throbber
(19) United States
`(12; Patent Application Publication (10) Pub. No.: US 2001/0051996 A1
`Cooper et al.
`(43) Pub. Date:
`Dec. 13, 2001
`
`US 20Ul005l99t3Al
`
`(54) NETw0RK'BA5ED CONTENT
`DISTRIBUTION SYSTENI
`
`provisional of provisional application No. 601183,
`638, fiIC(I on Feb. 18, 2000.
`
`(76)
`
`Inventors: Robin Ross Cooper, La Mesa, (IA
`(US); Robert T. Kulakowski, Rancho
`Santa Fe, CA (US)
`
`Correspondence Address:
`KNOBBE MARTENS OLSON & BEAR LLP
`620 NEWPORT CENTER DRIVE
`SIXTEENTH FLOOR
`NEWPORT BEACH’ CA 92660 (US)
`
`(21) Appl_ No;
`
`09Ir739’293
`
`(22)
`
`piled:
`
`|:‘e])_ 20, 20.01
`
`Related U,S, Application Data
`
`application No.
`(63) Non-provisional of provisional
`60;"250,445, filed on Nov. 30, 2000. Non-provisional
`of provisional application No. 60;"223,l28, filed on
`Aug. 7, 2000. Non—provisional of provisional appli—
`cation No. 60f209,506, filed on Jun. 5, 2000. Non—
`
`Publication Classification
`
`Int. CL?
`(51)
`(52) U.S. Cl.
`
`G061: l5fl6; G061: 17.560
`709,317; 709K229; 705.526
`
`(57)
`
`ABSTRACT
`
`A method and system for transferring electronic media
`inior-matiori over a public network in. such a way as to
`provide safeguards tor inappropriate distribution of copy-
`right or otherwise protected materials are described. The
`media information is transparently watermarked with a
`unique II), such as one generated from X509 Digital
`Certificate and public-key cryptography pul')lic;"private key
`pairs, such that the information can be identified as belong-
`ing to a particular individual. A system and method for
`monitoring the movement of such watermarked files, posi-
`tively identifying people who have inappropriately distrib-
`uted copyright materials over a public network without
`permission, and taking appropriate enforcement action
`against such people.
`
`zoo
`
`I
`
`__
`
`
`CERTIFICATION
`AUTHORITY
`
`25"
`
`_
`
`, 210
`
`2.10
`
`TRANSACTION
`MODULE
`
`ARCHIVE
`SERVER
`
`250
`
`—
`2 /
`-I
`3
`3'
`11
`ITI
`o
`
`I
`I
`I
`I
`i
`:
`|
`I
`I
`I
`I
`
`
`
`
`I
`
`J
`I
`--....._.....-I
`TRANSACTION
`I
`DATABASE
`|
`| - 218
`~...._:__..«
`‘----———-u’
`MASTER
`I
`I
`I
`I
`I
`
`DATABASE
`
`214
`
`/ 744
`
`ARCHIVE
`
`DATABASE
`
`
`ALAM
`MODULE
`
`GDRAS
`
`/
`
`COPYRIGHT
`REGISTRY
`
`220
`230
`
`234
`
`260
`‘fig:-:?;T
`COMPANY
`
`CUSTOMER
`SITE
`
`27°
`
`USER
`DEVICE
`
`"5
`
`118
`
`115
`
`USER
`DEVICE
`
`USER
`r)FvIcF
`
`/ 115
`
`I
`I
`I
`I
`I
`I
`|
`I
`I
`
`I
`I
`I
`I
`I
`|
`I
`|
`I
`I
`I
`I
`I
`II
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 1
`
`

`
`Patent Application Publication
`
`l)ec. 13, 2001 Sheet 1 of 7
`
`US 2001/0051996 Al
`
`moi
`
`
`
`
`
`>\zockmpomzooxmoamz
`
`>.§..m.._<w
`
`$0
`
`..i.an
`
`
`u..n.zocom2200
`Ixmoéuz
`
`—u-anon.--up-..s—_..-:-
`
`~_...aL
`
`.1....xxx...___&.Q.%
`._...
