`Downs et al.
`
`US006226618B1
`US 6,226,618 B1
`May 1, 2001
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`(54)
`
`(75)
`
`ELECTRONIC CONTENT DELIVERY
`SYSTEM
`
`Inventors: Edgar Downs, Fort Lauderdale;
`George Gregory Gruse, Lighthouse
`Point; Marco M. Hurtado, Boca
`Raton; Christopher T. Lehman, Delray
`Beach; Kenneth Louis Milsted,
`Boynton Beach, all of FL (US); J e?'rey
`B. Lotspiech, San Jose, CA (US)
`
`(73)
`
`Assignee: International Business Machines
`Corporation, Armonk, NY (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21)
`(22)
`
`(51)
`
`(52)
`
`(58)
`
`(56)
`
`Appl. No.: 09/133,519
`Filed:
`Aug. 13, 1998
`
`Int. Cl.7 ...................................................... .. H04L 9/00
`
`US. Cl. ................................... .. 705/1; 705/1; 705/26;
`705/27; 705/51; 705/53; 705/57; 705/59;
`705/71; 380/4; 380/23; 380/24; 380/25;
`380/44; 380/279; 380/281; 380/282
`
`Field of Search .................................. .. 705/4, 51, 53,
`705/57, 59, 71, 26, 27; 380/4, 44, 23, 25,
`281, 282, 279; 707/9
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,200,770
`4,218,582
`4,272,810
`4,405,829
`4,424,414
`4,463,387
`4,528,643
`4,731,840
`4,757,534
`
`4/1980 Hellman et al. .
`8/1980 Hellman et al. .
`6/1981 Gates et al. .
`9/1983 Rivest et al. .
`1/1984 Hellman et al. .
`7/1984 Hashimoto et al. .
`7/1985 Freeny, Jr. .
`3/1988 MnisZeWski et al. .
`7/1988 Matyas et al. .
`
`4,782,529
`4,803,725
`4,809,327
`4,825,306
`4,868,687
`
`11/1988 Shima .
`2/1989 Horne et al. .
`2/1989 Shima .
`4/1989 Robers .
`9/1989 Penn et al. .
`(List continued on neXt page.)
`
`OTHER PUBLICATIONS
`J. Linn, “Privacy Enhancement for Internet Electronic Mail:
`Part I: Message Encryption and Authentication Procedures”,
`RFC 1421, Feb., 1993, pp. 1—37.
`S. Kent, “Privacy Enhancement or Internet Electronic Mail:
`Part II: Certi?cate—Based Key Management”. RFC 1422,
`Feb., 1993, pp. 1—28.
`D. Balenson, “Privace Enhancement for Internet Mail: Part
`III: Algorithms, Modes, and Indenti?ers”, RFC 1423, Feb.
`1993, pp. 1—13.
`B. Kaliski, “Privacy Enhancement for Internet Electronic
`Mail: Part IV: Key Certi?cation and Related Services”, RFC
`1424, Feb. 1993, pp. 1—8.
`* cited by examiner
`Primary Examiner—James P. Trammell
`Assistant Examiner—Nga B. Nguyen
`(74) Attorney, Agent, or Firm—Steven J. Meyers; Steven J.
`Soucar; Fleit, Kain, Gibbons, Gutman & Bongini PL.
`(57)
`ABSTRACT
`
`Disclosed is a method and apparatus of securely providing
`data to a user’s system. The data is encrypted so as to only
`be decryptable by a data decrypting key, the data decrypting
`key being encrypted using a ?rst public key, and the
`encrypted data being accessible to the user’s system, the
`method comprising the steps of: transferring the encrypted
`data decrypting key to a clearing house that possesses a ?rst
`private key, Which corresponds to the ?rst public key;
`decrypting the data decrypting key using the ?rst private
`key; re-encrypting the data decrypting key using a second
`public key; transferring the re-encrypted data decrypting key
`to the user’s system, the user’s system possessing a second
`private key, Which corresponds to the second public key; and
`decrypting the re-encrypted data decrypting key using the
`second private key.
`
`26 Claims, 20 Drawing Sheets
`
`I. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
`_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __.|
`
`CO T
`P O
`(S)
`N ENT R VIDER
`
`l
`|
`
`I WOHKFLOW
`' MANAGER
`l
`TOOL
`|
`l
`I
`|
`|
`|
`|
`
`156
`
`CONTENT
`PROMOTIONS
`
`109
`
`SECURE CONTAINER PACKER TOOL
`
`I
`
`M ETADATA SC
`
`CONTENT SC
`
`173
`
`l3
`TRANSACTION SC
`
`TRANSACTION lD
`
`CLRNGH
`
`OFFER SC
`
`cmmeu
`
`OFFER SC
`
`Petitioner Apple Inc. - Ex. 1014, p. 1
`
`
`
`US 6,226,618 B1
`Page 2
`
`US. PATENT DOCUMENTS
`
`4,868,877
`4,878,246
`4,879,747
`4,905,163
`4,926,479
`4,944,006
`4,995,082
`5,005,200
`5,130,792
`5,159,634
`5,191,573
`5,214,702
`5,220,604
`5,224,163
`5,224,166
`5,260,788
`5,261,002
`5,276,901
`5,315,658
`5,319,705
`5,347,580
`5,355,302
`5,369,705
`5,371,794
`5,412,717
`5,420,927
`5,497,421
`
`9/1989
`10/1989
`11/1989
`2/1990
`5/1990
`7/1990
`2/1991
`4/1991
`7/1992
`10/1992
`3/1993
`5/1993
`6/1993
`6/1993
`6/1993
`11/1993
`11/1993
`1/1994
`5/1994
`6/1994
`9/1994
`10/1994
`11/1994
`12/1994
`5/1995
`5/1995
`3/1996
`
`Fischer .
`
`Pastor et al. .
`Leighton et al. .
`Garber et al. .
`Goldwasser et al. .
`Citta et al. .
