_mEmmm;mo8.;mtomEEAWMEmzo_.5_>_oE_EEzOo
`
`
`
`
`
`
`<23ngEmpzoo$30052.mo_:n_<moEmpzoo_425mom5<Exm_llllllllllllllllllllllllllllllll
`
`m2
`
`
`
`mun—50mmFZMPZOO
`
`mm“
`
`PZMFZOO
`
`mZOFOEOIQ
`
`m_._._m
`
`0_
`
`_m._M_£80:
`
`53002n_mofimmfiz
`
` memmmooEa_20:55:02zQB<mz<Emlllll_S___
`
`_63%.uVNHN_zo:o<mz<E
`
`6,_
`
`
`
`n,mmao:409zo:<:_ozoommomEtc6-cz_m<m._o_5:82S_Um2_
`
`Petitioner Apple Inc. - EX. 1014, p. 14
`
`Petitioner Apple Inc. - Ex. 1014, p. 14
`
`
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet 13 0f 20
`
`US 6,226,618 B1
`
`§~.UNK
`
`ZOFQ>¢OMQ
`
`-mm
`
`ZO_._.n_>mOZm_
`
`Im><l_n_
`
`ZO_F<03n_n_<
`
`
`
`._Om:.zoohint/moo
`
`OzEm<EmE§>
`
`zO_.E>m0mo
`
`ozfioomo
`
`
`
`ZOF<mEo._.m_._><#_
`
`
`
`.5202>¢<mm3
`
`02958:;
`
`AI
`
`mo
`
`mmeOJ_
`
`km“
`
`OD
`
`>m<mm=l_
`
`ZO_._[Om_:_._OO
`
`mm
`
`F
`
`ZOF<Oan<
`
`mmm>>0mm“mm;
`
`_
`
`mngzoo_manomm_
`
`mmemOOmm
`
`KS
`
`End:_
`
`
`
` wz§m<§wakwww_-mmfiss_IIIIIIIIIIIIIIIIII_IIIIIIIIIIIIIIIIIdAmvmmao:_-oz_m<m._o_
`
`AmmEmWV:
`
`Petitioner Apple Inc. - EX. 1014, p. 15
`
`_
`
`n:ZO_._.O<.wZ<m._.
`
`IIIIIIIIII®___7_Amvmmofim?__£61116
`
`
`EEzoo__l2:90_
`
`
`
`O_ZOI._.OMJm_._
`
`Petitioner Apple Inc. - Ex. 1014, p. 15
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 14 0f 20
`
`US 6,226,618 B1
`
`@
`l
`K 1101
`
`SELECT ALGORITHM
`& BIT RATE
`
`1102
`
`YES
`
`IS
`THERE A
`PREVIOUSLY CALCULATED
`RATE FACTOR
`?
