`(12; Patent Application Publication (10) Pub. No.: US 2001/0051996 A1
`Cooper et al.
`(43) Pub. Date:
`Dec. 13, 2001
`
`US 20Ul005l99t3Al
`
`(54) NETw0RK'BA5ED CONTENT
`DISTRIBUTION SYSTENI
`
`provisional of provisional application No. 601183,
`638, fiIC(I on Feb. 18, 2000.
`
`(76)
`
`Inventors: Robin Ross Cooper, La Mesa, (IA
`(US); Robert T. Kulakowski, Rancho
`Santa Fe, CA (US)
`
`Correspondence Address:
`KNOBBE MARTENS OLSON & BEAR LLP
`620 NEWPORT CENTER DRIVE
`SIXTEENTH FLOOR
`NEWPORT BEACH’ CA 92660 (US)
`
`(21) Appl_ No;
`
`09Ir739’293
`
`(22)
`
`piled:
`
`|:‘e])_ 20, 20.01
`
`Related U,S, Application Data
`
`application No.
`(63) Non-provisional of provisional
`60;"250,445, filed on Nov. 30, 2000. Non-provisional
`of provisional application No. 60;"223,l28, filed on
`Aug. 7, 2000. Non—provisional of provisional appli—
`cation No. 60f209,506, filed on Jun. 5, 2000. Non—
`
`Publication Classification
`
`Int. CL?
`(51)
`(52) U.S. Cl.
`
`G061: l5fl6; G061: 17.560
`709,317; 709K229; 705.526
`
`(57)
`
`ABSTRACT
`
`A method and system for transferring electronic media
`inior-matiori over a public network in. such a way as to
`provide safeguards tor inappropriate distribution of copy-
`right or otherwise protected materials are described. The
`media information is transparently watermarked with a
`unique II), such as one generated from X509 Digital
`Certificate and public-key cryptography pul')lic;"private key
`pairs, such that the information can be identified as belong-
`ing to a particular individual. A system and method for
`monitoring the movement of such watermarked files, posi-
`tively identifying people who have inappropriately distrib-
`uted copyright materials over a public network without
`permission, and taking appropriate enforcement action
`against such people.
`
`zoo
`
`I
`
`__
`
`
`CERTIFICATION
`AUTHORITY
`
`25"
`
`_
`
`, 210
`
`2.10
`
`TRANSACTION
`MODULE
`
`ARCHIVE
`SERVER
`
`250
`
`—
`2 /
`-I
`3
`3'
`11
`ITI
`o
`
`I
`I
`I
`I
`i
`:
`|
`I
`I
`I
`I
`
`
`
`
`I
`
`J
`I
`--....._.....-I
`TRANSACTION
`I
`DATABASE
`|
`| - 218
`~...._:__..«
`‘----———-u’
`MASTER
`I
`I
`I
`I
`I
`
`DATABASE
`
`214
`
`/ 744
`
`ARCHIVE
`
`DATABASE
`
`
`ALAM
`MODULE
`
`GDRAS
`
`/
`
`COPYRIGHT
`REGISTRY
`
`220
`230
`
`234
`
`260
`‘fig:-:?;T
`COMPANY
`
`CUSTOMER
`SITE
`
`27°
`
`USER
`DEVICE
`
`"5
`
`118
`
`115
`
`USER
`DEVICE
`
`USER
`r)FvIcF
`
`/ 115
`
`I
`I
`I
`I
`I
`I
`|
`I
`I
`
`I
`I
`I
`I
`I
`|
`I
`|
`I
`I
`I
`I
`I
`II
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 1
`
`
`
`Patent Application Publication
`
`l)ec. 13, 2001 Sheet 1 of 7
`
`US 2001/0051996 Al
`
`moi
`
`
`
`
`
`>\zockmpomzooxmoamz
`
`>.§..m.._<w
`
`$0
`
`..i.an
`
`
`u..n.zocom2200
`Ixmoéuz
`
`—u-anon.--up-..s—_..-:-
`
`~_...aL
`
`.1....xxx...___&.Q.%
`._...
`
`zo_.m_>m_.._up.:o.:z9..,M
`
`age;X...,flfluH,_%WF\.flUIHRHW_.|...h.\.