`
`Schnorr .
`
`Fischer .
`Tindell et al. .
`
`Reeds, III .
`Hair .
`
`Fischer .
`Gasser et al. .
`Gasser et al. .
`
`Hartman, Jr. .
`Takano et al. .
`Perlman et al. .
`Howell et al. .
`
`Micali .
`Halter et al. .
`Molva et al. .
`Martin et al. .
`Bird et al. .
`Dif?e et al. .
`
`Fischer .
`
`Micali .
`Kaufman et al. .
`
`5,509,071
`5,519,778
`5,537,475
`5,557,541
`5,581,479
`5,588,060
`5,592,664
`5,604,804
`5,606,617
`5,636,139
`5,646,992
`5,646,998
`5,666,420
`5,673,316
`5,675,734
`5,706,347
`5,710,887
`5,745,574
`5,765,152
`5,796,841
`5,864,620
`5,889,860
`5,892,900
`5,915,025
`5,982,892
`5,991,399
`5,999,629
`
`4/1996
`5/1996
`7/1996
`9/1996
`12/1996
`12/1996
`1/1997
`2/1997
`2/1997
`6/1997
`7/1997
`7/1997
`9/1997
`9/1997
`10/1997
`1/1998
`1/1998
`4/1998
`6/1998
`8/1998
`1/1999
`3/1999
`4/1999
`12/1999
`11/1999
`11/1999
`12/1999
`
`Petrie, Jr. et al. .
`Leighton et al. .
`
`Micali .
`
`Schulhof et al. .
`McLaughlin et al. .
`
`AZiZ .
`
`Starkey .
`
`Micali .
`
`Brands .
`McLaughlin et al. .
`Subler et al. .
`
`Stambler .
`
`Micali .
`
`Auerbach et al. .
`
`Hair .
`
`Burke et al. ......................... .. 705/71
`Chelliah et al. .
`
`Muftic .
`
`Erickson ................................ .. 707/9
`Cordery et al. .
`
`Pettitt ..................................... .. 380/4
`
`Eller et al.
`Ginter et al. .
`
`..................... .. 705/51
`
`Taguchi et al. ...................... .. 380/44
`Hicks et al. ......................... .. 705/71
`
`Graunke et al. ................... .. 380/279
`
`Heer et al. ........................... .. 705/51
`
`Petitioner Apple Inc. - Ex. 1014, p. 2
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 1 0f 20
`
`US 6,226,618 B1
`
`Ow ImEmO
`
`zozEo
`
`0m mmHEO
`
`» +
`
`A
`
`_J______.
`
`H
`U
`F
`
`Petitioner Apple Inc. - Ex. 1014, p. 3
`
`
`
`U.S. Patent
`
`1
`
`2
`
`/09SU
`
`1B
`
`____W._f_ato_
`
`at
`
`W9_HMzo:<N_¢o_+_S<_E:
`E5__Emma_mt_
`
`m._._mmm_>> ._.Zm_._.ZOO
`.:<.rm_m._.Zm._.ZOO
`
`
`
`_Imm“92em:
`
`
`
`.<»<n_<E_>_omPo<E.xm
`
`
`
`
`
`mn=:_Oo_o:<.mo__._n_<mo
`
`._.Zm._.ZOO
`
`ZO_._._w_DOO<
`
`___
`
`
`
`_ozcmoxEH28_m_Eo_>oEEH28_m._Emaozm_
`
`a_m.5oo_>_m.5oos_T.m@_mo<n__nm:z_
`
`
`S_zo_»<o_n__5zzo:o<wz<E
`m3M:UHRm@afimopmezmpzoo
`
`
`
`®L.|._OO._.zo:<:_ozoomE
`_>555_.2:
`____________mommmoommV........................................j
`
`ZO_._.O<mZ<m._.
`
`0O:_
`
`._.ZDOOO<
`
`ommmuio
`
`
`
`._<:w_no_zoEom_._m_
`
`Petitioner Apple Inc. - Ex. 1014, p. 4
`
`Petitioner Apple Inc. - Ex. 1014, p. 4
`
`
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 3 of 20
`
`US 6,226,618 B1
`
`______________________
`
`1
`
`wmm:53Em<Ez_
`
`zo_mm__>_mz<ENE
`
`mi
`
`ommmzmo:
`
`mmsozm.®
`
`6
`
`“ms
`
`mmsomw
`
`mm_Z_<._.ZOO
`
`mmv_o<n_
`
`mmaomm
`
`mm_Z_<._.ZOO
`
`m_m5<z<
`
`mmmadzm
`
`<._.<n_
`
`ZO_._.<n=mm_>3»zms_><n_
`
`mo<u_m.uFz_
`
`mmzoewso
`
`mo_>mm_m
`
`m_O<n:u_w._.Z_
`
`a.mm:o:oz_m<m._o
`
`0 UN.U~n~
`
`H
`
`cm“
`
`:03
`
`
`m.OO.__OZ_._.=m
`s_m:m>mm:m°
`
`Petitioner Apple Inc. - Ex. 1014, p. 5
`
`Petitioner Apple Inc. - Ex. 1014, p. 5
`
`
`
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 4 of 20
`
`US 6,226,618 B1
`
`E><.a
`
`zo:<o:&<
`
`
`
`._Om_._.zOo>fi%aoo
`
`oz_vE<_2¢E<>>
`
`zo_EEomo
`
`ozaoomo
`
`
`
`zoEmmo._.m_._><._n_
`
`
`
`._.s_0_>_Eémz
`
`ozamoomm
`
`be
`
`Eémz8
`
`zofimjoo
`
`mmsomw
`
`E2528
`
`mommmoomm
`
`._.Zm:ZOO
`
`
`
`._._>_OS_>m<mm:
`
`02
`
`
`
`A:.D~n~
`
`Petitioner Apple Inc. - Ex. 1014, p. 6
`
`Petitioner Apple Inc. - Ex. 1014, p. 6
`
`
`
`
`
`
`
`
`U
`
`6ta
`
`a
`
`10
`
`.mhS
`
`02f05
`
`6SU
`
`1B816
`
`/09mbzoon,mo<m:
`
`new
`
`9zo:o<mz<E
`
`N.U~n~
`
`P:ozEoé/SSN
`
`nmom
`
`0..2V1,_yo
`M8m
`
`mom
`
`Sm
`
`we
`N
`
`ZO_._.<O_:_n_n_<
`
`D_
`
`mom
`
`DON
`
`Petitioner Apple Inc. - Ex. 1014, p. 7
`
`Petitioner Apple Inc. - Ex. 1014, p. 7
`
`
`
`
`
`U.S. Patent
`
`yaM
`
`1
`
`M6
`
`SU
`
`m
`
`
`
`mmzzpzoommsomm
`
`ezmezoo
`
`Bmgo
`
`0M0.2_.
