`Stefik et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 6,963,859 B2
`Nov. 8, 2005
`
`US006963859B2
`
`CONTENT RENDERING REPOSITORY
`
`Inventors:
`
`lVIark J. Stefik, Portola Valley, CA
`(US); Peter L. Pirolli, San Francisco,
`CA (US)
`
`Assigncc: ContentGuard Holdings, lnc.,
`Wilmington, DE (US)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 78 days.
`
`Appl. No.: 10/345,390
`
`Filed:
`
`Jan. 16, 2003
`Prior Publication Data
`
`US 2003/0225699 A1 Dec. 4, 2003
`
`Related U.S. Application Data
`
`Continuation of application No. 09/778,006, filed on Feb. 7,
`2001, now Pat. No. 6,714,921, which is a division of
`application No. 08/967,084, filed on Nov. 10, 1997, now Pat.
`No. 6,236,971, which is a continuation of application No.
`08/344,760, filed on Nov. 23, 1994, now abandoned.
`
`Int. Cl.7 .............................................. .. G06F 17/60
`U.S. Cl.
`........................... .. 705/51; 705/52; 705/53;
`705/54; 705/55; 705/56; 705/57; 705/58;
`705/59; 705/50; 380/201; 707/9; 707/104.1;
`713/182; 713/183; 713/184; 713/185; 713/186
`Field of Search .................... .. 705/50-59; 380/201,
`380/30; 707/9, 104.1; 713/182-186, 156;
`235/449; 379/93
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,263,158 A
`3,609,697 A
`
`7/1966 Bargen et al.
`9/1971 Blevins et al.
`
`3,790,700 A
`3,798,605 A
`4,159,468 A
`4,220,991 A
`
`2/1974 Callais et al.
`3/1974 Feistel
`6/1979 Barnes et al.
`9/1980 Hamano et al.
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`0 084 441
`0 180 460
`0 332 707
`0 651 554
`0 668 695
`
`7/1983
`5/1986
`9/1989
`5/1995
`8/1995
`
`(Continued)
`OTHER PUBLICATIONS
`
`Weber, Robert. Digital Rights Management Technologies.
`Oct. 1995. Retrieved from IDS.*
`“National Semiconductor and EPR Partner for Information
`Metering/Data Security Cards” Mar. 4, 1994, Press Release
`from Electronic Publishing Resources, Inc.
`
`(Continued)
`
`Primary Examiner—James A Reagan
`(74) AI.‘t0rn.ey, Agent, or Firm—Marc S. Kaufman; Nixon
`Peabody, LLP
`
`(57)
`
`ABSTRACT
`
`Arendering system adapted for use in a system for managing
`use of content and operative to rendering content in accor-
`dance with usage rights associated with the content. The
`system includes a rendering device configured to render the
`content and a repository coupled to the rendering device and
`operative to enforce usage rights associated with the content
`and permit the rendering device to render the content in
`accordance with a manner of use specified by the usage
`rights.
`
`84 Claims, 13 Drawing Sheets
`
`(tutor Crates A
`Diglul wuk
`
`Usage RighIlA11I¢l'l!d To
`DI
`ltal Work and
`Deoos led In Repository I
`
`Reposiw
`Susmn Wirrla2 mnlaguA
`Rzpamory I
`
`lnposilo 2 Iuquess