`\|M.\\mIma»H.....u\.\
`»..w5.m_.:.mNK...x
`Wxom.on.fin_.._\.rd.HnE._d.sa__X8Bmé
`..\.,...\Fl.m_2n___..&§.
`
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:21)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 2
`
`
`
`
`P
`
`3
`
`P
`
`3
`
`0
`
`Sm
`
`5
`
`1.A
`
`.m_M9.._
`
`.._u_ENEu
`
`2E1,m_o_>m_oC1mum:AoFmm>mmw
`m:Tn_m
`
`
`m_._:oos_m._Hm>_:ox<zo_5.%z$:
`
`M_ea\zo_Eo:_Em_ow_AmumSmi|J||i|iIiIi||Iii|llWE“mméowwzo:_imBu
`nwo_>m_n__.mm:«mm:_>»_~_oz5<
`
`234
`
`7m§>m_oMn:mum:_wm<m_E<n2_zo:.o¢mz«Em_m_m<m¢E.B
`
`.m.m_>__._om<
`_E542_m_.__._oos__can
`
`
`W_>m»m_wmm
`
`P.:._o_m:a_ooWN.0_u__«mmm_\m¢w_n_wmw<m_¢.En_Ucan
`
`6Ii||||i||l9_w_
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:22)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 3
`
`
`
`
`Patent Application Publication Dec. 13, 2001 Sheet 3 of 7
`
`US 2001/0051996 A1
`
`INITIALIZATION
`
`AUTHENTICATE USER
`AND GET
`DIGITAL CERTIFICATE
`
`SEARCH FOR AND
`SELECT CONTENT
`
`PAYMENT
`
`WATE RMARK
`
`310
`
`320
`
`330
`
`340
`
`350
`
`TRANS FER
`
`350
`
`(DOWNLOAD)
`CONTENT TO user;
`
`FIG. 3
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:23)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 4
`
`
`
`Patent Application Publication Dec. 13, 2001 Sheet 4 of 7
`
`US 2001/0051996 A1
`
`
`
`
`
`nooz_Ebmm»EOEom_>_mm_n:3:mxh20$am_>_mmn_:w<_._Q3.
`
`one
`
`D<O._><n_
`
`_._w<:
`
`
`
`
`
`:%~¢m_:o_._<zoflo<mz<E___E_m_m_zE<n.ommLzo_mmm_>
`
`omwemu
`
`are
`
`
`
`
`
`_._m<_._ommm_.:m3n_mmm:o<m_¢Iooz_w:mmm:o<m<:o“.0wz_mFwwmm5§<_._onooz_Em2:.
`
`
`
`
`
`
`
`
`
`
`
`ozmm=._._.n_O>mxm_._.<>_mn_m_._._.0253ommm=._._...._OEv.m_E>_mn_MI...
`
`
`
`
`
`
`
`
`
`
`
`._<:a_>_n_z_oz_z_<.:,_oo
`
`w.0_n_
`
`
`
`mmm:~m_z.E<awn_._m:
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:24)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 5
`
`
`
`
`
`Patent Application Publication Dec. 13, 2001 Sheet 5 of 7
`
`US 2001/0051996 Al
`
`SEARCH FOR
`PUBLIC FILES
`
`FIND
`
`WATERMARK
`
`FIND DIGITAL
`CERTIFICATE
`SERIAL NUMBER
`
`AUTHENTICATE
`SERIAL NUMBER
`
`530
`
`540
`
` 510
`
`520
`
`
`550
`
`
`
`
`DECRYPT STRING
`IN WATERMARK
`
`DETERMINE
`ORIGINATOR
`VIA WATE RMARK
`
`
`
`
`
`
`
`560
`
`570
`
`580
`
`
`
`TAKE APPROPRIATE
`ACTION
`
`
`NOTIFY RECIPIENTS
`OF PIRATED
`CONTENT
`
`
`
`
`
`
`
`
`FIG. 5
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:25)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 6
`
`
`
`Patent Application Publication Dec. 13, 2001 Sheet 6 of 7
`
`US 2001/0051996 A1
`
`200
`
`CONTENT DISTRIBUTION SYSTEM
`
`FIG. 6
`
`MRSTER
`DATABASE
`SERVER
`
`SERVER
`
`TRANSACTION
`SERVER
`
`TRANSACTION
`SERVER
`
`TRANSACTION
`
`116
`
`CLIENT / "5
`WORKSTATION
`
`115
`
`CLIENT
`WORKSTATION
`
`CLIENT PDA
`DEVICE
`
`530
`
`273
`
`TRANSACTION
`
`DATABASE
`
`640
`
`\
`
`540
`
`549
`
`VVLB5
`
`UNIX
`SERVER
`
`B26
`NT
`SERVER
`
`32C
`LINUX
`SERVER
`
`
`
`550
`
`/ 550
`
`CUSTOMER SITE
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:26)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 7
`
`
`
`Patent Application Publication Dec. 13, 2001 Sheet 7 of 7
`
`US 2001/0051995 A1
`
`CONTENT DISTRIBUTION SYSTEM
`
`200
`
`MASTER
`DATABASE
`
`714-
`
`WKBS
`
`SERVER
`720
`
`
`
`TRANSACHON
`SERVER
`
`TRANSACWON
`SERVER
`
`
`MEBS
`
`?3O
`
`TRANSACWON
`
`SERVER
`
`72”
`
`73fl
`
`116
`
`BZC
`NT
`SERVER
`
`UNIXILINUX
`115
`CUSTOMER SITE
`
`CLIENT
`WORKSTATION
`
`CLIENT
`WORKSTATION
`WINDOWS
`
`115
`
`115
`
`270
`
`FIG. 7