`1,
`
`m“o_mEs__2>m .
`
`Emezoo
`
`H.NT®flaw
`
`
`EmmaEv.lEmma
`
`
`
`momomam-o_mE_>_s_>mEmfizoo
`
`8oIIIIIIIIIIIIIIIIIIIIIIlI.._MMUNK@/09mnM6,E>m_ozmH
`
`Petitioner Apple Inc. - Ex. 1014, p. 8
`
`Petitioner Apple Inc. - Ex. 1014, p. 8
`
`
`
`
`
`U.S. Patent
`
`S
`
`m.mmz>>o
`m__>_<z
`®.
`
`S
`
`3H.
`
`w_mmz>>omH.
`
`@S_.J
`
`4
`
`mEo_u__Em_o
`
` H.DW1ammézooDDnu.MQ5m__o_o2|.mm<n__>_oo>m_v_-o_E.m_s_s_>m1,bee@W33Mm
`
`UH.+8BAug!
`_H_Ev
`
`
`®‘:11!mm_z_<pzoommaomm
`
`_H_D_H_pzmfizoo OMeMBm_w_n_ExH.DW.Emma...7-o_mE_>__2>m
`
`
`m__2<z3tUHm_mm_z>>oNmBmgonu_H_m
`
`WEmma
`
`hzmfizoo
`
`/0
`
`2,
`
`6,
`
`1B
`
`%AlEmfizoo
`
`mV.%~n~
`
`Petitioner Apple Inc. - Ex. 1014, p. 9
`
`Petitioner Apple Inc. - Ex. 1014, p. 9
`
`
`
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 8 of 20
`
`US 6,226,618 B1
`
`3mmmm_.mmm.__mum___,........-1.Em.Hmmm.Em.Em.HH.H_$3SE28mmzmo:_Ea:5528
`
`EH28HHH_I1I1I1II|IIIIIII|III1I11IIIIIIIIIIlIIIIILIIIIIIIIIIIIIIIIIIILHHSm\Ea:._oEzoom_o<m:
`
`
`mmzmo:___._«:u_1I111IIIII1:u::11u1I1II:IIIIIII‘IL_III|IIIIIIII1:.__.HHSm\$2:
`
`
`zoEo_“Ezme_EflzooHHEa:zo:<o::zm_o_
`:,mE,_ooHHHIIIIIIIl1IIl|lI|IIIIIIIIIIII|IIiIIIIIII|IIIIIIIIIIIIIIIIIIIII|IIIIIIIIIIII|__Hmom\r$>SozE<s_mE
`EwczooHSm\
`
`.__..N...|__.NOH9_I__G_3.9HHQHH9.9.l_.N,
`
`
`_._.___._._HO_OHuMvOH:.__OH0m2HGH_OHOI__mm:OHNHMOHSHOHH__....3.VO_S_H_d_|_3_O_3.d_NV.d_NO.d.OH|HdHuvHWH_._._OHOHVHAHHNHHHN.HHLNHHHLHHHHH.3A.9.d.d
`
`
`WHHHWHWHHSHAHSWCHflSHOH@3HOHAHHHHEWHHH
`
`
`
`
`
`
`
`dHvH_m_W_uWv_._._HmH3HOHWWHOHNHHO_mHw9__OH3Hwwuwfixg_mHH:3mvumamssm.23_mHWHmOHSH3SHHHQHOHVAHNHOHBHIOHBH9HSHN.mHG_O.SB.N_W_O_._fl_NHONHNH_._._H.N..HNHl.NH|
`
`
`
`_O__._.._HBH.._H_WHH9
`.8N.._3.SI.SVS..I_N.B_S
`H3_.HS_
`.H_H_H.H_
`
`GmGHS_3_HOWH”SH||_HS_OSHS__.:HO_fl_O_d
`
`
`
`
`
`
`
`
`Em:ozm_
`
`
`
`HmHmm_o_>m_atmm
`
`WHmH.ON
`SNOJJCINOO aevsn
`
`Hmmm:o:oz_m<m._o
`
`‘ - U §)'r'x1_|‘1'>;:'c'>'c_1.3'1_3:'/'1‘I'cir'{\%
`
`NOlJ_VZlHflOHJ.flV
`ESNEOH
`
`NOlJ_VO|;l|!:E|A
`NOIJQVSNVHL
`
`'9N|SS3OOHd os
`
`m?
`
`M.U~n~
`
`
`
`Hmimopmo_zoEom:m_aEm_o_>o_nEEmfizoo
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1014, p. 10
`
`Petitioner Apple Inc. - Ex. 1014, p. 10
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 9 of 20
`
`US 6,226,618 B1
`
`
`
`.__<Eo@om-m.nEn_o
`
`Emfizoo
`
`ozfimoz
`
`AmmEm
`
`F:
`
`m2
`
`._.Zm_._.ZOO
`
`
`
`Amvommmuio
`
`:_<Eommmvmmm
`
`Nod
`
`
`
`
`
`am.«am:ozm
`
`@m_o_>mo
`
`9zofi<o:mm<
`zozm._oQ
`
`o_zoEomd
`
`
`
`Emfizoo._<_._0_Q
`
`Amvmmobw
`
`mo<w:
`
`WOZOO
`
`E»
`
`own
`
`-oz_m<m_._o
`
`amaze:
`
`Fzmfizoo
`
`AmEm_o_>omn_
`
`6.U~n~
`
`Petitioner Apple Inc. - Ex. 1014, p. 11
`
`Petitioner Apple Inc. - Ex. 1014, p. 11
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 10 of 20
`
`US 6,226,618 B1
`
`W
`
`
`
`mmzoac__<53.3..