`Acun To D? ital Work fiar
`Asun Purpose
`
`Ruposiw I Chtdu Us: e
`Rlghls
`i iii Work 0
`Dlurmlnedi Amos: May Be
`Granted
`Azcosc firanhd
`Access Dlnild
`
`I
`fi
`RI
`TEl1V|:\:N°'5z5Sl0l‘|
`With Error
`
`lfrormnls
`Repo_sit_o
`D nu \fvorkTo
`epontoryl
`
`Repository land_1 Sad:
`Gomram Billing
`Information andTransmit
`To Credit Sonar
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)
`
`
`
`US 6,963,859 B2
`Page 2
`
`U .S. PATEN T
`
`4,278,837
`4,323,921
`4,442,486
`4,529,870
`4,558,1 76
`4,593,376
`4,614,861
`4,644,493
`4,658,093
`4,713,753
`4,796,220
`4,817,140
`4,827,508
`4,868,376
`4,891,838
`4,924,378
`4,932,054
`4,937,863
`4,949,187
`4,953,209
`4,961,142
`4,975,647
`4,977,594
`4,999,806
`5,010,571
`5,014,234
`5,023,907
`5,047,928
`5,050,213
`5,052,040
`5,058,1 64
`5,103,476
`5,113,519
`5,136,643
`5,138,712
`5,146,499
`5,148,481
`5,159,182
`5,183,404
`5,191,193
`5,204,897
`5,222,134
`5,235,642
`5,247,575
`5,255,106
`5,260,999
`5,263,157
`5,263,158
`5,276,444
`5,276,735
`5,291,596
`5,295,266
`5,301,231
`5,311,591
`5,319,705
`5,335,346
`5,337,357
`5,339,091
`5,339,392
`5,341,429
`5,347,579
`5,381,526
`5,394,469
`5,410,598
`5,412,717
`5,428,606
`5,432,849
`5,438,508
`5,444,779
`5,453,601
`
`>3».>>>>3»>>>>3»>>>>>>.>>>>>>>>>>>>>>3»>>>>>>>i>>>>>>>>>>i>>>>>>>.>>>.>>>>>>i>>>>
`
`7/1981
`4/1 982
`4/1984
`7/1985
`1 2/1 985
`6/1986
`9/1986
`2/1987
`4/1987
`12/ 1987
`1/1989
`3/1989
`5/ 1989
`9/1989
`1/1990
`5/1990
`6/1990
`6/1990
`8/1990
`8/1990
`10/1990
`12/1990
`12/ 1990
`3/199 1
`4/1991
`5/1991
`6/199 1
`9/1991
`9/1991
`9/199 1
`1 0/1991
`4/1992
`5/1992
`8/1992
`8/1992
`9/1992
`9/1992
`10/1992
`2/ 1993
`3/1993
`4/1993
`6/1993
`8/1993
`9/1993
`10/1993
`1 1/1993
`1 1/1993
`11/1993
`1/1994
`1/1994
`3/1994
`3/ 1994
`4/1994
`5/1994
`6/1994
`8/1994
`8/1 994
`8/1994
`8/1994
`8/1 994
`9/1994
`1/1995
`2/1995
`4/1995
`5/ 1995
`6/1995
`7/1995
`8/1995
`8/1995
`9/1995
`
`DOCUMENTS
`Best
`Guillou
`Mayer
`Chaum
`Arnold et al.
`Volk
`Pavlov et al.
`Chandra et al.
`Hellman
`Beobert et al.
`W'olfe
`Chandra et al.
`Shear
`Lessin et al.
`Faber
`Hershey et al.
`Chou et al.
`Robert et al.
`Cohen
`Ryder, Sr. et al.
`Elliott et al.
`Downer et al.
`Shear
`Chernow et al.
`Katznelson
`Edwards, Jr.
`Johnson et al.
`W'iede1ne1'
`Shear
`Preston et al.
`Elmer et al.
`W'aitc ct al.
`Johnson et al.
`Fischer
`Corbin ........... ..
`Geffrotin
`Abraham et al.
`Eisele
`Aldous et al.
`Le Roux
`W'y111a11
`W'aitc ct al.
`W'obber et al.
`Sprague et al.
`Castro
`VVyman .......... . .
`Janis
`Janis
`McNair
`Boebert et al.
`Mita
`1-linsley et al.
`Abraham et al.
`Fischer
`Halter et al.
`Fabbio ........... ..
`Chou el al.
`Yamazaki ct al.
`Risberg et al.
`Stringer el al.
`Blandford
`Ellson
`Nagel et al.
`Shear
`Fischer
`Moskowitz
`J0l111s011 et al.
