`Approved for use through 10/31/2002. OMB 0651-0032
`
`111325-104
`Attorney Docket No.
`X" W
`.
`t
`1.
`
`"1 mg " “_
`,
`Flrstlnventor.
`Title
`Rights Offering And Granting
`
`
`
`
`
`Express Mail Label No.
`
`UTILITY
`PATENT APPLICATION
`TRANSMITTAL
`
`(Onlyfor new nonprovisional applications under 37 CFR 1.53(b))
`ELEMENTS
`
`See MPEP chapter 600 concerning utility patent application contents.
`1. El Fee Transmittal Form (e.g., PTO/SB/17)
`
`(Submit an originaland a duplicatefirrfeeprocessing)
`2. El Applicant claims small entity status.
`See 37 CFR 1.27.
`
`ADDRESS TO:
`
`
`
`
`
`
`
`C0YI]I'l’]1-SSIVOIICI‘ f0l' Patents
`Box Patent Application
`Washington, DC 20231
`7. 1:] CD-ROM or CD-R in duplicate, large table or
`Computer Program (Appendix)
`8. Nucleotide and/or Amino Acid Sequence Submission
`(ifapplicable, all necessary)
`a. El Computer Readable Form (CRF)
`b. Specification Sequence Listing on:
`i. 1:] CD-ROM or CD-R (2 copies; or
`ii. El paper
`e. E1 Statements verifying identity of above copies
`ACCOMPANYING APPLICATION PARTS
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`zu/an/90l||ll|l||l|||lllllllllllllllllllllllllllold‘so6l18.')[‘.
`
`
`
`3.
`
`I2]
`
`[Total Pages 34]
`Specification
`(preferred arrangement set forth below)
`- Descriptive title of the invention
`-
`Cross Reference to Related Applications (ifapplicable)
`—
`Statement Regarding Fed sponsored R & D (ifapplicable)
`-
`Reference to sequence listing, a table,
`or a computer program listing appendix (ifapplicable)
`Background of the Invention
`-
`- Brief Summary of the Invention
`— Brief Description _ofthe Drawings fiffiled)
`'
`Dehalled Dcsmptlon
`'
`ofthe Disclosure
`[Total Sheets 11]
`4. El Drawing(s) (35 USC. 113)
`[ Total Pages 0 ]
`5. Oath or Declaration
`a.
`E] Newly executed (original or copy)
`b.
`1:] Copy from a prior application (37 CFR 1.63 (d))
`(for continuation/divisional with Box 18 completed)
`i. E] DELETION OF INVENTOR1S[
`Signed statement attached deleting inventor(s)
`named in the prior application, see 37 CFR
`l.63(d)(2) and 1.33(b)
`U Application Data Sheet. See 37 CFR 1.76
`
`
`
`
`
`
`
`
`
`
`
`
`
`9. El Assignment Papers (cover sheet & document(s))
`10. E] 37 CFR 3.73(b) Statement
`1:]
`Power of
`(when there is an assignee)
`Attorney
`11. El English Translation Document (zfapplicable)
`12. E]
`Information Disclosure
`El Copies of IDS
`Citations
`Statement (IDS)/PTO—1449
`13. El Preliminary Amendment
`14.
`IZI Return ReceiptPostcard (MPEP 503)
`(Should be speczfically itemized)
`15. El Certified Copy of Priority Document(s)
`(ifforeign priority is claimed)
`16. 1:1 Nonpublication request under 35 U.S.C.
`
`l22(b)(2)(B)(i). Applicant must attach form
`PTO/SB/35 or its equivalent.
`
`17. El Other:
`
`
`If a CONTINUING APPLICATION, check appropriate box, and supply the requisite information below and in a preliminary amendment,
`or in an Application Data Sheet under 3 7 CFR I. 76:
`09/867 745of prior application No.:
`
`D Divisional
`D Continuation
`Prior application information:
`
`E Continuation-in-part (CIP)
`Examiner
`
`
`
`Group / Art Unit‘ 2164
`
` 18.
`
`
`
`
`For CONTINUATION OR DIVISIONAL APPS only: The entire disclosure of the prior application, from which an oath or declaration is supplied under
`Box 5b, is considered a part of the disclosure of the accompanying continuation or divisional application and is hereby incorporated by reference. The
`incorporation can only be relied upon when a portion has been inadvertently omitted from the submitted application parts.