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:27)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 8
`
`
`
`US 2001/0051996 A1
`
`Dec. 13, 200]
`
`NETWORK-BASED CONTENT DISTRIBUTION
`SYSTEM
`
`Rlil./\'l'l.lD APPl.ICA'I'I()NS
`
`[0001] This application claims priority to U.S. Provisional
`Application No. 60."25U,445,
`filed Nov. 30, 2000, U.S.
`Provisional Application No. 60f223,l28, filed Aug. 7, 2000,
`U.S. Provisional Application No. 60f209,506, filed Jun. 5,
`2000, US. Provisional Application No. 60f183,638, filed
`Feb. 18, 2000, and U.S. application Ser. No.
`(VM/\'l'RIX.'[l02/\) filed Feb. 1], 2001 titled "WEII II/\Sl_".I)
`HUMAN SERVICES CONFERENCING NETWORK,” all
`of which are hereby incorporated by reference.
`
`[0002] BACKGROUND OF THE INVENTION
`1. Field of the Invention
`
`[0003]
`
`[0004] The present invention relates to the field of elec-
`tronic media file content distribution. Additionally,
`the
`invention relates to embedding unique electronic signature
`information, refened to as watemtarks. and inserting these
`watermarks into an electronic media file to facilitate the
`
`authentication of the person responsible for the file.
`
`[0005]
`
`2. Description of the Related Art
`
`[0006] The use of the Internet and the ‘World Wide Web as
`tools for content delivery and e-commerce has increased
`dramatically in recent years. As a consequence, the delivery
`of electronic media content materials such as music, videos,
`software, books, multi—mcdia presentations,
`images, and
`Other electronic media over a network to one or more
`consumers has likewise increased dramatically. Users may
`download such electronic media files legitimately from a
`content provider, for example a record label such as Sony
`Records or Capitol Records, or inappropriately from one of
`the content download services without the permission of the
`copyright owner. Using a network such as the Internet, users
`may, and quite frequently do, transfer digital media files they
`have downloaded, whether legitimately or otherwise,
`to
`others.
`
`In this way, consumers of electronic media infor-
`[0007]
`mation may simply and freely distribute such media infor-
`mation over a public network such as the Internet without
`the permission of the copyright owner (or other property
`rights owners). Such consumers who inappropriately dis-
`tribute copyright material over public networks cannot cu r-
`rently be positively identified, if they can even be tracked
`down at all. Therefore, these consumers can quite often
`successfully deny culpability.
`
`[0003] A prevalent concern within the media publishing
`andfor distribution business is that the supply vs. demand
`equation that drives the economics of valuable goods and
`services no longer applies to digital media. Since a digital
`media file such as a music or movie file can be duplicated
`essentially an unlimited number of times and distributed at
`virtually no cost, the economics for providing such digital
`materials to the public is not viable. In order to return the
`supply versus demand equation back to the digital media
`dornain, individual digital media files must be configured in
`such a way as to give them properties similar to physical
`objects. With such physical properties, these files can be
`handled and monitored in ways that are similar to physical
`objects, thus allowing the return of the necessary economic
`incentives and viability.