`
`
`
`Emmcus.EOEate?
`
`
`
`m—.vm.mo.m«mo...co.m:_$8o&.m:_mmuooEo._Emmmmnu
`
`
`
`
`
`
`
`.ommuuo.iwm.uam_n_
`
`.:w:_nmouo.a
`
`Batu:0Elm
`
`
`
`Ev:2.3500Em«E
`
`w>o._>
`
`,,
`
`
`
`5.595$..2.,,...,}«
`
`O:_.._nEom0.:
`
`
`
`E::_£:6_u..._z865F1atea
`
`.Tlllplil»
`6.:.__:66Ease8m_
`
`
`
`Petitioner Apple Inc. - Ex. 1014, p. 12
`
`
`
`
`
`mo.5mE_oo_m....s_zomasz
`
`Petitioner Apple Inc. - Ex. 1014, p. 12
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 11 0f 20
`
`US 6,226,618 B1
`
`Petitioner Apple Inc. - Ex. 1014, p. 13
`
`
`
`U.S. Patent
`
`0
`
`1
`
`6
`
`1B81
`
`
`
`
`
`m9mmn_>omn.»zm._.zoo
`
`mm“
`
`.rZm_HZOO
`
`mzo_+o_>_omn_
`
`mEm
`
`2_1,_mmimm
`momm__>__>_oomW_:ozm._o
`
`
`.@aminoM_wmmmkmwvfimo8:mtomomE<n_,¢nmF_2mzo_.5_>_oET.__<_.m_mkZm._.ZOOmn:._O
`
`
`O_DD<mo_:n_<mo.rZm:.ZOO
`
`
`
`.<._<o<E_2n_m._.O<m._.Xm_
`
`0_
`
`
`
` Homo:n_mo<u_mm:z_mommmoomaa_ZO_._.<O_n:._.OZzo_5<mz<EMIIIII_S___
`
`_m._f_0m::n_os_
`
`
`69_
`
`.m..U~r»~_zo:o<mz<E
`
`_GO._
`
`
`
`n,mm:o_._409zo_»<:_ozoomEomEtc6-.oz_m<m._o_E:o8<S_Um2_
`
`Petitioner Apple Inc. - Ex. 1014, p. 14
`
`Petitioner Apple Inc. - Ex. 1014, p. 14
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 13 of 20
`
`US 6,226,618 B1
`
`§~55%
`
`zo_E>momo
`
`mm
`
`zo_E>mozm
`
`mm><#_
`
`ZO:.<O_._n_n_<
`
`
`
`._Om:.zOo><:\>n_oo
`
`oz_é<2mm:<>>
`
`zo_EEomo
`
`ozaooma
`
`
`
`zoEm_mo._.m_._><._n_
`
`Ea:Eémz
`
`ozamoomm
`
`‘I
`
`ma
`
`mmzmo:_
`
`Km.“
`
`OD
`
`>m<mm:
`
`zo_.5m_._._oo
`
`mm
`
`F
`
`mmmiomm3$2,
`
`IIIIIIIIII_9.___/__Amvmmopwm9_gpzmhzoo3TD_ZO_._.O<.wZ<E._..6
`
`_
`
`mm_z_<+zoo_mmaomm_
`
`mommmoomm
`
`_m2
`
`zo:<o:n_n_<
`
`mmnzmz_
`
`wzzI_%,_._-mm:<>>_IIIIIIIIIIIIIIIIII_IIIIIIIIIIIIIIIII.Amvmmaoz_-oz_m<m._o_
`
`Amfitm_/F/:
`
`Petitioner Apple Inc. - Ex. 1014, p. 15
`
`Petitioner Apple Inc. - Ex. 1014, p. 15
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 14 0f 20
`
`US 6,226,618 B1
`
`@
`l
`K 1101
`
`SELECT ALGORITHM
`& BIT RATE
`
`1102
`
`YES
`
`IS
`THERE A
`PREVIOUSLY CALCULATED
`RATE FACTOR
`?
`
`/ 1103
`
`/ 1108
`
`RETRIEvE PREVIOUSLY CALCULATED
`RATE PACToR RSTORED
`
`1104
`/
`v
`ENCODE DIGITAL CCNTENT & DISPLAY
`PROGESS USING RSTORED
`l
`
`1105
`/
`
`CALCULATE CURRENT
`RATE FACTOR RCURRENT
`l
`
`K 1106
`
`UPDATE RATE PACTCR
`RNEW = AVG (RsToRED + RCURRENT)
`l
`
`BEGIN ENCODING FOR A
`PREDETERMINED PERIoD
`OF TIME & CALCULATE NEW
`RATE PACTCR RNEW
`
`I / "09
`
`ENCODE DIGITAL CONTENT 81
`DISPLAY PROGRESS
`USING RNEW
`
`f 1107
`
`STORE RNEW FOR THIS ALGORITHM & BIT RATE
`
`1100
`
`FIG. 11*
`
`Petitioner Apple Inc. - Ex. 1014, p. 16
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 15 0f 20
`
`US 6,226,618 B1
`
`/ 1201
`
`READ IDENTIFIER ON MEDIA
`(E.G. UPC, ISRC, ISMN OR EQUIVALENT)
`
`1202
`/
`v
`INDEX INTO CONTENT PROVIDER'S
`DATABASE(S) USING IDENTIFIER
`l
`/ 1203
`
`RETRIEVE ADDITIONAL
`INFORMATION RELATED TO MEDIA
`
`l
`
`f 1204
`
`CREATING DIGITAL CONTENT
`FOR ELECTRONIC DISTRIBUTION
`
`FIG. 12
`
`Petitioner Apple Inc. - Ex. 1014, p. 17
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 16 0f 20
`
`US 6,226,618 B1
`
`I
`
`STA RT
`
`I
`
`v
`
`1301
`/
`
`SELECT MUSIC TO BE ENCODED
`
`i
`
`K 1302
`
`DETERMINE GENRE OF MUSIC
`SELECTED
`
`l
`
`K 1303
`
`DETERMINE AUDIO COMPRESSION
`LEVELS & AUDIO COMPRESSION
`ALGORITHMS TO BE USED FOR ENCODING
`
`l
`
`K 1304
`
`SELECT AUDIO SIGNAL PROCESSING
`OPERATIONS & COMPRESSION SETTINGS
`
`FIG. 13
`
`Petitioner Apple Inc. - Ex. 1014, p. 18
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 17 0f 20
`
`US 6,226,618 B1
`
`SCHEDULE DOWNLOAD
`
`LIBRARY.