`Wyman
`Daniele
`Rosen
`
`........ .. 713/200
`
`......... .. 705/59
`
`718/101
`
`........ .. 711/163
`
`345/762
`
`5,455,953
`5,457,746
`5,473,687
`5,473,692
`5,499,298
`5,502,766
`5,504,814
`5,504,818
`5,504,837
`5,509,070
`5,530,235
`5,532,920
`5,534,975
`5,539,735
`5,563,946
`5,568,552
`5,621,797
`5,629,980
`5,633,932
`5,634,012
`5,638,443
`5,649,013
`5,655,077
`5,708,717
`5,734,823
`5,734,891
`5,737,413
`5,737,416
`5,745,569
`5,748,783
`5,757,907
`5,761,686
`5,765,152
`5,768,426
`5,825,892
`5,892,900
`5,910,987
`5,915,019
`5,917,912
`5,920,861
`5,940,504
`5,943,422
`5,949,876
`5,982,891
`5,999,949
`6,047,067
`6,112,181
`6,1 15,471
`6,138,119
`6,157,721
`6,185,683
`6,226,618
`6,233,684
`6,237,786
`6,240,185
`6,253,193
`6,266,618
`6,292,569
`6,301,660
`6,327,652
`6,330,670
`6,345,256
`6,363,488
`6,389,402
`
`3>>>C1>>>>>>>>>>i1>>>C1>>>>>>>>>>>>>CI>>>>>>>>>>3>>>C1>>>CI>>D>>>
`
`B1
`B1
`B1
`
`10/1995
`10/1995
`12/1995
`12/1995
`3/1996
`3/1996
`4/1996
`4/1996
`4/1 996
`4/1996
`6/1996
`7/1996
`7/1996
`7/1996
`10/1996
`10/1996
`4/1997
`5/1997
`5/1997
`5/1997
`6/1997
`7/1 997
`8/1997
`1/1998
`3/1998
`3/1998
`4/1998
`4/1998
`4/1998
`5/1998
`5/1998
`6/1998
`6/1998
`6/1998
`1 0/1 998
`4/1999
`6/1999
`6/1 999
`6/1999
`7/1999
`8/1999
`8/1999
`9/1999
`1 1/1999
`12/1999
`4/2000
`8/2000
`9/2000
`10/2000
`12/2000
`2/2001
`5/2001
`5/2001
`5/2001
`5/2001
`6/2001
`7/2001
`9/2001
`10/2001
`12/2001
`12/2001
`2/2002
`3/2002
`5/2002
`
`Russell
`Dolphin
`Lipscomb et al.
`Davis
`Narasimhalu et al.
`Boebert et al.
`Miyahara
`Okano
`Griflelh el al.
`Schull
`Stefik et al.
`Hartrick et al.
`Stefik et al.
`Moskowitz
`Cooper et al.
`Davis
`Rosen
`Stefik et al.
`Davis et al.
`Stefik et al.
`Stefik et al.
`Stuckey el al.
`Jones ct al.
`Alasia
`Saigh et al.
`Saigh
`Akiyama et al.
`Cooper et al.
`Moskowitz et al.
`Rhoads
`Cooper et al.
`Bloornberg
`Erickson
`Rhoads
`Braudaway el al.
`Ginter et al.
`Ginter et al.
`Ginter et al.
`Ginter et al.
`Hall et al.
`Griswold
`Van Wie et al.
`Ginter et al.
`Ginter et al.
`Crandall
`Rosen
`Shear et al.
`Oki el al.
`Hall ct al.
`Shear et al.
`Ginter et al.
`Downs et al.
`Stefik et al.
`Ginter et al.
`Van Wie et al.
`Ginter et al.
`Ye et al.
`Shear et al.
`Benson
`England et al.
`England et al.
`Milsted et al.
`Ginter et al.
`Ginter et al.
`
`FOREIGN PATENT DOCUMENTS
`
`0 725 376
`2 136 175
`2 236 604
`62—241061
`64—068835
`
`8/1996
`9/1984
`4/1991
`10/1987
`3/1989
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:21)
`
`
`
`US 6,963,859 B2
`Page 3
`
`........... .. G06F/9/U6
`
`H03-282733
`04—369068
`05—268415
`06-175794
`06—215010
`07—084852
`07-200317
`07—244639
`0 715 241
`VVO 92/20022
`VVO 93/01550
`VVO 94/01821
`VVO 96/24092
`VVO 97/48203
`VVO 98/11690
`VVO 98/42098
`VVO 99/49615
`VVO 01/63528
`
`* 12/1991
`12/1992
`10/1993
`6/1994
`8/1994
`3/1995
`8/1995
`9/1995
`6/1 996
`11/1992
`1/1993
`1/1994
`8/1996
`12/1997
`3/1998
`9/1998
`9/1999
`8/2001
`
`OTHER PUBLICATIONS
`
`Weber, R., “Digital Rights Management Technology” Oct.
`1995.
`Flasche, U. et al., “Decentralized Processing of Docu-
`ments”, pp. 119-131, 1986, Comput. & Graphics, vol. 10,
`No. 2.
`Mori, R. et al., “Superdistribution: The Concept and the
`Architecture”, pp. 1133-1146, 1990. The Transactions of the
`IEICE, Vo. E 73, No. 7, Tokyo, JP.
`Weber, R., “Metering Technologies for Digital Intellectual
`Property”, pp. 1-29, Oct. 1994, AReport to the International
`Federation of Reproduction Rights Organizations.
`Clark, P.C. et al., “Bits: A Smartcard protected Operating
`System”, pp. 66-70 and 94, Nov. 1994, Communications of
`the ACM, vol. 37, No. 11.