`
`19. CORRESPONDENCE ADDRESS
`
`E Customer Number or Bar Code Label
`
`
`
`
`or D Correspondence address below
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`—— Zip Code _
`— Telephone ——
`
`' 'Ar’
`
`
`
`
`
`35,212
`
`
`
`
`
`
`
`
`
`
`
`
`
`NVA228533.1
`
`Petitioner Apple Inc. - Ex. 1025, p. 1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1025, p. 1
`
`
`
`Attorney Docket No. 1 1 1325-0001 04
`
`RIGHTS OFFERING AND GRANTING
`
`RELATED APPLICATION DATA
`
`[0001]
`
`This application claims benefit from U.S. provisional application Ser.
`
`No. 60/296,113, filed in June 7, 2001 the disclosure of which is incorporated
`
`herein by reference. This application also claims benefit from U.S. provisional
`
`application, Serial No. 60/331,625 filed in November 20, 2001, the disclosure
`
`of which is also incorporated herein by reference. This application also claims
`
`benefit
`
`from U.S. provisional application Ser. No. 60/331,624 filed on
`
`November 20, 2001, the disclosure of which is also incorporated herein by
`
`reference.
`
`This application is also a continuation-in-part of copending
`
`application Ser. No. 09/867,745 filed on May 31, 2001, the disclosure of which
`
`is incorporated herein by reference.
`
`COPYRIGHT NOTICE
`
`A portion of the disclosure of this patent document contains material
`[0002]
`which is subject to copyright protection. The copyright owner has no objection
`to the facsimile reproduction by anyone of the patent document or the patent
`disclosure, as it appears in the Patent and Trademark Office patent file or
`
`records, but otherwise reserves all copyright rights whatsoever.
`
`FIELD OF THE INVENTION
`
`[0003]
`
`The present invention relates to a method and system for digital
`
`rights management and, more particularly,
`
`to a method and system for
`
`automatically offering and granting rights over a communications network or
`
`other channels.
`
`BACKGROUND OF THE INVENTION
`
`[0004]
`
`The digital age has greatly increased concerns about ownership,
`
`access, and control of copyrighted information,
`
`restricted services and
`
`T\IVA7’764fiR.’J.
`
`1
`
` .
`
`934%
`
`5.-an‘?-i"..,.
`
`Petitioner Apple Inc. - Ex. 1025, pg. 2
`
`Petitioner Apple Inc. - Ex. 1025, p. 2
`
`
`
`Attorney Docket No. 1 1 1325-000104
`
`valuable resources. Rapid evolution and wide deployment has occurred for
`
`computers, and other electronic devices such as cellular phones, pagers,
`
`PDAS, and e-book readers, and these devices are interconnected through
`
`communication links including the Internet,
`
`intranets and other networks.
`
`These interconnected devices are especially conducive to publication of
`
`content, offering of services and availability of resources electronically.
`
`[0005]
`
`One of
`
`the most
`
`important
`
`issues impeding the widespread
`
`distribution of digital works (i.e. documents or other content in forms readable
`
`by computers), via electronic means, and the Internet
`
`in particular,
`
`is the
`
`current lack of ability to enforce the intellectual property rights of content
`
`owners during the distribution and use of digital works. Efforts to resolve this
`problem have been termed “lnte|lectual Property Rights Management”
`(“IPRM”),
`“Digital Property Rights Management” (“DPRM”),
`“lntel|ectual
`
`Property Management” (“lPM”), “Rights Management” (“RM”), and “Electronic
`
`Copyright Management” (“ECM”), collectively referred to as “Digital Rights
`
` Management (DRM)” herein. There are a number of issues to be considered
`
`1‘ V '-1
`§
`‘_3
`35
`:‘='7$.
`‘am?
`‘E3
`?1'E_~,=3“.
`
`in effecting a DRM System.