`
`zo_.m_>m_.._up.:o.:z9..,M
`
`age;X...,flfluH,_%WF\.flUIHRHW_.|...h.\.
`\|M.\\mIma»H.....u\.\
`»..w5.m_.:.mNK...x
`Wxom.on.fin_.._\.rd.HnE._d.sa__X8Bmé
`..\.,...\Fl.m_2n___..&§.
`
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:21)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 2
`
`
`

`
`P
`
`3
`
`P
`
`3
`
`0
`
`Sm
`
`5
`
`1.A
`
`.m_M9.._
`
`.._u_ENEu
`
`2E1,m_o_>m_oC1mum:AoFmm>mmw
`m:Tn_m
`
`
`m_._:oos_m._Hm>_:ox<zo_5.%z$:
`
`M_ea\zo_Eo:_Em_ow_AmumSmi|J||i|iIiIi||Iii|llWE“mméowwzo:_imBu
`nwo_>m_n__.mm:«mm:_>»_~_oz5<
`
`234
`
`7m§>m_oMn:mum:_wm<m_E<n2_zo:.o¢mz«Em_m_m<m¢E.B
`
`.m.m_>__._om<
`_E542_m_.__._oos__can
`
`
`W_>m»m_wmm
`
`P.:._o_m:a_ooWN.0_u__«mmm_\m¢w_n_wmw<m_¢.En_Ucan
`
`6Ii||||i||l9_w_
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:22)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 3
`
`
`

`
`Patent Application Publication Dec. 13, 2001 Sheet 3 of 7
`
`US 2001/0051996 A1
`
`INITIALIZATION
`
`AUTHENTICATE USER
`AND GET
`DIGITAL CERTIFICATE
`
`SEARCH FOR AND
`SELECT CONTENT
`
`PAYMENT
`
`WATE RMARK
`
`310
`
`320
`
`330
`
`340
`
`350
`
`TRANS FER
`
`350
`
`(DOWNLOAD)
`CONTENT TO user;
`
`FIG. 3
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:23)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 4
`
`

`
`Patent Application Publication Dec. 13, 2001 Sheet 4 of 7
`
`US 2001/0051996 A1
`
`
`
`
`
`nooz_Ebmm»EOEom_>_mm_n:3:mxh20$am_>_mmn_:w<_._Q3.
`
`one
`
`D<O._><n_
`
`_._w<:
`
`
`
`
`
`:%~¢m_:o_._<zoflo<mz<E___E_m_m_zE<n.ommLzo_mmm_>
`
`omwemu
`
`are
`
`
`
`
`
`_._m<_._ommm_.:m3n_mmm:o<m_¢Iooz_w:mmm:o<m<:o“.0wz_mFwwmm5§<_._onooz_Em2:.
`
`
`
`
`
`
`
`
`
`
`
`ozmm=._._.n_O>mxm_._.<>_mn_m_._._.0253ommm=._._...._OEv.m_E>_mn_MI...
`
`
`
`
`
`
`
`
`
`
`
`._<:a_>_n_z_oz_z_<.:,_oo
`
`w.0_n_
`
`
`
`mmm:~m_z.E<awn_._m:
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:24)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 5
`
`
`
`

`
`Patent Application Publication Dec. 13, 2001 Sheet 5 of 7
`
`US 2001/0051996 Al
`
`SEARCH FOR
`PUBLIC FILES
`
`FIND
`
`WATERMARK
`
`FIND DIGITAL
`CERTIFICATE
`SERIAL NUMBER
`
`AUTHENTICATE
`SERIAL NUMBER
`
`530
`
`540
`
` 510
`
`520
`
`
`550
`
`
`
`
`DECRYPT STRING
`IN WATERMARK
`
`DETERMINE
`ORIGINATOR
`VIA WATE RMARK
`
`
`
`
`
`
`
`560
`
`570
`
`580
`
`
`
`TAKE APPROPRIATE
`ACTION
`
`
`NOTIFY RECIPIENTS
`OF PIRATED
`CONTENT
`
`
`
`
`
`
`
`
`FIG. 5
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:25)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 6
`
`

`
`Patent Application Publication Dec. 13, 2001 Sheet 6 of 7
`
`US 2001/0051996 A1
`
`200
`
`CONTENT DISTRIBUTION SYSTEM
`
`FIG. 6
`
`MRSTER
`DATABASE
`SERVER
`
`SERVER
`
`TRANSACTION
`SERVER
`
`TRANSACTION
`SERVER
`
`TRANSACTION
`
`116
`
`CLIENT / "5
`WORKSTATION
`
`115
`
`CLIENT
`WORKSTATION
`
`CLIENT PDA
`DEVICE
`
`530
`
`273
`
`TRANSACTION
`
`DATABASE
`
`640
`
`\
`
`540
`
`549
`
`VVLB5
`
`UNIX
`SERVER
`
`B26
`NT
`SERVER
`
`32C
`LINUX
`SERVER
`
`
`
`550
`
`/ 550
`
`CUSTOMER SITE
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:26)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 7