`
`/ 1103
`
`/ 1108
`
`RETRIEvE PREVIOUSLY CALCULATED
`RATE PACToR RSTORED
`
`1104
`/
`v
`ENCODE DIGITAL CCNTENT & DISPLAY
`PROGESS USING RSTORED
`l
`
`1105
`/
`
`CALCULATE CURRENT
`RATE FACTOR RCURRENT
`l
`
`K 1106
`
`UPDATE RATE PACTCR
`RNEW = AVG (RsToRED + RCURRENT)
`l
`
`BEGIN ENCODING FOR A
`PREDETERMINED PERIoD
`OF TIME & CALCULATE NEW
`RATE PACTCR RNEW
`
`I / "09
`
`ENCODE DIGITAL CONTENT 81
`DISPLAY PROGRESS
`USING RNEW
`
`f 1107
`
`STORE RNEW FOR THIS ALGORITHM & BIT RATE
`
`1100
`
`FIG. 11*
`
`Petitioner Apple Inc. - Ex. 1014, p. 16
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 15 0f 20
`
`US 6,226,618 B1
`
`/ 1201
`
`READ IDENTIFIER ON MEDIA
`(E.G. UPC, ISRC, ISMN OR EQUIVALENT)
`
`1202
`/
`v
`INDEX INTO CONTENT PROVIDER'S
`DATABASE(S) USING IDENTIFIER
`l
`/ 1203
`
`RETRIEVE ADDITIONAL
`INFORMATION RELATED TO MEDIA
`
`l
`
`f 1204
`
`CREATING DIGITAL CONTENT
`FOR ELECTRONIC DISTRIBUTION
`
`FIG. 12
`
`Petitioner Apple Inc. - Ex. 1014, p. 17
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 16 0f 20
`
`US 6,226,618 B1
`
`I
`
`STA RT
`
`I
`
`v
`
`1301
`/
`
`SELECT MUSIC TO BE ENCODED
`
`i
`
`K 1302
`
`DETERMINE GENRE OF MUSIC
`SELECTED
`
`l
`
`K 1303
`
`DETERMINE AUDIO COMPRESSION
`LEVELS & AUDIO COMPRESSION
`ALGORITHMS TO BE USED FOR ENCODING
`
`l
`
`K 1304
`
`SELECT AUDIO SIGNAL PROCESSING
`OPERATIONS & COMPRESSION SETTINGS
`
`FIG. 13
`
`Petitioner Apple Inc. - Ex. 1014, p. 18
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 17 0f 20
`
`US 6,226,618 B1
`
`SCHEDULE DOWNLOAD
`
`LIBRARY.
`
`DOWNLOAD SCHEDULE
`nu“ ILICT mu m IGUKVE mu! an: Auuln
`
`1401
`
`llunlnuy
`lulmm
`
`Q Save a) Cancel
`
`+ USER STARTS A DOWNLOAD
`
`DOWNLOAD SCHEDULE
`CD PHDlxGRESi
`TRICK PHOGESS
`
`N66600:. Magnum!!!
`
`+ DOWNLOAD COMPLETES
`
`LIBRARY
`
`1403
`
`SORT BY 1» Tltll
`5 Artist
`
`FIG. 14
`
`Petitioner Apple Inc. - Ex. 1014, p. 19
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet 18 0f 20
`
`US 6,226,618 B1
`
` VbNGEN
`
`
`<|_.<D<._.m_>_<._.<O<._.m=>_O_DD<
`
`Pm_._.><u_n.m:0532mm><n_n_
`
`
`>>OQZ_>>>>ODZ_>>>>ODZ_>>
`
`
`><.Em_n_mJOmFZOOWJOEFZOO
`
`mmeA—Zm
`
`mmmzzhzoo
`
`I I I I I I I I I I I I | I I I I I I I I I | | | | I I I I I I I | I I I I I I I I I
`
`.1
`
`Petitioner Apple Inc. - EX. 1014, p. 20
`
`:3mom“\.
`
`
`
`mmmn-02m
`
`wJOm—PZOO
`
`Petitioner Apple Inc. - Ex. 1014, p. 20
`
`
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet19 0f20
`
`US 6,226,618 B1
`
`
`
`
`
`mWNQM,“OE.zo:<o_im<
`
`
`
`amid:mwmiommmm;
`
`__________
`
`_________
`
`_._.Zm=2m_0<z<_2F2m§m®<z<§
`
`
`
`
`
`w._.Om:,mOmjm<E<>
`
`
`
`
`
`mmO<Z<_>_FOmmemm><ni
`
`
`
`><n_n_\>mOO<._.<Q
`
`E2
`
`mam“
`
`mm:g2
`
`
`
`2929232200zofi<o_fin_<-mmkz_
`
`._<._._O_Q
`
`._.Zm_._.ZOO
`
`>I<Em3
`
`mm“
`
`Petitioner Apple Inc. - EX. 1014, p. 21
`
`Petitioner Apple Inc. - Ex. 1014, p. 21
`
`
`
`
`
`US. Patent
`
`May 1, 2001
`
`Sheet20 0f20
`
`US 6,226,618 B1
`
`.._..26.5.:66.Sam.530¢.52.,
`
`
`I—Im—l—><HmifinEu...