`Ross, P.E., “Data Guard”, pp. 101, Jun. 6, 1994, Forbes.
`Saigh, W.K., “Knowledge is Sacred”, 1992, Video Pocket,’
`Page Reader Systems, Ltd.
`Kahn, R.E., “Deposit, Registration and Recordation in an
`Electronic Copyright Management System”, pp. 1-19, Aug.
`1992, Corporation for National Research Initiatives, Vir-
`ginia.
`Hilts, P. et al., “Books While U Wait”, pp. 48-50, Jan. 3,
`1994, Publishers Weekly.
`Strattner, A, “Cash Register on a Chip may Revolutionaize
`Software Pricing and Distribution; Wave Systems Corp.”,
`pp. 1-3,Apr. 1994, Computer Shopper, vol. 14, No. 4, ISSN
`0886-0556.
`O’Conner, M., “New Distribution Option for Electronic
`Publishers; iOpener Data Encryption and Metering System
`for CD—ROM use; Column”, pp. 1-6, Mar. 1994, CD—ROM
`Professional, vol. 7, No. 2, ISSN: 1409-0833.
`Willett, S., “Metered PCs: Is Your System Watching You?
`Wave System beta tests new technology”, pp. 84, May 2,
`1994, InfoWorld.
`
`Linn, R., “Copyright and Information Services in the Con-
`text of the National Research and Education Network”, pp.
`9-20, Jan. 1994, IMA Intellectual Property Project Proceed-
`ings, vol. 1, Issue 1.
`Perrit, Jr., H., “Permission Headers and Contract Law”, pp.
`27-48, Jan. 1994, IMA Intellectual Property Project Pro-
`ceedings, vol. 1, Issue 1.
`Upthegrove, L., “Intellectual Property Header Descriptors:
`A Dynamic Approach”, pp. 63-66, Jan. 1994, IMA Intel-
`lectual Property Proceedings, vol. 1, Issue 1.
`Sirbu, M., “Internet Billing Service Design and prototype
`Implementation”, pp. 67-80, Jan. 1994, IMA Intellectual
`Property Project Proceedings, vol. 1, Issue 1.
`Simmell, S. et al., “Metering and Licensing of Resources:
`Kala’s General Purpose Approach”, pp. 81-110, Jan. 1994,
`IMA Intellectual Property Project Proceedings, vol. 1, Issue
`1.
`
`Kahn, R., “Deposit Registration and Recordation in an
`Electronic Copyright Management System”, pp. 111-120,
`Jan. 1994, IMA Intellectual Property Project Proceedings,
`vol. 1, Issue 1.
`Tygar, J. et al., “Dyad: ASystem for Using Physically Secure
`Coprocessors”, pp. 121-152, Jan. 1994, IMA Intellectual
`Property Project Proceedings, vol. 1, Issue 1.
`Griswold, G., “A Method for Protecting Copyright on Net-
`works”, pp. 169-178, Jan. 1994, IMA Intellectual Property
`Project Proceedings, vol. 1 Issue 1.
`Nelson, T., “A Publishing and Royalty Model for Networked
`Documents”, pp. 257-259, Jan. 1994, IMA Intellectual
`Property Project Proceedings, vol. 1, Issue 1.
`Robinson, E.,
`“Redefining Mobile Computing”,
`238-240, 247-248 and 252, Jul. 1993, PC Computing.
`Abadi, M. et al., “Authentication and Delegation with
`Smart-cards”, pp. 1-24, 1990, Research Report DEC Sys-
`tems Research Center.
`
`pp.
`
`Mark Stefik, “Letting Loose the Light: Igniting Commerce
`in Electronic Publication”, pp. 219-253, 1996,
`Internet
`Dreams: Archetypes, Myths,
`and Metaphors,
`IDSN
`(L262-19373-6.
`
`Mark Stefik, “Letting Loose the Light: Igniting Commerce
`in Electronic Publication”, pp. 2-35, Feb. 8, 1995, Internet
`Dreams: Archetypes, Myths and Metaphors.
`Henry H. Perritt, Jr., “Technological Strategies for Protect-
`ing Intellectual Property in the Networked Multimedia Envi-
`ronment”, Apr.
`2-3,
`1993, Knowbots, Permissions
`Headers & Contract Law.