`
`DOWNLOAD SCHEDULE
`nu“ ILICT mu m IGUKVE mu! an: Auuln
`
`1401
`
`llunlnuy
`lulmm
`
`Q Save a) Cancel
`
`+ USER STARTS A DOWNLOAD
`
`DOWNLOAD SCHEDULE
`CD PHDlxGRESi
`TRICK PHOGESS
`
`N66600:. Magnum!!!
`
`+ DOWNLOAD COMPLETES
`
`LIBRARY
`
`1403
`
`SORT BY 1» Tltll
`5 Artist
`
`FIG. 14
`
`Petitioner Apple Inc. - Ex. 1014, p. 19
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 18 of 20
`
`US 6,226,618 B1
`
`—\mN55%
`
`I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I
`
`.1
`
`
`
`
`
`><Em_o205200m._oEzoo
`
`
`
`
`
`<._.<Q<._.m:>_<._.<D<._.m__>_O_QD<
`
`
`
`
`
`>>On_Z_>>>>ooz_>>>>ODZ_>>
`
`mmmaézm
`
`mmm_z_<»zoo
`
`mmmndzm
`
`m._oEzoo
`
`Petitioner Apple Inc. - Ex. 1014, p. 20
`
`
`
`
`
`»m_._.><._n_m:o_m:_>_mm_><.E
`
`2.2mofl\.
`
`Petitioner Apple Inc. - Ex. 1014, p. 20
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 19 of 20
`
`US 6,226,618 B1
`
`
`
`.05.20_._.<O_:_n_n_<
`
`mmnjmxmmmiommm_m>>
`
`
`
`
`
`__________
`
`_________
`
`
`
`mpomwmom:m<_m<>
`
`
`
`
`
`mm_o<z<_>_Smwmomm><._n_
`
`
`
`_._.Zm=2m__0<Z<_>_+zm_smo<z<_>_
`
`
`
`><:_n_\>mOO<._.<n_
`
`E2
`
`82
`
`
`
`mm:.5“
`
`
`
`ZO:.<O_Z3_>__>_OOZO_._.<O_._n_n_<-mm_._.Z_
`
`._<:o_o
`
`._.Zm_._.ZOO
`
`>m<mm:
`
`8.
`
`Petitioner Apple Inc. - Ex. 1014, p. 21
`
`Petitioner Apple Inc. - Ex. 1014, p. 21
`
`
`
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 20 of 20
`
`US 6,226,618 B1
`
`Bu
`
`»
`.
`
`15...:
`
`.._lU_U.Sim.:25¢
`
`L.%.....|_>4um.
`
`5::55
`
`5_._><._n_
`
`..4..
`m<._mm_._
`
`L
`
`c~.D~n~
`
`39
`
`
`
`;m_>uEI
`
`5.5..€£:m
`
`.96_==.:
`
`._.Z_m_n_
`
`uu_._=om.,Era._.
`
`:3...DIIU.633
`
`5......>5»
`
`:::<.050
`
`..::t».!=o
`
`.33no
`
`3......
`
`.u_;._
`
`.2Ea
`
`
`.0mm».22.6n..no.MS
`
`Par;E<.mm_._
`.+...,;...fl>:.;.«_._.»_m..mA...
`
`:35-...5k
`
`EmF
`
`faganut:A
`
`2...;A-gv-nus
`
`Petitioner Apple Inc. - Ex. 1014, p. 22
`
`Sm»
`
`
`
`1u,..§.,.._P...M
`
`_.&.9zso..n_:.,.1H,.«.....
`
`>m<mm_._
`
`0
`
`D03200.
`
`cu.-.<..
`
`no>2;.J5.>mEon
`
`m»om_.m_mEm:
`
`._.m_:_><._n_
`
`ZOxozo
`
`
`
`mm>oo_>_:m:<
`
`mm_><.E
`
`9:I2:...6:553.:K
`
`.|||l.’V
`
`+m:><._n_mpomjmmmmma
`
`.3E..1uuuw
`
`
`
`:..._.fi.:n..«.E=_....:5
`
`.u=n<m.250;3...::s:<.,3.1...,.,;._u_1:T._.,_:
`
`
`
`»Sn?2.......u=_vu.O~,
`
`
`
`
`
`.n_,<.O._w...>.>oo.,+..»n._a_m.x..m.vm,....._,>
`
`m<.mm:
`
`mom:
`
`Petitioner Apple Inc. - Ex. 1014, p. 22
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`US 6,226,618 B1
`
`1
`ELECTRONIC CONTENT DELIVERY
`SYSTEM
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This non-provisional application claims subject matter
`that is technically related to the following applications that
`are commonly assigned herewith to International Business
`Machines (IBM).