`
`[0009] To date, there have been various approaches to
`solving the problems associated with the management, con-
`trol and distribution of digital media files. Most of these
`approaches focus on protecting digital media files. in such a
`way as to limit the functionality of such files when outside
`of the domain that has been pre—approved by the authorized
`distributor of such media. An example is found in the
`distribution of encrypted digital information along with an
`encryption key that will only decrypt the information under
`a limited number of circumstances.
`
`[0010] Although encryption Schemes have provided solu-
`tions lo other problems involving digital media content, it is
`not the preeminent answer to the problem of identifying and
`monitoring content files. For example, encryption schemes
`provide an unsatisfactory solution for digital media for the
`following reasons:
`
`1) Encryption schemes are often targets for
`[0011]
`many hackers, and it is typically only a matter Of
`time before decryption algorithms will be discovered
`and published on a wide scale.
`
`2) The market is overwhelmed with a number
`[0012]
`of encryption schemes. Therefore, no single standard
`is likely to be adopted and enforced.
`
`3) Encryption adds a great deal of expense to
`[0013]
`the distribution of digital media. In some cases, this
`extra expense may make the dilference between
`profitable and unprofitable distribution.
`
`4) Encryption adds a layer of complexity for
`[0014]
`the consumer that will most likely result in lower
`consumer satisfaction.
`
`for
`sharing facilities,
`5) Popular media
`[0015]
`example Napster, have educated tens of millions of
`consumers about the ease with which media files can
`be transferred. It may in fact be too late to success-
`fully change the acecpted model for electronic media
`distribution.
`
`[0016] Consumers might possibly have embraced encryp-
`tion of digital media files had it been introduced on a large
`scale before the Napster file-sharing model. Consumers
`generally will learn to accept models that add a level of
`complexity if these models are irt fact
`the only models
`available. However, the complexities that content distribu-
`tors would like to introduce into the market with encryption
`will arrive after the superior model has been introduced.
`This will
`likely result
`in media content
`file protection
`schemes such as encryption and copy protection disappear-
`ing over time.
`
`SUMMARY OF TIIIE INV/I.-'.NTI()N
`
`[0017] The solution to the numerous problems confronting
`the rights owners of digital media is, therefore, not simply an
`issue of adding encryption. It is more accurately an issue of
`uniquely marking and identifying digital media files with
`authenticated information from a trusted authority and mak-
`ing business decisions that will maximize the potential
`return—on—investment for such files. Therefore, there is a
`need in the electronic media content distribution field to be
`
`files with an authenticated digital
`able to mark content
`signature that uniquely identifies the person who is the
`source, to be able to monitor the files if they are transfened
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:28)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 9
`
`
`
`US 2001/0051996 A1
`
`Dec. 13, 200]
`
`to others, and to have these capabilities while imposing
`minimal burden and inconvenience on the consumer.
`
`[0018] One aspect of this system relates to a system for
`network—based content distribution. The system includes an
`interface module configured to interface with a network. A
`transaction module is coupled to the interface module and
`configured to initialize a transaction with the user, authen-
`ticate the identity of a user, obtain a digital certificate related
`to said user, search for content desired by said user, imple-
`ment a payment transaction with the user, generate a water-
`mark related to said user and transfer content to said user,
`and insert said watermark into said content. A transaction
`database is configured to store information related to trans-
`actions carried out by the transaction module. An archive
`database is configured to store content selected by users. A
`certification authority is configured to authenticate users and
`issue digital certificates.
`
`[0019] Another aspect ofthe invention relates to a method
`for distributing content over a network. The method includes
`initiating a transaction with the user. The digital certificate of
`the user is then authenticated. The user is allowed to search
`for and select content to be downloaded. A watermark is
`generated by the system which relates to the content to be
`downloaded, the source of the content and the identity of the
`user. The watermark is inserted into the content prior to its
`downloading to the user.
`
`[0020] Another aspect of the invention relates to a method
`for verifying, searching for and identifying content acces-
`sible over a network. The method includes identifying files
`which are accessible over the network. For each such
`identified file, the file is searched to determine whether it
`includes a watermark which is related to the source of the
`content and the identification of the authorized user of the
`content. The method then involves determining whether the
`present location of the content with the watermark is an
`authorized location.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0021] The above and other aspects, features and advan-
`tages of the invention will be better understood by referring
`to the following detailed description, which should be read
`in conjunction with the accompanying drawings. These
`drawings and the associated description are provided to
`illustrate various embodiments of the invention, and not to
`limit the scope of the invention.
`
`[0022] FIG. 1 illustrates a typical network configuration
`in which this invention may operate.
`
`[0023] FIG. 2 is a block diagram of an example of a
`system overview architecture.
`
`[0024] FIG. 3 is a flowchart of a process of conducting a
`media content transaction.
`
`[0025] FIG. 4 is a diagram of a typical watermark.
`
`[0026] FIG. 5 is a flowchart of a process of embedding a
`watermark in media content data.
`
`[0027] FIG. 6 is a block diagram of a content distribution
`system and cttstomer site.
`
`[0028] FIG. 7 is a block diagram of a content distribution
`system and customer site.
`
`on'rA11_uo |)l'_-'§S(IRIPl‘I()N
`
`[0029]
`
`Definitions
`
`[0030] The following discussion provides a number of
`useful definitions of ten11s used in describing embodiments
`of the disclosed invention.
`
`[0031] As used herein, the terms “network” and “Internet”
`refer to a network or combination of networks spanning any
`geographical area, such as a local area network, wide area
`network, regional network, national network, andfor global
`network. Those terms may refer
`to hardwire networks,
`wireless networks, or a combination of hardwire and wire-
`less networks. [Iardwire networks may include, for example,
`fiber optic lines, cable lines, ISDN lines, copper lines, etc.
`Wireless networks may include, for example, cellular sys-
`tems, personal communication services (PCS) systems, sat-
`ellite communication systems, packet radio systems, and
`mobile broadband systems. A cellular system may use, for
`example, code division multiple access {CDMA), time divi-
`sion multiple access (TDMA), personal digital phone
`(PDC), Global System Mobile (GSM), or frequency division
`multiple access (FDMA), among others.
`
`[0032] As used herein, a VPN is a secure and encrypted
`communications link between nodes on the Internet, a Wide
`Area Network (WAN), or an Intranet. These nodes can
`communicate with each other, however, it is virtually impos-
`sible for a hacker to either comprehend the meaning of the
`signals or send signals that are believed to be authentic. One
`secure communications technology that is designed to facili-
`tate a VPN is Secure Sockets Layer (or SSL). Other secure
`communications technologies can be used as well. It is not
`a requirement that a VPN be a private network such as SITA,
`the international network for airline reservations.
`
`[0033] As used herein, a VPN provider refers to software,
`hardware, or both that secure an audio.t'video conferencing
`session in such a way as to minimize the possibility that it
`can altered or inappropriately viewed or transmitted. A VPN
`can operate between a number of intemet—enabled devices,
`for example, a VPN can run on two PCs that are connected
`together using well known security technologies. In another
`embodiment, a VPN can operate between a PC and a Web
`Site using security technologies. In yet another embodiment,
`a VPN can additionally operate between many PCs andfor
`many Web Sites. IIand—held devices, mobile phones, and
`web-enabled TV sets can be used as client devices instead of
`
`PCs as pan of the VPN as well.
`
`[0034] As used herein, the term “website” refers to one or
`more interrelated web page tiles and other files and pro-
`grams on one or more web servers, the files and programs
`being accessible over a computer network, such as the
`Internet, by sending a hypertext transfer protocol (II'I'l‘P)
`request specifying a uniform resource locator (URL) that
`identifies the location of one of Said web page files, wherein
`the files and programs are owned, managed or authorized by
`a single business entity. Such files and programs can include,
`for example, hypertext markup language (Il'l'MI.} files,
`common gateway interface {(.‘GI) files, and Java applica-
`tions. The web page files preferably include a home page file
`that corresponds to a home page of the website. The home
`page can serve as a gateway or access point to the remaining
`files and programs contained within the website.