`
`

`
`Patent Application Publication Dec. 13, 2001 Sheet 7 of 7
`
`US 2001/0051995 A1
`
`CONTENT DISTRIBUTION SYSTEM
`
`200
`
`MASTER
`DATABASE
`
`714-
`
`WKBS
`
`SERVER
`720
`
`
`
`TRANSACHON
`SERVER
`
`TRANSACWON
`SERVER
`
`
`MEBS
`
`?3O
`
`TRANSACWON
`
`SERVER
`
`72”
`
`73fl
`
`116
`
`BZC
`NT
`SERVER
`
`UNIXILINUX
`115
`CUSTOMER SITE
`
`CLIENT
`WORKSTATION
`
`CLIENT
`WORKSTATION
`WINDOWS
`
`115
`
`115
`
`270
`
`FIG. 7
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:27)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 8
`
`

`
`US 2001/0051996 A1
`
`Dec. 13, 200]
`
`NETWORK-BASED CONTENT DISTRIBUTION
`SYSTEM
`
`Rlil./\'l'l.lD APPl.ICA'I'I()NS
`
`[0001] This application claims priority to U.S. Provisional
`Application No. 60."25U,445,
`filed Nov. 30, 2000, U.S.
`Provisional Application No. 60f223,l28, filed Aug. 7, 2000,
`U.S. Provisional Application No. 60f209,506, filed Jun. 5,
`2000, US. Provisional Application No. 60f183,638, filed
`Feb. 18, 2000, and U.S. application Ser. No.
`(VM/\'l'RIX.'[l02/\) filed Feb. 1], 2001 titled "WEII II/\Sl_".I)
`HUMAN SERVICES CONFERENCING NETWORK,” all
`of which are hereby incorporated by reference.
`
`[0002] BACKGROUND OF THE INVENTION
`1. Field of the Invention
`
`[0003]
`
`[0004] The present invention relates to the field of elec-
`tronic media file content distribution. Additionally,
`the
`invention relates to embedding unique electronic signature
`information, refened to as watemtarks. and inserting these
`watermarks into an electronic media file to facilitate the
`
`authentication of the person responsible for the file.
`
`[0005]
`
`2. Description of the Related Art
`
`[0006] The use of the Internet and the ‘World Wide Web as
`tools for content delivery and e-commerce has increased
`dramatically in recent years. As a consequence, the delivery
`of electronic media content materials such as music, videos,
`software, books, multi—mcdia presentations,
`images, and
`Other electronic media over a network to one or more
`consumers has likewise increased dramatically. Users may
`download such electronic media files legitimately from a
`content provider, for example a record label such as Sony
`Records or Capitol Records, or inappropriately from one of
`the content download services without the permission of the
`copyright owner. Using a network such as the Internet, users
`may, and quite frequently do, transfer digital media files they
`have downloaded, whether legitimately or otherwise,
`to
`others.
`
`In this way, consumers of electronic media infor-
`[0007]
`mation may simply and freely distribute such media infor-
`mation over a public network such as the Internet without
`the permission of the copyright owner (or other property
`rights owners). Such consumers who inappropriately dis-
`tribute copyright material over public networks cannot cu r-
`rently be positively identified, if they can even be tracked
`down at all. Therefore, these consumers can quite often
`successfully deny culpability.