`
`ATTORNEY
`DOC. NO.
`
`SE9-98-006
`
`SE9-98-007
`
`SE9-98-008
`
`SE9-98-009
`
`SE9-98-0 0
`
`SE9-98-0 1
`
`SE9-98-0 3
`
`SE9-98-0 4
`
`SE9-98-0 5
`
`SE9-98-0 6
`
`APPLI-
`CATION
`SERIAL TITLE OF THE
`NO.
`INVENTION
`
`INVENTOR(S)
`
`09/209,440 Mu timedia Player
`Toolkit
`
`09/152,756 Secure Electronic
`Content
`Management
`
`Kenneth L. Milsted
`George Gregory Gruse
`Marco M. Hurtado
`Edgar Downs
`Cesar Medina
`George Gregory Gruse
`John J. Dorak, Jr.
`Kennet1 L. Mi stec
`09/241,276 Mu timedia Content Kennet1 L. Mi stec
`Creation System
`Qing Gong
`Edgar Downs
`09/177,096 Sys em for Tracking George Gregory Gruse
`Enc-User Electronic John J. Dorak, Jr.
`Content
`Kenne 1 L. Mi s ec
`09/203,307 Key Management
`Jeffrey B. Lots3iec1
`Sys em for End-
`Marco M. Hur ado
`User Digital Player George Gregory Gruse
`Kenne 1 L. Mi s ec
`09/208,774 Mu ti-media player Marco M. Hur ado
`for an Electronic
`George Gregory Gruse
`Content Delivery
`Edgar Downs
`Sys em
`Kenne 1 L. Mi s ec
`09/203,306 A method to
`Kenne 1 L. Mi s ec
`identify CD content Craig Kindell
`Qing Gong
`Richarc Spagna
`09/203,315 Too kit for
`delivering electronic Kenne 1 L. Mi s ec
`con ent from an
`David P. Lybranc
`Online store.
`Edgar Downs
`09/201,622 A method and
`Kenne 1 L. Mi s ec
`apparatus to
`Kha Kinh Nguyen
`automatically create Qing Gong
`encode audio
`A method and
`Kenne 1 L. Mi s ec
`apparatus to
`Qing Gong
`indicate an encoding
`rate for audio
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`
`The invention disclosed broadly relates to the field of
`electronic commerce and more particularly to a system and
`related tools for the secure delivery and rights management
`of digital assets, such as print media, films, games, and
`music over global communications networks such as the
`Internet and the World Wide Web.
`
`2. Description of the Related Art
`The use of global distribution systems such as the Internet
`for distribution of digital assets such as music, film, com-
`puter programs, pictures, games and other content continues
`to grow. At the same time owners and publishers of valuable
`digital content have been slow to embrace the use of the
`Internet for distribution of digital assets for several reasons.
`One reason is that owners are afraid of unauthorized copying
`or pirating of digital content. The electronic delivery of
`digital content removes several barriers to pirating. One
`
`2
`barrier that is removed with electronic distribution is the
`
`requirement of the tangible recordable medium itself (e.g.,
`diskettes or CD ROMs). It costs money to copy digital
`content on to tangible media, albeit, in many cases less than
`a dollar for a blank tape or recordable CD. However, in the
`case of electronic distribution, the tangible medium is no
`longer needed. The cost of the tangible medium is not a
`factor because content is distributed electronically. Asecond
`barrier, is the format of the content itself i.e. is the content
`stored in an analog format versus a digital format. Content
`stored in an analog format, for example, a printed picture,
`when reproduced by photocopying, the copy is of lesser
`quality than the original. Each subsequent copy of a copy,
`sometimes called a generation, is of less quality than the
`original. This degradation in quality is not present when a
`picture is stored digitally. Each copy, and every generation
`of copies can be as clear and crisp as the original. The
`aggregate effect of perfect digital copies combined with the
`very low cost to distribute content electronically and to
`distribute content widely over the Internet makes it rela-
`tively easy pirate and distribute unauthorized copies. With a
`couple of keystrokes, a pirate can send hundred or even of
`thousands of perfect copies of digital content over the
`Internet. Therefore a need exists to ensure the protection and
`security of digital assets distributed electronically.
`Providers of digital content desire to establish a secure,
`global distribution system for digital content that protects
`the rights of content owners. The problems with establishing
`a digital content distribution system includes developing
`systems for digital content electronic distribution, rights
`management, and asset protection. Digital content that is
`distributed electronically includes content such as print
`media, films, games, programs, television, multimedia, and
`music.
`
`The deployment of an electronic distribution system pro-
`vides the Digital Content Providers the ability to achieve fast
`settlement of payment through immediate sales reporting
`and electronic reconciliation as well as gain secondary
`sources of revenue through redistribution of content. Since
`the electronic digital content distribution system is not
`affected by physical inventory outages or returns, the Digital
`Content Providers and retailers may realize reduced costs
`and improved margins. Digital Content Providers could
`facilitate new, or augment existing, distribution channels for
`better timed-release of inventory. The transactional data
`from the electronic distribution system could be used to
`obtain information regarding consumer buying patterns as
`well as to provide immediate feedback on electronic mar-
`keting programs and promotions. In order to meet these
`goals, a need exists for Digital Content Providers to use an
`electronic distribution model to make digital content avail-
`able to a wide range of users and businesses while ensuring
`protection and metering of digital assets.
`Other commercially available electronic distribution sys-
`tems for digital content, such as real audio, A2B from AT&T,
`Liquid Audio Pro Corp. from Liquid Audio Pro, City Music
`Network from Audio Soft and others offer transmission of
`
`digital data over secured and unsecured electronic networks.