`In one
`embodiment, all of the tiles and programs are located under,
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:19)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 10
`
`
`
`US 2001/0051996 A1
`
`Dec. 13, 200]
`
`and accessible within, the same network domain as the home
`page file. Alternatively, the files and programs can be located
`and accessible through several dilfcrent network domains.
`
`[0035] As used herein, a “web page" comprises that which
`is presented by a standard web browser in response to an http
`request specifying the URI. by which the web page file is
`identified. A web page can include,
`for example,
`text,
`images, sound, video, and animation.
`
`[0036] As used herein, “content file”, “media content file”
`and “content data” refer to the delivery of electronic media
`content materials such as music, videos, software, books,
`multi-media presentations,
`images, and other electronic
`data, for example over a network to one or more consumers.
`Content data will typically be in the fonTI of computer files
`for video, audio, program, data and other multimedia type
`content as well as actual physical copies of valuable content,
`for example (II)-RUM, DVD, VCR, Audio, TV or radio
`broadcasted, streaming audio and video over networks, or
`other forms of embodying such information. The terms
`“content file”, “media content file" and “content data" are
`used interchangeably herein.
`
`[0037] As used herein, “consumer” and "user” refer to a
`person that seeks to transfer or download media content
`llles, for example from a content provider or distributor. The
`terms “consumer” and "user" are used interchangeably
`herein.
`
`[0038] As used herein, a computer, may be any micropro-
`cessor or processor controlled device that permits access to
`the Internet, including terminal devices, such as personal
`computers, workstations, servers, clienLs, mini computers,
`main-frame computers.
`laptop computers, a network of
`individual computers, mobile computers, palm-top comput-
`ers, hand—held computers, set top boxes for a television,
`other types of web—enabled televisions, interactive kiosks,
`personal digital assistants, interactive or web-enabled wire-
`less communications devices, mobile web browsers, or a
`combination thereof. The computers may further possess
`one or more input devices such as a keyboard, mouse, touch
`pad, joystick, pen—input—pad, and the like. The computers
`may also possess an output device, such as a screen or other
`visual conveyance means and a speaker or other type of
`audio conveyance means.
`
`’I'hese computers may be uni processor or multi
`[0039]
`processor machines. Additionally, these computers include
`an addressable storage medium or computer accessible
`medium, such as random access memory (RAM), an elec-
`tronically
`erasable
`programmable
`read-only memory
`(I.-]:'.I’R()M), programmable read-only memory (PROM),
`erasable programmable read-only memory (EPROM), hard
`disks, floppy disks, laser disk players, digital video devices,
`compact disks, video tapes, audio tapes, magnetic recording
`tracks, electronic networks, and other techniques to transmit
`or store electronic content such as, by way of example,
`programs and data. In one embodiment, the computers are
`equipped with a network communication device such a
`network interface card, a modem, or other network connec-
`tion device suitable for connecting to the communication
`network. Furthermore, the computers execute an appropriate
`operating system such as Linux, Unix, Microsoft® Win-
`dows® 95, Microsoft® Windows® 98, Microsoft® Win-
`dow.s® NT, /\pple® Mac()S®, or IBM® OS,=’2®. As is
`conventional, the appropriate operating system includes a
`
`communications protocol implementation which handles all
`incoming and outgoing message traffic passed over the
`Internet. In other embodiments, while the operating system
`may differ depending on the type ol‘ computer, the operating
`system will continue to provide the appropriate communi-
`cations protocols necessary to establish communication
`Links with the Internet.
`
`[0040] The computers may advantageously contain pro-
`gram logic, or other substrate configuration representing
`data and instructions, which cause the computer to operate
`in a specific and predefined manner as described herein. In
`one embodiment, the program logic may advantageously be
`implemented as one or more object frameworks or modules.
`These modules may advantageously be configured to reside
`on the addressable storage medium and configured to
`execute on one or more processors. The modules include,
`but are not limited to, software or hardware components that
`perform certain tasks. Thus, a module may include, by way
`of example, components, such as, software components,
`object-oriented software components, class components and
`task oomponenLs, processes, functions, attributes, proce-
`dures, subroutines, segments of program code, drivers, firm-
`ware, microcode, circuitry, data, databases, data structures,
`tables, arrays, and variables.