`A532.6.2.5
`
`.Eéma
`
`
`8.9393n.
`
`
`
`3...».—w.._:.7117.77..._—5m.950‘
`
`
`
`actu—..5930u.
`
`
`New“1D,...uwt....,..uhim>m<mmj
`“20.2300en.:,.,.,.,..,1.....,.,..,,.,..u
`
`
`
`..
`
`>m<mm_n_
`
`mFOmfimmmum:
`
`._.m_n_><._n.
`
`.
`
`no:25.
`
`noEm.
`
`Flu..III
`
`15.5.8
`
`=E<..
`
`3:.—n>mhKOm
`
`ZOx030
`
`
`
`mm>OO55ml?
`
`
`
`.rw_4><n_n_mm><._.m_
`
`
`
`Pm_._><u_n_mkowgmmmmw:
`
`DKOHZEOQ11..._.“”Whaman...
`
`
`
`
`chain...>m<mmz
`
`New“
`
`
`
`5.5.:1.965......
`
`:25.2:826
`
`
`
`m;.QNK
`
`cacaom.,Eta«
`
`:52.050
`
`gigs
`
`.95:
`
`.2.:
`
`«350.42300
`PoMEhl
`.1.>42.,..1..11Cm.wA...
`>.m<.mm_.._
`
`vowF
`
`fog~nut:A
`
`«5.6§5:859
`
`
`
`
`
` .33nomen._....1...figomoomm
`
`Petitioner Apple Inc. - EX. 1014, p. 22
`
`Petitioner Apple Inc. - Ex. 1014, p. 22
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`US 6,226,618 B1
`
`1
`ELECTRONIC CONTENT DELIVERY
`SYSTEM
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This non-provisional application claims subject matter
`that is technically related to the following applications that
`are commonly assigned herewith to International Business
`Machines (IBM).
`
`2
`barrier that is removed with electronic distribution is the
`
`requirement of the tangible recordable medium itself (e.g.,
`diskettes or CD ROMs). It costs money to copy digital
`content on to tangible media, albeit, in many cases less than
`a dollar for a blank tape or recordable CD. However, in the
`case of electronic distribution, the tangible medium is no
`longer needed. The cost of the tangible medium is not a
`factor because content is distributed electronically. Asecond
`barrier, is the format of the content itself i.e. is the content
`stored in an analog format versus a digital format. Content
`stored in an analog format, for example, a printed picture,
`when reproduced by photocopying, the copy is of lesser
`quality than the original. Each subsequent copy of a copy,
`sometimes called a generation, is of less quality than the
`original. This degradation in quality is not present when a
`picture is stored digitally. Each copy, and every generation
`of copies can be as clear and crisp as the original. The
`aggregate effect of perfect digital copies combined with the
`very low cost to distribute content electronically and to
`distribute content widely over the Internet makes it rela-
`tively easy pirate and distribute unauthorized copies. With a
`couple of keystrokes, a pirate can send hundred or even of
`thousands of perfect copies of digital content over the
`Internet. Therefore a need exists to ensure the protection and
`security of digital assets distributed electronically.
`Providers of digital content desire to establish a secure,
`global distribution system for digital content that protects
`the rights of content owners. The problems with establishing
`a digital content distribution system includes developing
`systems for digital content electronic distribution, rights
`management, and asset protection. Digital content that is
`distributed electronically includes content such as print
`media, films, games, programs, television, multimedia, and
`music.
`
`The deployment of an electronic distribution system pro-
`Vides the Digital Content Providers the ability to achieve fast
`settlement of payment through immediate sales reporting
`and electronic reconciliation as well as gain secondary
`sources of revenue through redistribution of content. Since
`the electronic digital content distribution system is not
`affected by physical inventory outages or returns, the Digital
`Content Providers and retailers may realize reduced costs
`and improved margins. Digital Content Providers could
`facilitate new, or augment existing, distribution channels for
`better timed-release of inventory. The transactional data
`from the electronic distribution system could be used to
`obtain information regarding consumer buying patterns as
`well as to provide immediate feedback on electronic mar-
`keting programs and promotions. In order to meet these
`goals, a need exists for Digital Content Providers to use an
`electronic distribution model to make digital content avail-
`able to a wide range of users and businesses while ensuring
`protection and metering of digital assets.
`Other commercially available electronic distribution sys-
`tems for digital content, such as real audio, A2B from AT&T,
`Liquid Audio Pro Corp. from Liquid Audio Pro, City Music
`Network from Audio Soft and others offer transmission of
`
`digital data over secured and unsecured electronic networks.
`The use of secured electronic networks greatly reduces the
`requirement of Digital Content Providers of distributing
`digital to a wide audience. The use of unsecured networks
`such as the Internet and Web allows the digital content to
`arrive to an end-user securely such as through the use of
`encryption. However, once the encrypted digital content is
`de-encrypted on the end-user’s machine, the digital content
`is readily available to the end-user for unauthorized
`re-distribution. Therefore a need exists for a secure digital
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Petitioner Apple Inc. - Ex. 1014, p. 23
`
`ATTORNEY
`DOC. NO.
`
`SE9-98—006
`
`SE9-98—007
`
`SE9-98—008
`
`SE9-98—009
`
`SE9-98—0 0
`
`
`
`SE9-98-0 1
`
`SE9-98—0 3
`
`SE9-98—0 4
`
`SE9-98—0 5
`
`SE9-98—0 6
`
`APPLI-
`CATION
`SERIAL TITLE OF THE
`NO.
`INVENTION
`
`INVENTOR(S)
`
`09/152,756 Secure Electronic
`Content
`Management
`
`09/209,440 Mu timedia Player
`Toolkit
`
`Kenneth L. Milsted
`George Gregory Gruse
`Marco M. Hurtado
`Edgar Downs
`Cesar Medina
`George Gregory Gruse
`John J. Dorak, Jr.
`Kennet1 L. Mi stec
`09/241,276 Mu timedia Content Kennet1 L. Mi stec
`Creation System
`Qing Gong
`Edgar Downs
`09/177,096 Sys em for Tracking George Gregory Gruse
`Enc-User Electronic John J. Dorak, Jr.
`Content
`Kenne 1 L. Mi s ec
`09/203,307 Key Management
`Jeffrey B. Lotsaiec1
`Sys em for End-
`Marco M. Hur ado
`User Digital Player George Gregory Gruse
`Kenne 1 L. Mi s ec
`09/208,774 Mu ti—media player Marco M. Hur ado
`for an Electronic
`George Gregory Gruse
`Content Delivery
`Edgar Downs
`Sys em
`Kenne 1 L. Mi s ec
`09/203,306 A method to
`Kenne 1 L. Mi s ec
`identify CD content Craig Kindell
`Qing Gong
`Richarc Spagna
`09/203,315 Too kit for
`delivering electronic Kenne 1 L. Mi s ec
`con ent from an
`David P. Lybranc
`Online store.
`Edgar Downs
`09/201,622 A method and
`Kenne 1 L. Mi s ec
`apparatus to
`Kha Kinh Nguyen
`automatically create Qing Gong
`encode audio
`A method and
`Kenne 1 L. Mi s ec
`apparatus to
`Qing Gong
`indicate an encoding
`rate for audio
`
`
`
`
`
`
`
`
`
`
`
`
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`
`The invention disclosed broadly relates to the field of
`electronic commerce and more particularly to a system and
`related tools for the secure delivery and rights management
`of digital assets, such as print media, films, games, and
`music over global communications networks such as the
`Internet and the World Wide Web.
`
`2. Description of the Related Art
`The use of global distribution systems such as the Internet
`for distribution of digital assets such as music, film, com-
`puter programs, pictures, games and other content continues
`to grow. At the same time owners and publishers of valuable
`digital content have been slow to embrace the use of the
`Internet for distribution of digital assets for several reasons.
`One reason is that owners are afraid of unauthorized copying
`or pirating of digital content. The electronic delivery of
`digital content removes several barriers to pirating. One
`
`Petitioner Apple Inc. - Ex. 1014, p. 23
`
`
`
`US 6,226,618 B1
`
`3
`content electronic distribution system that provides protec-
`tion of digital assets and ensures that the Content Provider
`(s)’ rights are protected even after the digital content is
`delivered to consumers and businesses. A need thus exists
`
`for rights management to allow for secure delivery, licensing
`authorization, and control of the usage of digital assets.
`Another reason owners of digital content have been slow
`to embrace electronic distribution is their desire to maintain
`
`and foster existing channels of distribution. Most content
`owners sell through retailers. In the music market these U.S.
`retailers include Tower Records, Peaches, Blockbuster, Cir-
`cuit City and others. Many of these retailers have Web sites
`that allow Internet users to makes selections over the Inter-
`
`10
`
`net and have selections mailed to the end-user. Example
`music Web sites include @tower, Music Boulevard and
`Columbia House. The use of electronic distribution can
`
`15
`
`remove the ability of the retail stores from differentiating
`themselves from each other and differentiate themselves
`
`from the content owners, especially on the Web. Therefore
`a need exists to provide retailers of electronic content such
`as pictures, games, music, programs and videos a way to
`differentiate themselves from each other and the content
`
`owners when selling music through electronic distribution.
`Further information on the background of protecting
`digital content can be found from the following three
`sources. “Music on the Internet and the Intellectual Property
`Protection Problem” by Jack Lacy, James Snyder, David
`Maher, of AT&T Labs, Florham Park, NJ. available online
`URL http://www. a2bmusic.com/about/papers/
`musicipp.htm. Cryptographically protected container, called
`DigiBox, in the article “Securing the Content, Not the Wire
`for Information Commerce” by Olin Sibert, David Bernstein
`and David Van Wie,
`InterTrust Technologies Corp.
`Sunnyvale, Calif. available online URL http://
`www.intertrust.com/architecture/stc.html. And “Cryptolope
`Container Technology”, an IBM White Paper, available
`online URL http:///cyptolope.ibm.com/white.htm.
`SUMMARY OF THE INVENTION
`
`Briefly, in accordance with the present invention, dis-
`closed is a method and apparatus of securely providing data
`to a user’s system. The data is encrypted so as to only be
`decryptable by a data decrypting key, the data decrypting
`key being encrypted using a first public key, and the
`encrypted data being accessible to the user’s system, the
`method comprising the steps of: transferring the encrypted
`data decrypting key to a clearing house that possesses a first
`private key, which corresponds to the first public key;
`decrypting the data decrypting key using the first private
`key; re-encrypting the data decrypting key using ia second
`public key; transferring the re-encrypted data decrypting key
`to the user’s system, the user’s system possessing a second
`private key, which corresponds to the second public key; and
`decrypting the re-encrypted data decrypting key using the
`second private key.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram illustrating an over view of a
`Secure Digital Content Electronic Distribution System
`according to the present invention.
`FIG. 2 is a block diagram illustrating an example Secure
`Container (SC) and the associated graphical representations
`according to the present invention.
`FIG. 3 is a block diagram illustrating an overview of the
`encryption process for a Secure Container (SC) according to
`the present invention.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`FIG. 4 is a block diagram illustrating an overview of the
`de-encryption process for a Secure Container (SC) accord-
`ing to the present invention.
`FIG. 5 is a block diagram illustrating an overview of the
`layers for the Rights Management Architecture of the Secure
`Digital Content Distribution System of FIG. 1 according to
`the present invention.
`FIG. 6 is a block diagram illustrating an overview of the
`Content Distribution and Licensing Control as it applies to
`the License Control Layer of FIG. 5.
`FIG. 7 is an illustration of an example user interface for
`the Work Flow Manager Tool of FIG. 1 according to the
`present invention.
`FIG. 8 is a block diagram of the major tools, components
`and processes of the Work Flow Manager corresponding to
`the user interface in FIG. 7 according to the present inven-
`tion.
`
`FIG. 9 is a block diagram illustrating the major tools,
`components and processes of an Electronic Digital Content
`Store of FIG. 1 according to the present invention.
`FIG. 10 is a block diagram illustrating the major compo-
`nents and processes of an End-User Device(s) of FIG. 1
`according to the present invention.
`FIG. 11 is a flow diagram of a method to calculate an
`encoding rate factor for the Content Preprocessing and
`Compression tool of FIG. 8 according to the present inven-
`tion.
`
`FIG. 12 is a flow diagram of a method to automatically
`retrieve additional information for the Automatic Metadata
`
`Acquisition Tool of FIG. 8 according to the present inven-
`tion.
`
`FIG. 13 is a flow diagram of a method to automatically set
`the Preprocessing and Compression parameters of the Pre-
`processing and Compression Tool of FIG. 8 according to the
`present invention.
`FIG. 14 is an example of user interface screens of the
`Player Application downloading content to a local library as
`described in FIG. 15 according to the present invention.
`FIG. 15 is a block diagram illustrating the major compo-
`nents and processes of a Player Application running on
`End-User Device of FIG. 9 according to the present inven-
`tion.
`
`FIG. 16 is an example user interface screens of the Player
`Application of FIG. 15 according to the present invention.
`
`DETAILED DESCRIPTION OF AN
`EMBODIMENT
`
`ATable of Contents is provided for this present invention
`to assist the reader in quickly locating different sections in
`this embodiment.
`
`Table of Contents
`I. SECURE DIGITAL CONTENT ELECTRONIC
`DISTRIBUTION SYSTEM
`A.
`System Overview
`1. Rights Management
`2. Metering
`3. Open Architecture
`System Functional Elements
`1. Content Provider(s)
`2. Electronic Digital Content Store(s)
`3.
`Intermediate Market Partners
`
`B.
`
`Page
`12
`
`12
`12
`14
`15
`16
`16
`17
`18
`
`Petitioner Apple Inc. - Ex. 1014, p. 24
`
`Petitioner Apple Inc. - Ex. 1014, p. 24
`
`
`
`US 6,226,618 B1
`
`5
`
`-continued
`
`6
`
`-continued
`
`Table of Contents
`
`Page
`
`Table of Contents
`
`Page
`
`4. Clearinghouse(s)
`5. End-User Device(s)
`6. Transmission Infrastructures
`System Uses
`C.
`II. CRYPTOGRAPHY CONCEPTS AND THEIR
`APPLICATION TO THE SECURE DIGITAL
`CONTENT ELECTRONIC DISTRIBUTION
`SYSTEM
`A.
`Symmetric Algorithms
`B.
`Public Key Algorithms
`C. Digital Signature
`D. Digital Certificates
`E. Guide To The SC(s) Graphical Representation
`F.
`Example of a Secure Container Encryption
`III. SECURE DIGITAL CONTENT ELECTRONIC
`DISTRIBUTION SYSTEM FLOW
`IV. RIGHTS MANAGEMENT ARCHITECTURE MODEL
`A. Architecture Layer Functions
`B.
`Function Partitioning and Flows
`1. Content Formatting Layer
`2. Content Usage Control Layer
`3. Content Identification Layer
`4. License Control Layer
`C. Content Distribution and Licensing Control
`V. SECURE CONTAINER STRUCTURE
`A. General Structure
`B. Rights Management Language Syntax and Semantics
`C. Overview of Secure Container Flow and Processing
`D. Metadata Secure Container 620 Format
`E. Offer Secure Container 641 Format
`F.
`Transaction Secure Container 640 Format
`G. Order Secure Container 650 Format
`H. License Secure Container 660 Format
`I.
`Content Secure Container Format
`VI. SECURE CONTAINER PACKING AND UNPACKING
`A. Overview
`
`guy REESE: $33M) Pa“
`2:
`VII. CLEARINGHOUSE(S)
`A_ Overview
`B. Rights Management Processing
`C- Couffiry SPeCifiC Parameters
`D' And“ Egg and TraCkmg
`E. Reporting of Results
`F.
`Billing and Payment Verification
`(1 Retransmissions
`VIII. CONTENT PROVIDER
`A- OVerVieW
`.
`.
`13' work Flow Managf"?
`1. Products Awaiting Action/Information Process
`2. New Content Request Process
`3_ Automatic Metadata Acquisition Process
`4. Manual Metadata Entry Process
`5- Usage F30nditi0ns Process
`6' supemsed Release PIOCGSS
`7' Metadata SC(s) creatlon Process
`8. Watermarking Process
`9_ Preprocessmg and Compression Process
`10. Content Quality Control Process
`1 . Encryption Process
`12- Content 593(5) Creation Process
`13' Fmal Qua1}ty Assurance Process
`11. Content Dispersement Process
`15 Work Flow Rules
`C_ Metadata Assimilation and Entry T001
`. Automatic Metadata Acquisition Tool
`2- Manual Met‘flfiiata Entry T001
`3' Usage condmons T001
`4
`Parts of the Metadata SC(s)
`5- Supervised Release T001
`D_ Content Processing T001
`. Watermarking Tool
`2-
`PTCPTOCCSSing and CompreSSion T001
`3. Content Quality Control Tool
`.
`ncryption Tool
`A
`E
`.
`E. Content SC(s) Creation Tool
`F.
`Final Quality Assurance Tool
`
`
`
`19
`20
`21
`21
`22
`
`22
`23
`24
`25
`26
`27
`29
`33
`34
`35
`35
`36
`37
`38
`39
`42
`42
`44
`45
`47
`51
`53
`55
`58
`59
`60
`60
`
`22
`67
`67
`69
`72
`72
`75
`75
`76
`77
`77
`78
`80
`81
`83
`83
`84
`84
`84
`85
`85
`87
`88
`88
`88
`89
`89
`94
`95
`96
`96
`98
`102
`103
`104
`104
`107
`107
`108
`108
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`65
`
`B.
`
`G. Content Dispersement Tool
`H. Content Promotions Web Site
`I.
`Content Hosting
`1. Content Hosting Sites
`2. Content Hosting Site(s) 111 provided by the
`Secure Digital Content Electronic Distribution
`System
`IX. ELECTRONIC DIGITAL CONTENT STORE(S)
`A. Overview - Support for Multiple Electronic Digital
`Content Store(s)
`Point-to-Point Electronic Digital Content Distribution
`Service
`1.
`Integration Requirements
`2. Content Acquisition Tool
`3. Transaction Processing Module
`4. Notification Interface Module
`5. Account Reconciliation Tool
`C. Broadcast Electronic Digital Content Distribution
`Service
`X. END-USER DEVICE(S)
`A. Overview
`B. Application Installation
`C.
`Secure Container Processor
`D. The Player Application
`1. Overview
`2. End-User Interface Components
`3. Copy/Play Management Components
`4. Decryption 1505, Decompression 1506 and
`Playback Components
`5. Data Management 1502 and Library Access
`Components
`42
`Inter-application Communication Components
`6.
`7. Other Miscellaneous Components
`42
`8. The Generic Player
`42
`
`
`09
`10
`11
`12
`13
`
`15
`15
`
`16
`
`17
`19
`22
`26
`27
`28
`
`29
`29
`31
`32
`36
`36
`37
`41
`41
`
`41
`
`
`
`Petitioner Apple Inc