`
`[0003] A prevalent concern within the media publishing
`andfor distribution business is that the supply vs. demand
`equation that drives the economics of valuable goods and
`services no longer applies to digital media. Since a digital
`media file such as a music or movie file can be duplicated
`essentially an unlimited number of times and distributed at
`virtually no cost, the economics for providing such digital
`materials to the public is not viable. In order to return the
`supply versus demand equation back to the digital media
`dornain, individual digital media files must be configured in
`such a way as to give them properties similar to physical
`objects. With such physical properties, these files can be
`handled and monitored in ways that are similar to physical
`objects, thus allowing the return of the necessary economic
`incentives and viability.
`
`[0009] To date, there have been various approaches to
`solving the problems associated with the management, con-
`trol and distribution of digital media files. Most of these
`approaches focus on protecting digital media files. in such a
`way as to limit the functionality of such files when outside
`of the domain that has been pre—approved by the authorized
`distributor of such media. An example is found in the
`distribution of encrypted digital information along with an
`encryption key that will only decrypt the information under
`a limited number of circumstances.
`
`[0010] Although encryption Schemes have provided solu-
`tions lo other problems involving digital media content, it is
`not the preeminent answer to the problem of identifying and
`monitoring content files. For example, encryption schemes
`provide an unsatisfactory solution for digital media for the
`following reasons:
`
`1) Encryption schemes are often targets for
`[0011]
`many hackers, and it is typically only a matter Of
`time before decryption algorithms will be discovered
`and published on a wide scale.
`
`2) The market is overwhelmed with a number
`[0012]
`of encryption schemes. Therefore, no single standard
`is likely to be adopted and enforced.
`
`3) Encryption adds a great deal of expense to
`[0013]
`the distribution of digital media. In some cases, this
`extra expense may make the dilference between
`profitable and unprofitable distribution.
`
`4) Encryption adds a layer of complexity for
`[0014]
`the consumer that will most likely result in lower
`consumer satisfaction.
`
`for
`sharing facilities,
`5) Popular media
`[0015]
`example Napster, have educated tens of millions of
`consumers about the ease with which media files can
`be transferred. It may in fact be too late to success-
`fully change the acecpted model for electronic media
`distribution.
`
`[0016] Consumers might possibly have embraced encryp-
`tion of digital media files had it been introduced on a large
`scale before the Napster file-sharing model. Consumers
`generally will learn to accept models that add a level of
`complexity if these models are irt fact
`the only models
`available. However, the complexities that content distribu-
`tors would like to introduce into the market with encryption
`will arrive after the superior model has been introduced.
`This will
`likely result
`in media content
`file protection
`schemes such as encryption and copy protection disappear-
`ing over time.
`
`SUMMARY OF TIIIE INV/I.-'.NTI()N
`
`[0017] The solution to the numerous problems confronting
`the rights owners of digital media is, therefore, not simply an
`issue of adding encryption. It is more accurately an issue of
`uniquely marking and identifying digital media files with
`authenticated information from a trusted authority and mak-
`ing business decisions that will maximize the potential
`return—on—investment for such files. Therefore, there is a
`need in the electronic media content distribution field to be
`
`files with an authenticated digital
`able to mark content
`signature that uniquely identifies the person who is the
`source, to be able to monitor the files if they are transfened
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:28)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 9
`
`

`
`US 2001/0051996 A1
`
`Dec. 13, 200]
`
`to others, and to have these capabilities while imposing
`minimal burden and inconvenience on the consumer.
`
`[0018] One aspect of this system relates to a system for
`network—based content distribution. The system includes an
`interface module configured to interface with a network. A
`transaction module is coupled to the interface module and
`configured to initialize a transaction with the user, authen-
`ticate the identity of a user, obtain a digital certificate related
`to said user, search for content desired by said user, imple-
`ment a payment transaction with the user, generate a water-
`mark related to said user and transfer content to said user,
`and insert said watermark into said content. A transaction
`database is configured to store information related to trans-
`actions carried out by the transaction module. An archive
`database is configured to store content selected by users. A
`certification authority is configured to authenticate users and
`issue digital certificates.