`
`[0041] The various components of the system may advan-
`tageously communicate with each other and other compo-
`nents oomprising the respective computers through mecha-
`nisms
`such
`as,
`by way of
`example,
`interprocess
`communication, remote procedure call, distributed object
`interfaces, and other various program interfaces. Further-
`more,
`the functionality provided for in the components,
`modules, and databases may be combined into fewer corn-
`ponents, modules, or databases or further separated into
`additional components, modules, or databases. Additionally,
`the components, modules, and databases may advanta-
`geously be implemented to execute on one or more com-
`puters. In another embodiment, some of the componenLs,
`modules, and databases may be implemented to execute on
`one or more computers external to the web site. In this
`instance, the web site includes program logic, which enables
`the web site to communicate with the externally imple-
`mented components, modules, and databases to perform the
`functions as disclosed herein.
`
`[0042] As used herein, the term "consumer ID" refers to a
`positive digital identification of the user, computer, or player
`device owned by a person who downloads content, has
`access to content download systems, or can access the
`systems described in this patent. A positive digital identifi-
`cation may be any one or a plurality of the following: an
`individual’s digital certificate, a digital certificate or digital
`certificate serial number digitally signed using the user’s
`private key, a transactional ID digitally signed using a user's
`private key that can be verified via the user’s public key, the
`serial numbers of computers or player devices owned by or
`registered to a user, a message received by a system con-
`taining verified biometrics data (llngerprint, faoe recogni-
`tion, eyefretina recognition, voice recognition etc.), or other
`legally recognizable means to identify an individual.
`
`the term "digitally signing"
`[0043] As used herein,
`includes the cryptographically standard process of using a
`private key to generate a message or message hashfdigest
`that when decrypted using a public key validates that the
`message was generated using an individual private key.
`
`(cid:51)(cid:68)(cid:87)(cid:72)(cid:81)(cid:87)(cid:3)(cid:50)(cid:90)(cid:81)(cid:72)(cid:85)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:72)(cid:81)(cid:87)(cid:42)(cid:88)(cid:68)(cid:85)(cid:71)(cid:3)(cid:43)(cid:82)(cid:79)(cid:71)(cid:76)(cid:81)(cid:74)(cid:86)(cid:15)(cid:3)(cid:44)(cid:81)(cid:70)(cid:17)(cid:3)(cid:16)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:21)(cid:19)(cid:20)(cid:19)(cid:15)(cid:3)(cid:83)(cid:17)(cid:3)(cid:20)(cid:20)
`Patent Owner ContentGuard Holdings, Inc. - Exhibit 2010, p. 11
`
`
`
`US 2001/0051996 A1
`
`Dec. 13, 200]
`
`[0044] As used herein, the term “authentication” refers to
`making it possible for the receiver of a message or file to
`ascertain its origin, so that an intruder should not be able to
`masquerade as someone else.
`
`[0045] As used herein, the term “integrity“ refers to mak-
`ing it possible for the receiver of a message or file to verify
`that it has not been modified in transit, so that an intruder
`should not be able to substitute a false message for a
`legitimate one.
`
`[0046] As used herein, the term “non-repudiation” refers
`to minimizing the possibility of a sender being able to falsely
`deny later that he participated in communications activities.
`
`[0047] Additionally, this patent relates to new electronic
`signature laws passed in the US and Europe and soon to be
`passed in Japan. In late June of 2000, President Clinton
`signed the “l£.lectronic Signatures in Global and National
`Commerce Act”, or “E-Sign Bill”. This bill puts the force of
`national law behind electronic signature transactions.
`
`[0043] FIG. 1 illustrates a representative network configu-
`ration I00 in which this invention may be implemented.
`However, various other types of electronic devices commu-
`nicating in a networked environment may also be used. A
`user 102, which may be a consumer or any other recipient
`of content llles, communicates with a computing environ-
`ment, which may include multiple server computers 108 or
`a single server computer 110 in a clientiserver relationship
`on a network communication medium 116.
`In a typical
`clientfserver environment, each of the server computers 108,
`[I0 may include a server program that communicates with
`a client device 115, which may be a personal computer (PC),
`a hand—held electronic device, a mobile or cellular phone, a
`TV set or any number of other electronic devices.
`
`[0049] The server computers 108, 110, and the client
`device 115 may each have any conventional