`The use of secured electronic networks greatly reduces the
`requirement of Digital Content Providers of distributing
`digital to a wide audience. The use of unsecured networks
`such as the Internet and Web allows the digital content to
`arrive to an end-user securely such as through the use of
`encryption. However, once the encrypted digital content is
`de-encrypted on the end-user’s machine, the digital content
`is readily available to the end-user for unauthorized
`re-distribution. Therefore a need exists for a secure digital
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Petitioner Apple Inc. - Ex. 1014, p. 23
`
`Petitioner Apple Inc. - Ex. 1014, p. 23
`
`
`
`US 6,226,618 B1
`
`3
`content electronic distribution system that provides protec-
`tion of digital assets and ensures that the Content Provider
`(s)’ rights are protected even after the digital content is
`delivered to consumers and businesses. A need thus exists
`
`for rights management to allow for secure delivery, licensing
`authorization, and control of the usage of digital assets.
`Another reason owners of digital content have been slow
`to embrace electronic distribution is their desire to maintain
`
`and foster existing channels of distribution. Most content
`owners sell through retailers. In the music market these U.S.
`retailers include Tower Records, Peaches, Blockbuster, Cir-
`cuit City and others. Many of these retailers have Web sites
`that allow Internet users to makes selections over the Inter-
`
`10
`
`net and have selections mailed to the end-user. Example
`music Web sites include @tower, Music Boulevard and
`Columbia House. The use of electronic distribution can
`
`15
`
`remove the ability of the retail stores from differentiating
`themselves from each other and differentiate themselves
`
`from the content owners, especially on the Web. Therefore
`a need exists to provide retailers of electronic content such
`as pictures, games, music, programs and videos a way to
`differentiate themselves from each other and the content
`
`owners when selling music through electronic distribution.
`Further information on the background of protecting
`digital content can be found from the following three
`sources. “Music on the Internet and the Intellectual Property
`Protection Problem” by Jack Lacy, James Snyder, David
`Maher, of AT&T Labs, Florham Park, N.J. available online
`URL http://www. a2bmusic.com/about/papers/
`musicipp.htm. Cryptographically protected container, called
`DigiBox, in the article “Securing the Content, Not the Wire
`for Information Commerce” by Olin Sibert, David Bernstein
`and David Van Wie,
`InterTrust Technologies Corp.
`Sunnyvale, Calif. available online URL http://
`www.intertrust.com/architecture/stc.html. And “Cryptolope
`Container Technology”, an IBM White Paper, available
`online URL http:///cyptolope.ibm.com/white.htm.
`SUMMARY OF THE INVENTION
`
`Briefly, in accordance with the present invention, dis-
`closed is a method and apparatus of securely providing data
`to a user’s system. The data is encrypted so as to only be
`decryptable by a data decrypting key, the data decrypting
`key being encrypted using a first public key, and the
`encrypted data being accessible to the user’s system, the
`method comprising the steps of: transferring the encrypted
`data decrypting key to a clearing house that possesses a first
`private key, which corresponds to the first public key;
`decrypting the data decrypting key using the first private
`key; re-encrypting the data decrypting key using ia second
`public key; transferring the re-encrypted data decrypting key
`to the user’s system, the user’s system possessing a second
`private key, which corresponds to the second public key; and
`decrypting the re-encrypted data decrypting key using the
`second private key.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram illustrating an over view of a
`Secure Digital Content Electronic Distribution System
`according to the present invention.
`FIG. 2 is a block diagram illustrating an example Secure
`Container (SC) and the associated graphical representations
`according to the present invention.
`FIG. 3 is a block diagram illustrating an overview of the
`encryption process for a Secure Container (SC) according to
`the present invention.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`FIG. 4 is a block diagram illustrating an overview of the
`de-encryption process for a Secure Container (SC) accord-
`ing to the present invention.
`FIG. 5 is a block diagram illustrating an overview of the
`layers for the Rights Management Architecture of the Secure
`Digital Content Distribution System of FIG. 1 according to
`the present invention.
`FIG. 6 is a block diagram illustrating an overview of the
`Content Distribution and Licensing Control as it applies to
`the License Control Layer of FIG. 5.
`FIG. 7 is an illustration of an example user interface for
`the Work Flow Manager Tool of FIG. 1 according to the
`present invention.
`FIG. 8 is a block diagram of the major tools, components
`and processes of the Work Flow Manager corresponding to
`the user interface in FIG. 7 according to the present inven-
`tion.
`
`FIG. 9 is a block diagram illustrating the major tools,
`components and processes of an Electronic Digital Content
`Store of FIG. 1 according to the present invention.
`FIG. 10 is a block diagram illustrating the major compo-
`nents and processes of an End-User Device(s) of FIG. 1
`according to the present invention.
`FIG. 11 is a flow diagram of a method to calculate an
`encoding rate factor for the Content Preprocessing and
`Compression tool of FIG. 8 according to the present inven-
`tion.
`
`FIG. 12 is a flow diagram of a method to automatically
`retrieve additional information for the Automatic Metadata
`
`Acquisition Tool of FIG. 8 according to the present inven-
`tion.
`
`FIG. 13 is a flow diagram of a method to automatically set
`the Preprocessing and Compression parameters of the Pre-
`processing and Compression Tool of FIG. 8 according to the
`present invention.
`FIG. 14 is an example of user interface screens of the
`Player Application downloading content to a local library as
`described in FIG. 15 according to the present invention.
`FIG. 15 is a block diagram illustrating the major compo-
`nents and processes of a Player Application running on
`End-User Device of FIG. 9 according to the present inven-
`tion.
`
`FIG. 16 is an example user interface screens of the Player
`Application of FIG. 15 according to the present invention.
`
`DETAILED DESCRIPTION OF AN
`EMBODIMENT
`
`ATable of Contents is provided for this present invention
`to assist the reader in quickly locating different sections in
`this embodiment.
`
`Table of Contents
`I. SECURE DIGITAL CONTENT ELECTRONIC
`DISTRIBUTION SYSTEM
`A.
`System Overview
`1. Rights Management
`2. Metering
`3. Open Architecture
`System Functional Elements
`1. Content Provider(s)
`2. Electronic Digital Content Store(s)
`3.