`
`[0019] Another aspect ofthe invention relates to a method
`for distributing content over a network. The method includes
`initiating a transaction with the user. The digital certificate of
`the user is then authenticated. The user is allowed to search
`for and select content to be downloaded. A watermark is
`generated by the system which relates to the content to be
`downloaded, the source of the content and the identity of the
`user. The watermark is inserted into the content prior to its
`downloading to the user.
`
`[0020] Another aspect of the invention relates to a method
`for verifying, searching for and identifying content acces-
`sible over a network. The method includes identifying files
`which are accessible over the network. For each such
`identified file, the file is searched to determine whether it
`includes a watermark which is related to the source of the
`content and the identification of the authorized user of the
`content. The method then involves determining whether the
`present location of the content with the watermark is an
`authorized location.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0021] The above and other aspects, features and advan-
`tages of the invention will be better understood by referring
`to the following detailed description, which should be read
`in conjunction with the accompanying drawings. These
`drawings and the associated description are provided to
`illustrate various embodiments of the invention, and not to
`limit the scope of the invention.
`
`[0022] FIG. 1 illustrates a typical network configuration
`in which this invention may operate.
`
`[0023] FIG. 2 is a block diagram of an example of a
`system overview architecture.
`
`[0024] FIG. 3 is a flowchart of a process of conducting a
`media content transaction.
`
`[0025] FIG. 4 is a diagram of a typical watermark.
`
`[0026] FIG. 5 is a flowchart of a process of embedding a
`watermark in media content data.
`
`[0027] FIG. 6 is a block diagram of a content distribution
`system and cttstomer site.
`
`[0028] FIG. 7 is a block diagram of a content distribution
`system and customer site.
`
`on'rA11_uo |)l'_-'§S(IRIPl‘I()N
`
`[0029]
`
`Definitions
`
`[0030] The following discussion provides a number of
`useful definitions of ten11s used in describing embodiments
`of the disclosed invention.
`
`[0031] As used herein, the terms “network” and “Internet”
`refer to a network or combination of networks spanning any
`geographical area, such as a local area network, wide area
`network, regional network, national network, andfor global
`network. Those terms may refer
`to hardwire networks,
`wireless networks, or a combination of hardwire and wire-
`less networks. [Iardwire networks may include, for example,
`fiber optic lines, cable lines, ISDN lines, copper lines, etc.
`Wireless networks may include, for example, cellular sys-
`tems, personal communication services (PCS) systems, sat-
`ellite communication systems, packet radio systems, and
`mobile broadband systems. A cellular system may use, for
`example, code division multiple access {CDMA), time divi-
`sion multiple access (TDMA), personal digital phone
`(PDC), Global System Mobile (GSM), or frequency division
`multiple access (FDMA), among others.
`
`[0032] As used herein, a VPN is a secure and encrypted
`communications link between nodes on the Internet, a Wide
`Area Network (WAN), or an Intranet. These nodes can
`communicate with each other, however, it is virtually impos-
`sible for a hacker to either comprehend the meaning of the
`signals or send signals that are believed to be authentic. One
`secure communications technology that is designed to facili-
`tate a VPN is Secure Sockets Layer (or SSL). Other secure
`communications technologies can be used as well. It is not
`a requirement that a VPN be a private network such as SITA,
`the international network for airline reservations.
`
`[0033] As used herein, a VPN provider refers to software,
`hardware, or both that secure an audio.t'video conferencing
`session in such a way as to minimize the possibility that it
`can altered or inappropriately viewed or transmitted. A VPN
`can operate between a number of intemet—enabled devices,
`for example, a VPN can run on two PCs that are connected
`together using well known security technologies. In another
`embodiment, a VPN can operate between a PC and a Web
`Site using security technologies. In yet another embodiment,
`a VPN can additionally operate between many PCs andfor
`many Web Sites. IIand—held devices, mobile phones, and
`web-enabled TV sets can be used as client devices instead of
`
`PCs as pan of the VPN as well.