`
`For example, authentication, authorization,
`
`accounting, payment and financial clearing,
`
`rights
`
`specification,
`
`rights
`
` ....1
`
`verification, rights enforcement, and document protection issues should be
`
`addressed. U.S. patents 5,530,235, 5,634,012, 5,715,403, 5,638,443, and
`
`5,629,980, the disclosures of which are incorporated herein by reference,
`
`disclose DRM systems addressing these issues.
`
`[0006]
`
`Two basic DRM schemes have been employed, secure containers
`
`and trusted systems. A “secure container” (or simply an encrypted document)
`
`offers a way to keep document contents encrypted until a set of authorization
`
`conditions are met and some copyright terms are honored (e.g., payment for
`
`use). After the various conditions and terms are verified with the document
`
`provider, the document is released to the user in clear form. Commercial
`
`products such as CryptolopesT"" and DigiboxesT"'
`
`fall
`
`into this category.
`
`Clearly, the secure container approach provides a solution to protecting the
`
`N'VA77.64fiR 7
`
`Petitioner Apple Inc. - Ex. 1025, p. 3
`
`Petitioner Apple Inc. - Ex. 1025, p. 3
`
`
`
`Attorney Docket No. 11 1325-000104
`
`document during delivery over insecure channels, but does not provide any
`
`mechanism to prevent legitimate users from obtaining the clear document and
`
`then using and redistributing it
`
`in violation of content owners’ intellectual
`
`property.
`
`[0007]
`
`In the “trusted system” approach, the entire system is responsible
`
`for preventing unauthorized use and distribution of the document. Building a
`
`‘ trusted system usually entails introducing new hardware such as a secure
`
`processor, secure storage and secure rendering devices. This also requires
`
`that all software applications that run on trusted systems be certified to be
`
`trusted. While building tamper-proof trusted systems is a real challenge to
`
`existing technologies, current market trends suggest that open and untrusted
`
`systems, such as PC’s and workstations using browsers to access the Web,
`
`will be the dominant systems used to access digital works.
`
`In this sense,
`
`existing computing environments such as PC’ s and workstations equipped
`
`with popular operating systems (e.g., WindowsT"", LinuxT"", and UNIX) and
`
`rendering applications, such as browsers, are not trusted systems and cannot
`
`be made trusted without significantly altering their architectures. Of course,
`
`alteration of the architecture defeats a primary purpose of the Web,
`
`i.e.
`
`flexibility and compatibility.
`
`[0008]
`
`Some DRM systems allow content owners to specify usage rights
`
`and conditions, and associate them with content. These usage rights control
`
`how the recipient thereof can use the content. Usually after a content
`
`distributor or consumer has completed selecting and ordering specific content,
`
`the content is delivered either electronically from some content repository or
`
`via a conventional distribution channel to the recipient, such as tangible media
`
`sent via a common carrier. Corresponding DRM systems used by the
`
`recipient, for example the distributor or consumer, will then interpret the rights
`
`and conditions associated with the content, and use them to control how the
`
`content is distributed and/or used. Examples of usage rights include view,
`
`print and extract the content, and distribute, repackage and loan content.
`
`NVA77.fi4fiR.’7.
`
`
`
`Petitioner Apple Inc. - Ex. 1025, p. 4
`
`Petitioner Apple Inc. - Ex. 1025, p. 4
`
`
`
`Attorney Docket No. 11 1325-000104
`
`Associated conditions may include any term upon which the rights may be
`
`contingent such as payment, identification, time period, or the like.
`
`[0009]
`
`U.S. patent 5,634,012, discloses a system for controlling the
`
`distribution of digital documents. Each rendering device has a repository
`
`associated therewith. A predetermined set of usage transaction steps define
`
`a protocol used by the repositories for enforcing usage rights associated with
`
`a document. Usage rights persist with the document content. The usage
`
`rights can permit various manners of use such as, viewing only, use once,
`
`distribution, and the like. Usage rights can be contingent on payment or other
`
`conditions.
`
`[0010]
`
`However, there are limitations associated with the above-mentioned
`
`paradigms wherein only usage rights and conditions associated with content
`
`are specified by content owners or other grantors of rights. Once purchased
`
`by an end user, a consumer, or a distributor, of content along with its
`
`associated usage rights and conditions has no means to be legally passed on
`
`to a next recipient in a distribution chain. Further the associated usage rights
`
`have no provision for specifying rights to derive other rights,
`
`i.e. rights to
`
`modify,
`
`transfer, offer, grant, obtain,
`
`transfer, delegate,
`
`track, surrender,
`
`exchange,
`
`transport, exercise,
`
`revoke, or
`
`the like.
`
`Common content
`
`distribution models often include a multi-tier distribution and usage chain.
`
`Known DRM systems do not facilitate the ability to prescribe rights and
`
`conditions for all participants along a content distribution and usage chain.
`
`Therefore,
`
`it
`
`is difficult for a content owner to commercially exploit content
`
`unless the owner has a relationship with each party in the distribution chain.
`
`SUMMARY OF THE INVENTION
`
`A first aspect of the invention is a method for transferring usage rights
`
`adapted to be associated with items. The method comprises generating, by a
`
`supplier, at least one first offer containing usage rights and meta-rights for the
`
`item, said usage rights defining a manner of use for the items, said meta-
`
`l\TVA77fi4fiR.7.
`
`
`
`Petitioner Apple Inc. - Ex. 1025, p. 5
`
`Petitioner Apple Inc. - Ex. 1025, p. 5
`
`
`
`Attorney Docket No. 111325-000104
`
`rights specifying rights to derive usage rights or other meta-rights, presenting
`
`said offer to a first consumer, receiving a selection from the first consumer
`
`indicating desired usage rights and meta-rights, and generating a first license
`
`granting the desired usage rights and meta-rights to the first consumer.
`
`A second aspect of the invention is a system for transferring usage
`
`rights adapted to be associated with an item to be licensed in multi-tier
`
`channels of distribution with downstream rights and conditions assigned at
`
`least one level. The system comprises a supplier component, comprising a
`
`supplier user interface module, an offer generator module for generating an
`
`offer containing at least usage rights and of meta-rights, a rights composer
`
`module for composing a draft license, and a repository for suppliers rights, a
`
`supplier management database. The system further comprises a consumer
`
`component
`
`comprising a consumer user
`
`interface module,
`
`an offer-
`
`consideration module configured to analyze the offers generated by the
`
`supplier component and select offers based on the analysis, and a repository
`
`for consumer’s rights, a consumer management database.
`
`A third aspect of the invention is a method for generating a license to
`
`digital content to be used within a system for at least one of managing use
`
`
`
`
`
`
`
`W::a5,.;3I"
`
`
`
`and distribution of the digital content. The method comprises presenting a
`
`consumer with an offer including meta-rights, receiving a selection by the
`
`consumer of at least one meta-right in the offer, generating a license based
`
`on the selection, wherein the license permits the consumer to exercise the at
`
`least one meta-right and permits the consumer to offer at least one derived
`
`right derived from the at least one meta-right and generate a license including
`
`the at least one derived right.
`
`BRIEF DESCRIPTION OF THE DRAWING
`
`[0011]
`
`Exemplary embodiments of this invention will be described in detail,
`
`with reference to the attached drawing in which:
`
`NVA7764fiR.7
`
`Petitioner Apple Inc. - Ex. 1025, p. 6
`
`Petitioner Apple Inc. - Ex. 1025, p. 6
`
`
`
`Attorney Docket No. 111325-000104
`
`[0012]
`
`Fig.
`
`1
`
`is a schematic diagram of a three-tier model for content
`
`distribution;
`
`[0013]
`
`Fig. 2 is a schematic diagram illustrating rights offering and granting
`
`processes in the model of Fig. 1;
`
`[0014]
`
`Fig. 3(a) is a schematic diagram of a simple supplier-consumer
`
`push model for rights generating, issuing and exercising;
`
`[0015]
`
`Fig. 3(b) is a schematic diagram of a simple supplier-consumer pull
`
`model for rights generating, issuing and exercising;
`
`[0016]
`
`Fig. 4 is a block diagram of a rights offering-granting architecture in
`
`
`
`accordance with the preferred embodiment;
`
`[0017]
`
`Figs. 5a and 5b are workflow diagrams for examples of offering and
`
`granting rights between a rights supplier and a rights consumer with a push
`
`and pull model respectively;
`
`[0018]
`
`Fig. 6 is a flow chart of a rights offer generation process in
`
`accordance with the preferred embodiment;
`
`[0019]
`
`Fig. 7 is a flow chart of a rights offer consideration process in
`
`accordance with the preferred embodiment;
`
`[0020]
`
`Fig. 8 is a flow chart of a rights offer customization process in
`
`accordance with the preferred embodiment;
`
`[0021]
`
`Fig. 9 is block diagram of a DRM system that may be utilized in
`
`connection with the preferred embodiment;
`
`[0022]
`
`Fig. 10 is a block diagram of an exemplary structure of a license
`
`containing usage rights and meta-rights of the preferred embodiment; and
`
`NVA9.7.64fiR,7
`
`Petitioner Apple Inc. - Ex. 1025, p. 7
`
`
`.1-.
`
`§1,
`.am:‘Em;
`
`a i1
`
`,2
`I7?
`
`ii..:;i4.1.3?-iL..ii
`
`
`
`
`""“i:312”‘;«7""‘
`
`Petitioner Apple Inc. - Ex. 1025, p. 7
`
`
`
`Attorney Docket No. 111325-000104
`
`[0023]
`
`Fig. 11 is a schematic illustration of a rights label of the preferred
`
`embodiment.
`
`DETAILED DESCRIPTION
`
`[0024]
`
`Prior to providing detailed description of the apparatus and method
`
`for offering and granting rights, a description of a DRM system that can be
`
`utilized to specify and enforce usage rights and meta-rights for specific
`
`content, services, or other items is first described below.
`
`[0025]
`
`Fig. 9 illustrates DRM System 10 that includes a user activation
`
`component, in the form of activation server 20, that issues public and private
`
`key pairs, or other identification mechanisms, to content users in a protected
`
`fashion, as is well known. Typically, when a user uses DRM system 10 for
`
`the first
`
`time,
`
`the user installs software that works with, or includes, a
`
`
` 30. Client component 60 preferably is tamper resistant and contains the set
`
`rendering application for a particular content format. The software is installed
`
`in client environment 30, a computer associated with the content recipient, for
`
`example. The software is part of DRM 10 system and is used to enforce
`
`usage rights for protected content. During the activation process, some
`
`information is exchanged between activation server 20 and client environment
`
`.51an 2
`§'—..~§
`
`of public and private keys issued by activation server 20 as well as other
`
`components, such as rendering components for example.
`
`[0026]
`
`Rights label 40 is associated with content 42 and specifies usage
`
`L rights and meta-rights that are available to a recipient,
`
`i.e. a consumer of
`
`rights, when corresponding conditions are satisfied.
`
`License Server 50
`
`manages the encryption keys and issues licenses 52 for protected content 42.
`
`Licenses 52 embody the actual granting of rights, including usage rights and
`
`meta-rights, to an end user. For example, rights offer 40 may permit a user to
`
`view content for a fee of five dollars and print content for a fee of ten dollars,
`
`or it may permit a user to offer rights to another user, for example, by utilizing
`
`the concept of meta-rights described below. License 52 can be issued for the
`
`NVA?’).fiAfiR.’),
`
`Petitioner Apple Inc. - Ex. 1025, p. 8
`
`Petitioner Apple Inc. - Ex. 1025, p. 8
`
`
`
`
`
`talc’
`
`:2‘:
`<:“*fi
`
`4.;.1;‘.13‘$1,
`
`Attorney Docket No. 11 1325-000104
`
`view right when the five dollar fee has been paid. Client component 60
`
`interprets and enforces the rights, including usage rights and meta—rights, that
`
`have been specified in the license. Rights label 40 and license 52 are
`
`described in detail below.
`
`[0027]
`
`Fig. 11 illustrates rights label 40 in accordance with the preferred
`
`embodiment. Rights label 40 includes plural rights options 44. Each rights
`
`option 44 includes usage rights 44a, conditions 44b, and content specification
`
`44c. Content specification 44c can include any mechanism for referencing,
`
`calling,
`
`locating, or otherwise specifying content 42 associated with rights
`
`offer 44.
`
`[0028]
`
`As shown in Fig. 10, license 52 includes license 52a, grant 52b, and
`
`digital signature 52c. Grant 52b includes granted usage rights and/or meta-
`
`rights selected from label. The structure of the grant also includes one or
`
`more principals, to whom the specified usage rights and/or meta-rights are
`
`granted, a list of conditions, and state variables required to enforce the
`
`license. Like usage rights, access and exercise of the granted meta-rights are
`
`controlled by the condition list and state variables as described below.
`
`[0029]
`
`Clear
`
`(unprotected) content can be prepared with document
`
`preparation application 72 installed on computer 70 associated with a content
`
`publisher, a content distributor, a content service provider, or any other party.
`
`Preparation of content consists of specifying the usage rights, meta-rights,
`
`and conditions under which content 42 can be used and distributed,
`
`associating rights label 40 with content 42 and protecting content 42 with
`
`some crypto algorithm. A rights language such as XrMLT"" can be used to
`
`specify the rights and conditions. However, the usage rights and meta-rights
`
`can be specified in any manner. Also, the rights can be in the form of a pre-
`
`defined specification or template that is merely associated with the content.
`
`Accordingly,
`
`the process of specifying rights refers to any process for
`
`associating rights with content. Rights label 40 associated with content 42
`
`T\TVA’),’)646R.’)
`
`Petitioner Apple Inc. - Ex. 1025, p. 9
`
`Petitioner Apple Inc. - Ex. 1025, p. 9
`
`
`
`Attorney Docket No. 111325-000104
`
`and the encryption key used to encrypt the content can be transmitted to
`
`license server 50.
`
`[0030]
`
`Rights can specify transfer rights, such as distribution rights, and
`
`can permit granting of rights to others or the derivation of rights. Such rights
`
`are referred to as “meta-rights”. Meta-rights are the rights that one has to
`manipulate, modify, or otherwise derive other meta-rights or usage rights.
`
`Meta-rights can be thought of as usage rights to usage rights. Meta-rights
`
`can include rights to offer, grant, obtain, transfer, delegate, track, surrender,
`
`exchange, and revoke usage rights to/from others. Meta-rights can include the
`
`rights to modify any of the conditions associated with other rights. For
`
`example, a meta-right may be the right to extend or reduce the scope of a
`
`particular right. A meta-right may also be the right to extend or reduce the
`
`validation period of a right.
`
`[0031]
`
`Often, conditions must be satisfied in order to exercise the manner
`
`of use in a specified right. For, example a condition may be the payment of a
`
`fee, submission of personal data, or any other requirement desired before
`
`permitting exercise of a manner of use. Conditions can also be “access
`
`conditions” for example, access conditions can apply to a particular group of
`
`users, say students in a university, or members of a book club.
`
`in other
`
`words, the condition is that the user is a particular person or member of a
`
`particular group. Rights and conditions can exist as separate entities or can
`
`be combined.
`
`[0032]
`
`State variables track potentially dynamic states conditions. State
`
`variables are variables having values that represent status of an item, usage
`
`rights, license or other dynamic conditions. State variables can be tracked,
`
`by clearinghouse 90 license or server 30 another device, based on
`
`identification mechanisms in license 52. Further, the value of state variables
`
`can be used in a condition. For example, a usage right can be the right to
`
`print content 42 three times. Each time the usage right is exercised, the value
`
`of the state variable “number of prints” is incremented.
`
`In this example, when
`
`the value of the state variable is three, the condition is not longer satisfied and
`
`NTVAJ’/"646R.7
`
`
`
`Petitioner Apple Inc. - Ex. 1025, p. 10
`
`Petitioner Apple Inc. - Ex. 1025, p. 10
`
`
`
`Attorney Docket No. 1 1 1325-000104
`
`content 42 cannot be printed. Another example of a state variable is time. A
`
`condition of license 52 may require that content 42 is printed within thirty
`
`days. A state variable can be used to track the expiration of thirty days.
`
`Further, the state of a right can be tracked as a collection of state variables.
`
`The collection of the change is the state of a usage right represents the usage
`
`history of that right.
`
`[0033]
`
`A typical workflow for DRM system 10 is described below. A
`
`recipient, such as a user, operating within client environment 30 is activated
`
`for receiving content by activation server 20. This results in a public-private
`
`key pair (and some user/machine specific information) being downloaded to
`
`client environment 30 in the form of client software component 60 in a known
`
`manner. This activation process can be accomplished at any time prior to the
`
`issuing of a license.
`
`[0034] When a user wishes to use protected content 42, the user makes a
`
`request for the content 42. For example, a user might browse a Web site
`
`running on Web server 80 associated with a grantor of rights such as a
`
`content distributor, using a browser installed in client environment 30, and
`attempt to download protected content 42. During this process, the user may
`
`go through a series of steps possibly including a fee transaction (as in the
`
`sale of content) or other transactions (such as collection of information).
`
`When the appropriate conditions and other prerequisites, such as the
`
`collection of a fee and verification that the user has been activated, are
`
`satisfied, Web server 80 contacts license server 50 through a secure
`
`communications channel, such as a channel using a Secure Sockets Layer
`
`(SSL). License server 50 then generates license 52 for the content and Web
`
`server 80 causes both protected content 42 and license 52 to be downloaded.
`
`License 52 can be downloaded from license server 50 or an associated
`
`device. Content 42 can be downloaded from computer 70 associated with a
`
`publisher, distributor, or other party.
`
`N'VA77646R.7
`
`10
`
`
`
`Petitioner Apple Inc. - Ex. 1025, p. 11
`
`Petitioner Apple Inc. - Ex. 1025, p. 11
`
`
`
`Attorney Docket No. 1 1 1325-000104
`
`[0035]
`
`Client component 60 in client environment 30 will then proceed to
`
`interpret license 52 and allow use of content 42 based on the rights and
`
`conditions specified in license 52. The interpretation and enforcement of
`
`usage rights are well known generally. The steps above may take place
`
`sequentially or approximately simultaneously or in various order.
`
`[0036]
`
`DRM system 10 addresses security aspects of protecting content
`
`42.
`
`In particular, DRM system 10 may authenticate license 52 that has been
`
`issued by license server 50. One way to accomplish such authentication is for
`
`application 60 to determine if the licenses can be trusted.
`
`In other words,
`
`application 60 has the capability to verify and validate the cryptographic
`
`signature of digital signature 52c, or other identifying characteristic of the
`
`license. During the activation step described above, both client environment
`
`30 and license server 50 receive a set of keys in a tamper-resistant software
`
`“package" that also includes other components, such as the necessary
`
`components for activated client environment 30 to verify signature 52 of
`
`license 52 in a known manner. Of course, the example above is merely one
`
`way to effect a DRM system. For example, the license and content can be
`
`
`
`distributed from different entities. Also, rights offer 40 can be associated with
`
` clearinghouse 90 can be used to process payment transactions and verify
`
`content by a party other than the party preparing the content.
`
`Also,
`
`payment prior to issuing a license.
`
`[0037]
`
`For any set of rights, there are two kinds of entities involved, the
`
`”supplier” and the “consumer”. The function of the supplier is to offer , and
`
`possibly grant, the rights, and the function of the consumer is to select, and
`
`possibly exercise the rights. Both the supplier and consumer may actually
`
`represent two or more entities.
`
`in general, multiple entities may collectively
`
`make an offer and grant rights to multiple entities. The supplier and consumer
`
`represent any two entities in the content value chain that have a direct
`
`relationship with each other regarding the granting of rights. At the beginning
`
`of the value chain, the supplier and consumer may be author and publisher.
`
`NVA77fi4fiR.7
`
`11
`
`Petitioner Apple Inc. - Ex. 1025, p. 12
`
`Petitioner Apple Inc. - Ex. 1025, p. 12
`
`
`
`
`
`Attorney Docket No. 111325-000104
`
`Going down along the value chain,
`
`the‘ supplier and consumer may be a
`
`publisher and another publisher (for content aggregation), a publisher and
`
`distributor (for content distribution), a distributor and another distributor (for
`
`multi—tier content distribution), a distributor and a retailer (for content retailing),
`
`a retailer and a consumer (for content consumption), and a consumer and
`
`another consumer (for content supper-distribution or personal lending).
`
`[0038]
`
`An “offer of rights” or “rights offer” expresses how a consumer (e.g.
`
`a content distributor or user) can acquire a particular instance of content
`
`together with its associated usage rights and/or meta-rights. An offer may or
`
`may not contain financial terms. An offer is an expression of mere willingness
`
`to commerce negotiation and also an expression of willingness to grant on
`
`terms stated. An offer may be expressed in the form of a rights label. A
`
`“consideration of rights” is a process as part of the rights granting in which the
`
`rights consumer has examined the rights being offered and possibly
`
`bargained them and associated terms and conditions. A “choice of rights” is a
`
`selection of rights and their associated terms and conditions from a rights
`
`offer.
`
`It indicates the intent of the consumer to accept these rights and the
`
`corresponding terms and conditions. For example, selection can comprise
`
`selecting one option 44 from label 40. “Customization of rights” is a process
`as part of the rights granting in which the rights supplier assembles rights and
`
`terms and conditions based on a choice of the rights consumer. The output of
`
`this process can be a draft license to be accepted by the rights consumer. A
`
`“license of rights” is an expression of rights and possibly conditions accepted
`
`and agreed upon by the rights supplier and consumer.
`
`It is the output of the
`
`rights offering and granting process. A license is a grant to exercise the rights
`
`that govern the usage (possibly including further distribution) of content or
`
`other items.
`
`[0039]
`
`As described above, a rights label, such as rights label 40, may
`
`contain a number of options 44 allowing the consumer to make a selection
`
`and conduct negotiation (if permitted), while license 52 contains rights the
`
`NVA2’2646R.9.
`
`12
`
`Petitioner Apple Inc. - Ex. 1025, p. 13
`
`Petitioner Apple Inc. - Ex. 1025, p. 13
`
`
`
`Attorney Docket No. 1 1 1325-000104
`
`consumer has selected and accepted. Note that the accepted rights may
`
`include a right to present offers to others or make selections of offers.
`
`[0040]
`
`An example of a distribution chain model is illustrated in Fig. 1. The
`
`distribution chain includes a content provider 100, distributor 110, and end
`
`user 120. Of course content may be prepared in the manner described
`
`above.
`
`it is assumed that the content has already been prepared in the model
`
`of Fig. 1. Fig.
`
`1
`
`is directed to the transfer of content and shows that, in this
`
`example, provider 100 may publish content to distributor 110 or receive
`
`content for reuse from distributor 110. Distributor 110 may in turn distribute
`
`content to user 120 or receive returned content form user 120. User 100 can
`
`use content.
`
`To further illustrate the potential complexities of multi-tier
`
`distribution chains provider 100 can aggregate content from others, distributor
`
`110, can receive content from other distributors for redistribution, and user
`
`120 can share content with the other users.
`
`It is clear that there are plural
`
`stages in the content life cycle and plural relationships between the various
`
`parties. A precise and consistent specification of rights at the different stages
`
`of the life cycle and relationships is
`
`important and crucial
`
`to persistent
`
`protection of content in multi-tier distribution and usage.
`
`[0041]
`
`Fig. 2 illustrates the flow of rights in the same model,
`
`including
`
`rights generating, aggregating,
`
`issuing,
`
`relinquishing, driving, granting,
`
`surrendering, delegating and exercising. The model of Fig. 2 includes the
`
`same entities, provider 100, distributor 110, and user 120.
`
`It can be seen
`
`that, with respect to the flow of rights. each party can grant and accept rights.
`
`User 120 can grant and accept rights from other users, a process called
`
`“delegation”, in this example.
`
`[0042]
`
`The model of Fig. 2 covers many specific content publishing,
`
`distribution and use relationships. Other models can be derived from on this
`
`model by a different consolidation or segregation of the parties. For example,
`
`every provider can be a distributor. This is “direct publishing”, which allows
`
`NVA 726468.’)
`
`13
`
`Petitioner Apple Inc. - Ex. 1025, p. 14
`
`3
`
`3:1:
`ll
`
`....u!1;»11..:Iigr-..:.....51...}:2:”-=“.~:l..,.
`
`
`
`
`
`
`
`
`
`"ta.‘.1:-:5«allmll..‘.:«..”
`
`
`'‘iiji
`
`Petitioner Apple Inc. - Ex. 1025, p. 14
`
`
`
`Attorney Docket No. 11 1325