`Intermediate Market Partners
`
`B.
`
`Page
`12
`
`12
`12
`14
`15
`16
`16
`17
`18
`
`Petitioner Apple Inc. - Ex. 1014, p. 24
`
`Petitioner Apple Inc. - Ex. 1014, p. 24
`
`
`
`US 6,226,618 B1
`
`5
`
`-continued
`
`6
`
`-continued
`
`Table of Contents
`
`Page
`
`Table of Contents
`
`Page
`
`4. Clearinghouse(s)
`5. End-User Device(s)
`6. Transmission Infrastructures
`System Uses
`C.
`II. CRYPTOGRAPHY CONCEPTS AND THEIR
`APPLICATION TO THE SECURE DIGITAL
`CONTENT ELECTRONIC DISTRIBUTION
`SYSTEM
`A.
`Symmetric Algorithms
`B.
`Public Key Algorithms
`C. Digital Signature
`D. Digital Certificates
`E. Guide To The SC(s) Graphical Representation
`F.
`Example of a Secure Container Encryption
`III. SECURE DIGITAL CONTENT ELECTRONIC
`DISTRIBUTION SYSTEM FLOW
`IV. RIGHTS MANAGEMENT ARCHITECTURE MODEL
`A. Architecture Layer Functions
`B.
`Function Partitioning and Flows
`1. Content Formatting Layer
`2. Content Usage Control Layer
`3. Content Identification Layer
`4. License Control Layer
`C. Content Distribution and Licensing Control
`V. SECURE CONTAINER STRUCTURE
`A. General Structure
`B. Rights Management Language Syntax and Semantics
`C. Overview of Secure Container Flow and Processing
`D. Metadata Secure Container 620 Format
`E. Offer Secure Container 641 Format
`F.
`Transaction Secure Container 640 Format
`G. Order Secure Container 650 Format
`H. License Secure Container 660 Format
`I.
`Content Secure Container Format
`VI. SECURE CONTAINER PACKING AND UNPACKING
`A. Overview
`
`Part
`
`‘gelfejigggf
`E;
`VII. CLEARINGHOUSE(S)
`A_
`overview
`B. Rights Management Processing
`C- Conntry Speeifie i’arar_neters
`D‘ And” Tflgs and Trackmg
`E. Reporting of Results
`F.
`Billing and Payment Verification
`(3_ Retiaiismissioiis
`VIII. CONTENT PROVIDER
`A-
`0VerVieW
`_
`_
`B" Work Flow Manag?
`1. Products Awaiting Action/Information Process
`2. New Content Request Process
`3_ Automatic Metadata Acquisition Piocess
`4. Manual Metadata Entry Process
`5- Usage Conditions Proeess
`3- E/‘I1e1e'f1:i‘::tSae‘ééegeigfeififleiieeeee
`8: Watermarking Preeeee
`9_ Piepiocessiiig and Compiessioii Piocess
`1o_ content Quality contioi process
`1 . Encryption Process
`12- C_ontent 5C(s) Creation Proeess
`13' Fmal Qualny Assurance Process
`12. Content Dispersement Process
`i5_ Work Flow Rules
`c_ Metadata Assimiiatioii and Entry T001
`. Automatic Metadata Acquisition Tool
`2- Mannai Metadata Entry Tooi
`3' Usage Condmons T001
`2
`Parts of the Metadata SC(s)
`5_
`supervised Reieeee Teei
`D_ Content Processing T001
`. Watermarking Tool
`2-
`i’reProeessing and Compression Tooi
`3. Content Quality Control Tool
`.
`ncryption Tool
`e
`E
`.
`E. Content SC(s) Creation Tool
`F.
`Final Quality Assurance Tool
`
`19
`20
`21
`21
`22
`
`22
`23
`24
`25
`26
`27
`29
`33
`34
`35
`35
`36
`37
`38
`39
`42
`42
`44
`45
`47
`51
`53
`55
`58
`59
`60
`60
`
`67
`57
`69
`72
`72
`75
`75
`75
`77
`77
`78
`80
`81
`83
`83
`84
`Z:
`85
`85
`87
`88
`88
`88
`89
`89
`94
`95
`95
`96
`98
`102
`103
`104
`104
`107
`107
`108
`108
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`B.
`
`G. Content Dispersement Tool
`H. Content Promotions Web Site
`I.
`Content Hosting
`1. Content Hosting Sites
`2. Content Hosting Site(s) 111 provided by the
`Secure Digital Content Electronic Distribution
`System
`IX. ELECTRONIC DIGITAL CONTENT STORE(S)
`A. Overview - Support for Multiple Electronic Digital
`Content Store(s)
`Point-to-Point Electronic Digital Content Distribution
`Service
`1.
`Integration Requirements
`2. Content Acquisition Tool
`3. Transaction Processing Module
`4. Notification Interface Module
`5. Account Reconciliation Tool
`C. Broadcast Electronic Digital Content Distribution
`Service
`X. END-USER DEVICE(S)
`A. Overview
`B. Application Installation
`C.
`Secure Container Processor
`D. The Player Application
`1. Overview
`2. End-User Interface Components
`3. Copy/Play Management Components
`4. Decryption 1505, Decompression 1506 and
`Playback Components
`5. Data Management 1502 and Library Access
`Components
`Inter—application Communication Components
`6.
`7. Other Miscellaneous Components
`8. The Generic Player
`
`09
`10
`11
`12
`13
`
`15
`15
`
`16
`
`17
`19
`22
`26
`27
`28
`
`29
`29
`31
`32
`36
`36
`37
`41
`41
`
`41
`
`42
`42
`42
`
`es
`
`1. SECURE DIGITAL CONTENT ELECTRONIC
`DTSTRTBUTTON SYSTEM
`A. System Overview
`The Secure Digital Content Electronic Distribution Sys-
`tem is a technical platform that encompasses the technology,
`specifications, tools, and software needed for the secure
`40 d