`
`[0034] As used herein, the term “website” refers to one or
`more interrelated web page tiles and other files and pro-
`grams on one or more web servers, the files and programs
`being accessible over a computer network, such as the
`Internet, by sending a hypertext transfer protocol (II'I'l‘P)
`request specifying a uniform resource locator (URL) that
`identifies the location of one of Said web page files, wherein
`the files and programs are owned, managed or authorized by
`a single business entity. Such files and programs can include,
`for example, hypertext markup language (Il'l'MI.} files,
`common gateway interface {(.‘GI) files, and Java applica-
`tions. The web page files preferably include a home page file
`that corresponds to a home page of the website. The home
`page can serve as a gateway or access point to the remaining
`files and programs contained within the website.
`In one
`embodiment, all of the tiles and programs are located under,
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:19)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 10
`
`

`
`US 2001/0051996 A1
`
`Dec. 13, 200]
`
`and accessible within, the same network domain as the home
`page file. Alternatively, the files and programs can be located
`and accessible through several dilfcrent network domains.
`
`[0035] As used herein, a “web page" comprises that which
`is presented by a standard web browser in response to an http
`request specifying the URI. by which the web page file is
`identified. A web page can include,
`for example,
`text,
`images, sound, video, and animation.
`
`[0036] As used herein, “content file”, “media content file”
`and “content data” refer to the delivery of electronic media
`content materials such as music, videos, software, books,
`multi-media presentations,
`images, and other electronic
`data, for example over a network to one or more consumers.
`Content data will typically be in the fonTI of computer files
`for video, audio, program, data and other multimedia type
`content as well as actual physical copies of valuable content,
`for example (II)-RUM, DVD, VCR, Audio, TV or radio
`broadcasted, streaming audio and video over networks, or
`other forms of embodying such information. The terms
`“content file”, “media content file" and “content data" are
`used interchangeably herein.
`
`[0037] As used herein, “consumer” and "user” refer to a
`person that seeks to transfer or download media content
`llles, for example from a content provider or distributor. The
`terms “consumer” and "user" are used interchangeably
`herein.
`
`[0038] As used herein, a computer, may be any micropro-
`cessor or processor controlled device that permits access to
`the Internet, including terminal devices, such as personal
`computers, workstations, servers, clienLs, mini computers,
`main-frame computers.
`laptop computers, a network of
`individual computers, mobile computers, palm-top comput-
`ers, hand—held computers, set top boxes for a television,
`other types of web—enabled televisions, interactive kiosks,
`personal digital assistants, interactive or web-enabled wire-
`less communications devices, mobile web browsers, or a
`combination thereof. The computers may further possess
`one or more input devices such as a keyboard, mouse, touch
`pad, joystick, pen—input—pad, and the like. The computers
`may also possess an output device, such as a screen or other
`visual conveyance means and a speaker or other type of
`audio conveyance means.
`
`’I'hese computers may be uni processor or multi
`[0039]
`processor machines. Additionally, these computers include
`an addressable storage medium or computer accessible
`medium, such as random access memory (RAM), an elec-
`tronically
`erasable
`programmable
`read-only memory
`(I.-]:'.I’R()M), programmable read-only memory (PROM),
`erasable programmable read-only memory (EPROM), hard
`disks, floppy disks, laser disk players, digital video devices,
`compact disks, video tapes, audio tapes, magnetic recording
`tracks, electronic networks, and other techniques to transmit
`or store electronic content such as, by way of example,
`programs and data. In one embodiment, the computers are
`equipped with a network communication device such a
`network interface card, a modem, or other network connec-
`tion device suitable for connecting to the communication
`network. Furthermore, the computers execute an appropriate
`operating system such as Linux, Unix, Microsoft® Win-
`dows® 95, Microsoft® Windows® 98, Microsoft® Win-
`dow.s® NT, /\pple® Mac()S®, or IBM® OS,=’2®. As is
`conventional, the appropriate operating system includes a
`
`communications protocol implementation which handles all
`incoming and outgoing message traffic passed over the
`Internet. In other embodiments, while the operating system
`may differ depending on the type ol‘ computer, the operating
`system will continue to provide the appropriate communi-
`cations protocols necessary to establish communication
`Links with the Internet.
`
`[0040] The computers may advantageously contain pro-
`gram logic, or other substrate configuration representing
`data and instructions, which cause the computer to operate
`in a specific and predefined manner as described herein. In
`one embodiment, the program logic may advantageously be
`implemented as one or more object frameworks or modules.