`
`* cited by examiner
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:22)
`
`
`
`U.S. Patent
`
`Nov. 8, 2005
`
`Sheet 1 of 13
`
`US 6,963,859 B2
`
`Figure 1
`
`V
`Creator Creates A
`Digital Work
`
`101
`
`Usage Rights Attached To
`Digital Work and
`Deposited In Repository 1
`
`Repository 2 Initiates A
`Session With Repository 1
`
`Repository ; Request
`Access To Di
`ital Work for
`A State Purpose
`
`Repository 1 Checks Usa e
`Rights of Di
`ital Work 0
`Determined I Access May Be
`Granted
`
`Access Denied
`
`Access Granted
`
`Repostiory 1
`Terminates Session
`With Error
`
`1 Transmits
`Reposito
`Digita Work To
`Repository 2
`
`Repository 1and 2 Each
`Generate Billing
`Information and Transmit
`To Credit Server
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:23)
`
`
`
`U.S. Patent
`
`Nov. 8, 2005
`
`Sheet 2 of 13
`
`US 6,963,859 B2
`
`Figure 2
`
`.
`Rev°s't9rv
`Tl'3l'l;Sgt|Ol"IS
`
`\.
`
`juolllctutloiilj
`
`2 Master
`': Rep§5i4tory '
`1
`I
`
`. . .
`
`. .
`
`R
`'t
`rr§§§’§é:%'Xs
`205
`
`E iz'én'&é}a'n'c_5 E
`: Repository:
`203
`2
`
`I-“Igure 3
`
`Repository
`201
`
`Billing
`Transactions
`302
`
`Clearinghouse
`Protocol
`304
`
`:
`‘Billing
`'
`.
`: Clearinghouse:
`'
`303
`I
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:24)
`
`
`
`U.S. Patent
`
`Nov. 8,2005
`
`Sheet 3 of 13
`
`US 6,963,859 B2
`
`Figure 4a
`Printe4I'0S1ystem
`P213!-1&1—? $$ ¢1$ZC—'$-
`
`I
`
`I
`
`I I
`
`I
`I
`I
`I
`L
`
`Printer
`Repository
`402
`
`Print Device
`403
`
`I
`I
`I
`I
`I
`.I
`
`Repository
`404
`
`I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I
`
`J
`
`Multi-Function System
`410
`
`—-jjtijjjjjfl
`
`Display!
`Execution
`Repository
`41 1
`
`L11-jjijjifj
`
`Repository
`41 5
`
`I I IL-——-———--————I—
`
`Ezéecujcion
`ngine
`413
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:25)
`
`
`
`U.S. Patent
`
`Nov. 8, 2005
`
`Sheet 4 of 13
`
`US 6,963,859 B2
`
`4Q000
`
`8&000
`
`1.500
`
`25.000
`
`Text
`614
`
`Photo
`615
`
`Graphics
`616
`
`Sidebar
`617
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:26)
`
`
`
`U.S. Patent
`
`Nov. 8,2005
`
`Sheet 5 of 13
`
`US 6,963,859 B2
`
`Figure 7
`
`Descriptor
`(d3_L';§';k)
`700
`
`'
`
`Identifier 701
`
`Starting Address 702
`Length 703
`Rights Portion 704
`
`Parent Pointer 705
`
`Child Pointer 706
`
`Child Pointer 706
`
`Figure 9
`
`d-block
`928
`(Sidebar)
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:27)
`
`
`
`U.S. Patent
`
`Nov. 8,2005
`
`Sheet 6 of 13
`
`US 6,963,859 B2
`
`Figure 10
`
`Status
`Information
`1052
`
`‘
`
`Figure 1 4
`
`Ttansactional
`Component
`1451
`
`Sgecification
`omponent
`1452
`
`Copy Count
`1453
`
`Fees/Incentives
`1454
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:28)
`
`
`
`U.S. Patent
`
`Nov. 8, 2005
`
`Sheet 7 of 13
`
`US 6,963,859 B2
`
`Identifier (Magazine)
`
`(Starting Address (0)
`
`Length (100,000)
`
`Rights Portion
`(PRINT,V|EW)
`
`Child Pointers
`
`Identifier (Article 1)
`Starting Address (0)
`
`Rights Portion
`“’R"‘"-""‘”’
`
`C*“"' "°'“‘°"
`
`identifier (Article 2)
`'5taft(i2f'|59OAo¢:?feSS
`Length(25.0oo)
`Ri
`.
`ghts Portion
`(PRINTNIEW)
`
`0
`
`Child Pointers
`
`Identifier (Article 3) A
`
`Identifier (Article 4)
`
`Starting Address
`(50,001)
`‘°"°"““'°°°’
`Rights Portion
`(VIEVV)
`
`Starting Address
`(75,001)
`
`Rights Portion
`( RINT (Fee))
`
`Child Pointers
`
`Child Pointers
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:19)
`
`
`
`U.S. Patent
`
`Nov. 8,2005
`
`Sheet 8 of 13
`
`US 6,963,859 B2
`
`Figure 12
`
`Processing
`Means
`1 200
`
`Processing
`Element
`1 201
`
`Processor
`Memory
`1 202
`
`External
`Interface
`1206
`
`Storage
`1
`raccoon--cu-uuwuuuuu l¢lICClOOlOIDII./
`
`System
`
`Descriptor
`Storage
`1203
`
`Content
`Storage
`1204
`
`'
`
`‘
`
`Figure 13
`
`Identification
`Certificates
`1306
`
`User
`interface
`1305
`
`Repository Specfic
`Software
`Function/Services
`1304
`
`Usage Transaction
`Handlers
`1303
`
`c°r§eR,$,?c?,',t°ry
`1-ransaagon
`Handling
`1302
`
`Operating
`System
`1301
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:20)
`
`
`
`U.S. Patent
`
`Nov. 8,2005
`
`Sheet 9 of 13
`
`US 6,963,859 B2
`
`1501 ~«Digital Work Rights: = (Rights*)
`1502-~—Right := (Right-Code {Copy-Count}{Con11o1-Spec} {Time-Spec }
`{Access-Spec} {Fee-Spec})
`1503-.—Bight-Code := Render-Code |'1‘.ransporh-Code I Ffle-Management;
`Code|Deriva1:ive-Work.s- Code |Configuration-Code
`1504 --—Render-Code := [Play : {Pla_yer: Player-ID} |Print: {Printen Printer~ID}]
`1505 -\—'l‘ransport-Code : = [Copy | Transfer 1 Loan {Remaining~B.ight5:
`Next-Set-of-Rights}]{(NexbCopy-Rights: Next-Set-of—Rig'hts)}
`1505'VF‘ile-Management-Code
`:= Backup {Back-Up-Copy-Rights:
`Next-Set-of-Rights} I Restore | Delete I Folder
`
`I Directory {Name: Hide-Local I Hide-Remote}
`{Partaz Hide-Local I Hide-Remote}
`1507-vDe1-ivative-Works-Code := [Extact I Embed [ Ed.it{Process:
`ProceseJD}] {Next-Copy-Right: :
`Next-Set-ofRights}
`
`15os~configumion-code := Install }Uninsta1l
`1509 -«Next-Set-of-Rights := {(Add.: Set-Of-Righta)} {(Delete:
`Set-Of-Rights)} {CB-eplacez Set-Of-Rights )}{(Keep: Set-Of-Rights )}
`1510-—-Copy-Count := (Copiempositive-integer | 0 I Unlimited)
`151 1 ~—-Control-Spec : = (Control: {Restrictable | Um-esixictable}
`{Unchargeable I Chargeable})
`1512 -Time-Spec := ({Fixed-Interval [Sliding-Interval I Meter-Time}
`Until: Expiration-Date)
`1513 -- Fixed-Interval := From: Start-'1‘ime
`
`1514 ~«Sliding-Interval : = Interval: Use-Duration
`1515-'Meter-Time: = Time-Remaining-. Remaining-Use
`151 6' -- Acces s-Spec : = ({SC: Security-Class} {Authorizationz Authorization-l'.D*}
`{Other-Authorization; Authorization-1D*}{'1‘icket: 'I‘ickefrID})
`1517-«Fee-Spec: = {Scheduled-Discount} Reg'ula.r—Fee-Spec | Scheduled-Fee-Spec}
`Markup—Spec
`1518~—-Scheduled-Discount: = Scheduled-Discount: (Scheduled-Discount:
`(Time-Spec Percentage)*)
`1519-=.Regular-Fee-Spec := ({Fee: | Incentive: } [Per-Use-Spec | Metered-Rate
`Spec 1 Best-Price-Spec I Call-For-Price-Spec]
`(Min: Money-Unit Per: Time~Spec}{Max:
`Money-Unit Per: Time-Spec} To: Account-ID)
`
`1520"~——Per-Use-Spec: = Per-Use: Money-unit
`1521 -«Metered-Rate-Spec := Metered: Money—Unit Per: 'I‘ime$pec
`1522-\-vBest-Price-Spec := Best-Price: Money—unit Max: Money-unit
`1523'-«Call-For-Price-Spec := Call-For -Price
`1524--— Scheduled-Fee-Spec:= (Schedule: (Time-Sp c Regular-Fee-Spec) )
`1525 ~Markup-Spec: = Markup: perc ntage ’1‘o:Account-ID
`
`Fig. 1 5
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:21)
`
`
`
`U.S. Patent
`
`Nov. 8,2005
`
`Sheet 10 of 13
`
`US 6,963,859 B2
`
`REPOSITORY-1
`
`REPOSITORY-2
`
`istration
`Generate R
`Identi ier
`
`Generate Registration
`Message
`g
`Transmit Registration
`Message
`
`Decrypt Performance
`Message
`
`1603
`
`Reposito
`Names 0.
`
`.7
`
`Time Accurate?
`
`Registration
`Identifier Same
`As One Sent?
`
`Yes
`
`Public Check
`
`Yes
`_
`Decrygltklalsesgigsgration
`
`Save Encrypted
`Reposito -1
`.
`.
`.
`.
`egistrationl entifier
`
`R
`
`Extract Repository-1
`identifier
`
`‘
`
`Repository-1
`on Hotlist?
`
`No
`
`Generate Performance
`Message
`
`Transmit Performance
`Message
`
`Repository- 1
`Terminate Transaction
`
`Rep sitory- 2
`Terminate Transaction
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:22)
`
`
`
`U.S. Patent
`
`Nov. 8, 2005
`
`Sheet 11 of 13
`
`US 6,963,859 B2
`
`REPOSITORY-1
`
`REPOSITORY-2
`
`1701
`
`Create a Session Key Pair
`
`Decrypt Second Key
`
`1702
`
`E c pt Second Key Using
`935%: Key of Repository-2
`1703
`
`Transmit Encrypted Second
`Key To Repository-2
`
`Generate Tirnestamp
`Message
`
`1707
`
`1708
`
`Generate Tlmestamp
`Exchange Message
`
`Transmit 1'imestamp
`Exchange Message
`To Repositoryfl
`
`Transmit Timestamp
`Message To ReposItory—2
`
`Note Current Time
`
`1710
`
`Save Time From Repository-1
`
`1711
`
`Compare Current Time with
`y Time From Repository-1
`
`1712
`
`No
`
`Time
`Difference Exceed
`Tolerance?
`
`Terminate Transaction
`
`Com1Eute Ad‘usted
`rme De
`
`Fig. 17
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:23)
`
`
`
`U.S. Patent
`
`Nov. 8, 2005
`
`Sheet 12 of 13
`
`US 6,963,859 B2
`
`REQUESTER
`
`est
`R
`°'
`eq"
`Performs General
`Tests
`
`Tests Failed
`
`1802
`Do Not Initiate
`Transaction
`
`Figure 18
`
`1303
`“'“’E'‘
`Server Generates Tran section
`Identifier
`
`1304
`
`Right Granted?
`
`No
`
`Yes
`
`1
`
`"6
`
`“me and
`onditlons Satisfied?
`
`No
`
`Security A -
`Access Conditions
`Satisifed
`
`1808
`
`Yes
`
`Copy Count= 0?
`
`ism
`
`N
`
`°
`
`Copies in Use For
`
`Count For Right
`
`of “gum?
`
`Determine Set
`Oi Remaining
`Rights
`
`Remaining Set
`of Rights?
`
`°"dm°"’ s'fl‘fi'd1
`
`Y“
`
`Perform Usage
`7""““'°" 5"?”
`
`1817
`
`Decrement Copies In Use For
`Right By Number In Request
`
`1818
`
`For Metered Use. Subtract
`Elapsed Time From Remaining
`Use Time For Right
`
`1819
`Initiate End-Charge Financiai
`Transaction to Confirm Billing
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:24)
`
`
`
`U.S. Patent
`
`Nov. 8,2005
`
`Sheet 13 of 13
`
`US 6,963,859 B2
`
`Figure 19
`
`Maw
`Transaction
`
`Next Data
`
`-P
`
`Commit Report To ‘
`Credit Server
`1914
`
`Report Error
`To Credit Server
`‘ISIS
`
`Ad‘
`
`i
`
`Ad‘
`
`Line
`I-901
`
`Report Error
`To Credit Server
`1918
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:19)(cid:23)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:25)
`
`
`
`US 6,963,859 B2
`
`1
`CONTENT RENDERING REPOSITORY
`
`Continuation of prior application Ser. No.: 09/778,006
`filed Feb. 7, 2001, now U.S. Pat. No. 6,714,921; which is a
`Division of U.S. Ser. No.: 08/967,084 filed Nov. 10, 1997,
`now U.S. Pat. No. 6,236,971 and which is a Continuation of
`U.S. Ser. No.: 08/344,760 filed Nov. 23, 1994, now aban-
`doned.
`
`5
`
`FIELD OF THE INVENTION
`
`The present invention relates to the field of distribution
`and usage rights enforcement for digitally encoded works.
`BACKGROUND OF THE INVENTION
`
`A fundamental issue facing the publishing and informa-
`tion industries as they consider electronic publishing is how
`to prevent the unauthorized and unaccounted distribution or
`usage of electronically published materials. Electronically
`published materials are typically distributed in a digital form
`and recreated on a computer based system having the
`capability to recreate the materials. Audio and video
`recordings, software, books and multimedia works are all
`being electronically published. Companies in these indus-
`tries receive royalties for each accounted for delivery of the
`materials, e.g. the sale of an audio CD at a retail outlet. Any
`unaccounted distribution of a work results in an unpaid
`royalty (e.g. copying the audio recording CD to another
`digital medium
`The ease in which electronically published works can be
`“perfectly” reproduced and distributed is a major concern.
`The transmission of digital works over networks is com-
`monplace. One such widely used network is the Internet.
`The Internet is a widespread network facility by which
`computer users in many universities, corporations and gov-
`ernment entities communicate and trade ideas and informa-
`tion. Computer bulletin boards found on the Internet and
`commercial networks such as CompuServ and Prodigy
`allow for the posting and retrieving of digital information.
`Information services such as Dialog and LEXIS/NEXIS
`provide databases of current, information on a wide variety
`of topics. Another factor which will exacerbate the situation
`is the development and expansion of the National Informa-
`tion Infrastructure (the NII). It is anticipated that, as the NII
`grows, the transmission of digital works over networks will
`increase many times over. It would be desirable to utilize the
`NII for distribution of digital works without the fear of
`widespread unauthorized copying.
`The most straightforward way to curb unaccounted dis-
`tribution is to prevent unauthorized copying and transmis-
`sion. For existing materials that are distributed in digital
`form, various safeguards are used. In the case of software,
`copy protection schemes which limit the number of copies
`that can be made or which corrupt the output when copying
`is detected have been employed. Another scheme causes
`software to become disabled after a predetermined period of
`time has lapsed. A technique used for workstation based
`software is to require that a special hardware device must be
`present on the workstation in order for the software to run,
`e.g., see U.S. Pat. No. 4,932,054 entitled “Method and
`Apparatus for Protecting Computer Software Utilizing
`Coded Filter Network in Conjunction with an Active Coded
`Hardware Device.” Such devices are provided with the
`software and are commonly referred to as dongles.
`Yet another scheme is to distribute software, but which
`requires a “key” to enable it’s use. This is employed in
`distribution schemes where “demos” of the software are
`
`2
`arovided on a medium along with the entire product. The
`demos can be freely used, but in order to use the actual
`aroduct, the key must be purchased. These scheme do not
`iinder copying of the software once the key is initially
`aurchased.
`
`A system for ensuring that licenses are in place for using
`icensed products is described in PCT Publication WO
`93/01550 to Griswold entitled “License Management Sys-
`em and Method.” The licensed product may be any elec-
`ronically published work but is most effective for use with
`works that are used for extended periods of time such as
`software programs. Griswold requires that the licensed prod-
`uct contain software to invoke a license check monitor at
`nredetermined time intervals. The license check monitor
`generates request datagrams which identify the licensee. The
`request datagrams are sent to a license control system over
`an appropriate communication facility. The license control
`system then checks the datagram to determine if the data-
`gram is from a valid licensee. The license control system
`then sends a reply datagram to the license check monitor
`indicating denial or approval of usage. The license control
`system will deny usage in the event that request datagrams
`go unanswered after a predetermined period of time (which
`may indicate an unauthorized attempt to use the licensed
`product).
`In this system, usage is managed at a central
`location by the response datagrams. So for example if
`license fees have not been paid, access to the licensed
`product is terminated.
`It is argued by Griswold that the described system is
`advantageous because it can be implemented entirely in
`software. However, the system described by Griswold has
`limitations. An important limitation is that during the use of
`the licensed product, the user must always be coupled to an
`appropriate communication facility in order to send and
`receive datagrams. This creates a dependency on the com-
`munication facility. So if the communication facility is not
`available, the licensed product cannot be used. Moreover,
`some party must absorb the cost of communicating with the
`license server.
`
`A system for controlling the distribution of digitally
`encoded books is embodied in a system available from VPR
`System