`These modules may advantageously be configured to reside
`on the addressable storage medium and configured to
`execute on one or more processors. The modules include,
`but are not limited to, software or hardware components that
`perform certain tasks. Thus, a module may include, by way
`of example, components, such as, software components,
`object-oriented software components, class components and
`task oomponenLs, processes, functions, attributes, proce-
`dures, subroutines, segments of program code, drivers, firm-
`ware, microcode, circuitry, data, databases, data structures,
`tables, arrays, and variables.
`
`[0041] The various components of the system may advan-
`tageously communicate with each other and other compo-
`nents oomprising the respective computers through mecha-
`nisms
`such
`as,
`by way of
`example,
`interprocess
`communication, remote procedure call, distributed object
`interfaces, and other various program interfaces. Further-
`more,
`the functionality provided for in the components,
`modules, and databases may be combined into fewer corn-
`ponents, modules, or databases or further separated into
`additional components, modules, or databases. Additionally,
`the components, modules, and databases may advanta-
`geously be implemented to execute on one or more com-
`puters. In another embodiment, some of the componenLs,
`modules, and databases may be implemented to execute on
`one or more computers external to the web site. In this
`instance, the web site includes program logic, which enables
`the web site to communicate with the externally imple-
`mented components, modules, and databases to perform the
`functions as disclosed herein.
`
`[0042] As used herein, the term "consumer ID" refers to a
`positive digital identification of the user, computer, or player
`device owned by a person who downloads content, has
`access to content download systems, or can access the
`systems described in this patent. A positive digital identifi-
`cation may be any one or a plurality of the following: an
`individual’s digital certificate, a digital certificate or digital
`certificate serial number digitally signed using the user’s
`private key, a transactional ID digitally signed using a user's
`private key that can be verified via the user’s public key, the
`serial numbers of computers or player devices owned by or
`registered to a user, a message received by a system con-
`taining verified biometrics data (llngerprint, faoe recogni-
`tion, eyefretina recognition, voice recognition etc.), or other
`legally recognizable means to identify an individual.
`
`the term "digitally signing"
`[0043] As used herein,
`includes the cryptographically standard process of using a
`private key to generate a message or message hashfdigest
`that when decrypted using a public key validates that the
`message was generated using an individual private key.
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:20)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 11
`
`

`
`US 2001/0051996 A1
`
`Dec. 13, 200]
`
`[0044] As used herein, the term “authentication” refers to
`making it possible for the receiver of a message or file to
`ascertain its origin, so that an intruder should not be able to
`masquerade as someone else.
`
`[0045] As used herein, the term “integrity“ refers to mak-
`ing it possible for the receiver of a message or file to verify
`that it has not been modified in transit, so that an intruder
`should not be able to substitute a false message for a
`legitimate one.
`
`[0046] As used herein, the term “non-repudiation” refers
`to minimizing the possibility of a sender being able to falsely
`deny later that he participated in communications activities.
`
`[0047] Additionally, this patent relates to new electronic
`signature laws passed in the US and Europe and soon to be
`passed in Japan. In late June of 2000, President Clinton
`signed the “l£.lectronic Signatures in Global and National
`Commerce Act”, or “E-Sign Bill”. This bill puts the force of
`national law behind electronic signature transactions.
`
`[0043] FIG. 1 illustrates a representative network configu-
`ration I00 in which this invention may be implemented.
`However, various other types of electronic devices commu-
`nicating in a networked environment may also be used. A
`user 102, which may be a consumer or any other recipient
`of content llles, communicates with a computing environ-
`ment, which may include multiple server computers 108 or
`a single server computer 110 in a clientiserver relationship
`on a network communication medium 116.
`In a typical
`clientfserver environment, each of the server computers 108,
`[I0 may include a server program that communicates with
`a client device 115, which may be a personal computer (PC),
`a hand—held electronic device, a mobile or cellular phone, a
`TV set or any number of other electronic devices.
`
`[0049] The server computers 108, 110, and the client
`device 115 may each have any conventional

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket