throbber
I lllll llllllll II llllll lllll lllll lllll lllll lllll lllll lllll 111111111111111111111111111111111
`US 20060200415Al
`
`c19) United States
`c12) Patent Application Publication
`Lu
`
`c10) Pub. No.: US 2006/0200415 Al
`Sep. 7, 2006
`(43) Pub. Date:
`
`(54) VIDEONLINE SECURITY NETWORK
`ARCHITECTURE AND METHODS
`THEREFOR
`
`(52) U.S. Cl. ................................................................ 705/50
`
`(76)
`
`Inventor: Priscilla M. Lu, San Carlos, CA (US)
`
`(57)
`
`ABSTRACT
`
`Correspondence Address:
`IPSG, P.C.
`P.O. BOX 700640
`SAN JOSE, CA 95170-0640 (US)
`
`(21) Appl. No.:
`
`111357,777
`
`(22) Filed:
`
`Feb. 16, 2006
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/654,030, filed on Feb.
`16, 2005.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`G06Q 99100
`
`(2006.01)
`
`A method for transmitting a multimedia content file
`encrypted with a multimedia content key to a rendering
`device, the rendering device further including a private
`license key, I is disclosed. The method includes configuring
`a license server with a set of rights associated with the
`multimedia content file and with a rendering device user.
`The method also includes requesting that a requested right
`for the multimedia content file be exercised on the rendering
`device. The method further includes, if the requested right is
`included in the set of rights, encrypting the content key with
`a public license key, wherein the private license key is
`configured to decrypt the content key. The method also
`includes transmitting the content key to the rendering
`device; transmitting the multimedia content file; decrypting
`the multimedia content file; and rendering the multimedia
`content file.
`
`102
`
`DIGITIZE CONTENT
`
`104
`
`COMPRESS/ENCODE
`
`106
`
`108
`
`110
`
`112
`
`WATERMARK
`
`ENCRYPT
`
`FRAGMENT
`
`DISTRIBUTE
`
`DISH, Exh. 1018, p. 1
`
`

`
`Patent Application Publication Sep. 7, 2006 Sheet 1 of 4
`
`US 2006/0200415 Al
`
`102
`
`DIGITIZE CONTENT
`
`104
`
`COMPRESS/ENCODE
`
`106
`
`108
`
`110
`
`112
`
`WATERMARK
`
`ENCRYPT
`
`FRAGMENT
`
`DISTRIBUTE
`
`FIG. 1
`
`DISH, Exh. 1018, p. 2
`
`

`
`CMS
`(202)
`
`LICENSE
`SERVER
`(203)
`
`SUBSCRIBER
`MANAGEMENT
`SERVER
`(204)
`
`BILLING
`SERVER
`(206)
`
`214a
`
`NAS
`(208a)
`
`NAS
`(208b)
`
`NAS
`(208c)
`
`MOBILE
`GATEWAY
`(210)
`
`CACHE SERVER
`(212)
`
`213
`
`214e
`
`220~jl' ) $
`il I"' ~
`
`FIG. 2
`
`(')
`
`~ ......
`
`""O
`~ ......
`('D = ......
`~ 'e -....
`.... 0 =
`""O = O" -....
`.... 0 =
`
`(')
`
`~ ......
`
`1J1
`('D
`'?
`~......:i
`N
`0
`0
`0-.,
`
`1J1 =(cid:173)
`
`('D
`('D
`......
`N
`0 ......
`.i;...
`
`c
`
`1J1
`N
`0
`0
`..._
`0-.,
`0
`N
`0
`0
`.i;...
`......
`Ul
`> ......
`
`DISH, Exh. 1018, p. 3
`
`

`
`PUBLIC PART (308)
`
`PRIVATE DEVICE PART (306)
`
`PRIVATE LICENSE PART (310)
`
`VIDEO PORTION 303
`
`AUDIO PORTION 304
`
`CONTENT HEADER(302)
`
`MULTI-MEDIA DIGITAL CONTENT (305)
`
`FIG. 3
`
`(')
`
`~ .....
`
`""O
`~ .....
`('D = .....
`~ 'e -....
`.... 0 =
`""O = O" -....
`.... 0 =
`
`(')
`
`~ .....
`
`1J1
`('D
`'?
`~-....J
`N
`0
`0
`0-.,
`
`1J1 =(cid:173)
`.....
`
`('D
`('D
`
`(.H
`
`0 .....
`
`.i;...
`
`c
`
`1J1
`N
`0
`0
`..._
`0-.,
`0
`N
`0
`0
`.i;...
`
`Ul
`
`....
`> ....
`
`DISH, Exh. 1018, p. 4
`
`

`
`Patent Application Publication Sep. 7, 2006 Sheet 4 of 4
`
`US 2006/0200415 Al
`
`402
`
`404
`
`406
`
`408
`
`410
`
`412
`
`CONFIGURE A LICENSE SERVER WITH A SET OF
`RIGHTS ASSOCIATED WITH THE
`MULTIMEDIA CONTENT FILE AND WITH A
`RENDERING DEVICE USER
`
`REQUEST A RIGHT TO RENDER THE
`MULTIMEDIA CONTENT ON THE RENDERING
`DEVICE
`
`IF THE RIGHT IS INCLUDED IN THE SET OF
`RIGHTS, ENCRYPT THE CONTENT KEY
`WITH A PUBLIC LICENSE KEY
`
`TRANSMIT THE CONTENT KEY TO THE
`RENDERING DEVICE
`
`TRANSMIT THE MULTIMEDIA CONTENT FILE
`
`DECRYPT AND RENDER THE MULTIMEDIA
`CONTENT FILE
`
`FIG.4
`
`DISH, Exh. 1018, p. 5
`
`

`
`US 2006/0200415 Al
`
`Sep. 7,2006
`
`VIDEONLINE SECURITY NETWORK
`ARCHITECTURE AND METHODS THEREFOR
`
`RELATED APPLICATIONS
`
`[0001] This application claims the benefit of U.S. Ser. No.
`60/654,030, filed Feb. 16, 2005, of U.S. Ser. No. 10/949,825,
`filed Sep. 24, 2004, and of U.S. Ser. No. 11/179,361, filed
`Jul. 11, 2005. All applications incorporated herein by refer(cid:173)
`ence and all priorities claimed.
`
`BACKGROUND OF THE INVENTION
`
`[0002] The present invention relates in general to personal
`communication systems. More particularly, the present
`invention relates to a videonline security network and meth(cid:173)
`ods therefor.
`[0003] The Internet has become an efficient mechanism
`for globally distributing digital content, such as movies.
`However, the advantage of easy digital communication has
`also allowed the digital content to be easily pirated by just
`about anyone with a computer and Internet access. The
`combination of high-speed broadband Internet access, digi(cid:173)
`tal content compression software (which reduces the size of
`digital content files), peer-to-peer file trading networks
`(which allows users to post content files), and lack of viable
`digital rights standards, has caused the content owners to
`lose control of their content. Consequently, content owners
`are experiencing a loss of potential revenue.
`
`[0004] What is needed are advanced techniques for con(cid:173)
`trolling the purchase and use of digital content, such that
`content owners are fairly compensated without discouraging
`buyers from purchasing the digital content.
`
`SUMMARY OF THE INVENTION
`
`[0005] The invention relates to an a method for transmit(cid:173)
`ting a multimedia content file encrypted with a multimedia
`content key to a rendering device, the rendering device
`further including a private license key. The method includes
`configuring a license server with a set of rights associated
`with the multimedia content file and with a rendering device
`user. The method also includes requesting that a requested
`right for the multimedia content file be exercised on the
`rendering device. The method further includes, if the
`requested right is included in the set of rights, encrypting the
`content key with a public license key, wherein the private
`license key is configured to decrypt the content key. The
`method also includes transmitting the content key to the
`rendering device; transmitting the multimedia content file;
`decrypting the multimedia content file; and rendering the
`multimedia content file.
`[0006] The invention relates to an a method of transmit(cid:173)
`ting a multimedia content file encrypted with a multimedia
`content key to a rendering device, the rendering device
`further including a private license key. The method includes
`configuring a license server with a set of rights associated
`with the multimedia content file and with a rendering device
`user. The method also includes requesting that a requested
`right for the multimedia content file be exercised on the
`rendering device. The method further includes, if the
`requested right is included in the set of rights, encrypting the
`content key with a public license key, wherein the private
`license key is configured to decrypt the content key. The
`
`method also includes, if the requested right is not included
`in the set of rights, billing the rendering device user for the
`requested right and encrypting the content key with the
`public license key. The method further includes adding a
`watermark to the multimedia content file; transmitting the
`content key to the rendering device; transmitting the multi(cid:173)
`media content file; decrypting the multimedia content file;
`rendering the multimedia content file.
`[0007] The invention relates to an apparatus for transmit(cid:173)
`ting a multimedia content file encrypted with a multimedia
`content key to a rendering device with a smart key, the
`rendering device further including a private license key. The
`apparatus includes means of configuring a license server
`with a set of rights associated with the multimedia content
`file and with a rendering device user. The apparatus also
`includes means of requesting that a requested right for the
`multimedia content file be exercised on the rendering
`device. The apparatus further includes, ifthe requested right
`is included in the set of rights, means of encrypting the
`content key with a public license key, wherein the private
`license key is configured to decrypt the content key. The
`apparatus also includes, if the requested right is not included
`in the set of rights, means of billing the rendering device user
`for the requested right and encrypting the content key with
`the public license key. The apparatus further includes means
`of adding a watermark to the multimedia content file; means
`of transmitting the content key to the rendering device;
`means of transmitting the multimedia content file; means of
`decrypting the multimedia content file; and means of ren(cid:173)
`dering the multimedia content file.
`[0008] These and other features of the present invention
`will be described in more detail below in the detailed
`description of the invention and in conjunction with the
`following figures.
`
`BRIEF DESCRIPTION OF THE DRAWING
`
`[0009] The present invention is illustrated by way of
`example, and not by way of limitation, in the figures of the
`accompanying drawings and in which like reference numer(cid:173)
`als refer to similar elements and in which:
`[0010] FIG. 1 shows a simplified diagram of a process for
`encrypting a multimedia file, according to an embodiment of
`the invention;
`
`[0011] FIG. 2 shows a simplified diagram of a secured
`multimedia digital content delivery architecture, according
`to an embodiment of the invention;
`[0012] FIG. 3 shows a simplified diagram of a multimedia
`digital content stream, according to an embodiment of the
`invention; and
`
`[0013] FIG. 4 shows a simplified diagram of a method for
`transmitting a multimedia content file encrypted with a
`multimedia content key to a rendering device, according to
`an embodiment of the invention.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`
`[0014] The present invention will now be described in
`detail with reference to a few preferred embodiments thereof
`as illustrated in the accompanying drawings. In the follow(cid:173)
`ing description, numerous specific details are set forth in
`
`DISH, Exh. 1018, p. 6
`
`

`
`US 2006/0200415 Al
`
`Sep. 7,2006
`
`2
`
`order to provide a thorough understanding of the present
`invention. It will be apparent, however, to one skilled in the
`art, that the present invention may be practiced without some
`or all of these specific details. In other instances, well known
`process steps and/or structures have not been described in
`detail in order to not unnecessarily obscure the present
`invention.
`
`[0015]
`It is believed by the inventor herein that a digital
`rights management (DRM) scheme may be implemented,
`such that a digital multimedia content may be substantially
`protected by first securely transmitting a content key (CKey)
`to a trusted digital content rendering device (rendering
`device), and then transmitting a digital multimedia content
`encrypted with the CKey to that rendering device. Conse(cid:173)
`quently, the digital multimedia content stream may then be
`securely played by an authorized user. In an embodiment the
`digital multimedia content is transmitted as stream. In an
`embodiment the digital multimedia content is transmitted as
`a file. In an embodiment, the digital multimedia content is
`rendered on a DRM player. In an embodiment, the rendering
`device includes a license manager. In an embodiment, the
`license manager is integrated with the DRM player as a
`single application. In an embodiment, the license manager is
`separate from the DRM player. In an embodiment, the
`license manager is implemented using a separate processor,
`such as with a smart key.
`
`[0016] As previously described, content owners may
`experience a loss of potential revenue because of the lack of
`viable digital rights standards. By some estimates, the loss is
`about $5 billion a year. However, protecting digital rights
`should not discourage user purchases of digital content. A
`strongly designed DRM system that is poorly implemented
`may protect content, but it may also discourage utilization
`and hence also cause the loss of revenue. The present
`invention advantageously combines a strong DRM system
`with an intuitive and easy user interface, such that utilization
`is encouraged. In an embodiment, Microsoft, DIVX, Real
`and other industry supported DRM are supported.
`
`[0017] Referring now to FIG. 1. a simplified diagram
`showing a process for encrypting a multimedia file is shown,
`according to an embodiment of the invention. Initially, at
`102 the multimedia content, typically including a video
`portion and an audio portion, is digitized normally in an
`uncompressed format, such as uncompressed AVI, uncom(cid:173)
`pressed MOY, etc.
`
`[0018] At 104, the digital multimedia content is encoded
`and further compressed into the transmission format MPEG
`(1, 2, 4, etc.), audio (MP3, AAC), JPEG, WMA, RM,
`compressed AVI, etc. To compress video, for example, a
`complex mathematical formula breaks the video into indi(cid:173)
`vidual frames. Each frame is broken into moving and static
`components. Compression software takes each moving
`object and guesses where it will be in the next frame. By
`refreshing only the moving components of a frame, and
`recycling the static, compression reduces the size and trans(cid:173)
`mission time of the video file. In general, three factors that
`make up the quality of the video portion: frame rate, color
`depth and resolution.
`
`a relatively low bandwidth device, a lower frame rate, such
`as 10 fps, may be chose. An alternative technique may be a
`slideshow, in which the frame rate may be limited to one
`frame every five seconds.
`
`[0020] Color depth is generally the number of bits of data
`the computer assigns to each pixel of the frame. When there
`are more bits of data assigned to color each pixel, there are
`more colors that can be emulated on the screen. In general,
`most video may encoded with 8-bit 256 color, 16-bit 64,000
`color, or 24-bit 16.8 million colors. However, since greater
`color depth may increase the size of the streaming file, 8-bit
`or 16-bit is preferred.
`
`[0021] Resolution is typically a measure of the number of
`pixels. The greater the number of pixels, the higher the
`resolution of the video. For example, if your video is
`640x480, you have 640 pixels across each of the 480 vertical
`lines of pixels. Streamed video ranges in resolution from
`postage-stamp size (49x49 pixels) to 640x480 and beyond,
`which is considered full-screen video.
`
`[0022] At 106, a watermark is added to the digital multi(cid:173)
`media content in order to determine it origin, such as a
`particular distribution channel or network (e.g., Comcast,
`Cingular, China Telecom, etc.). In an embodiment, the
`watermark is added to the audio portion of the digital
`multimedia content. In an embodiment, the watermark is
`added to the video portion of the digital multimedia content.
`
`[0023] At 108, in an advantageous manner, the multimedia
`digital content is then encrypted with a particular CKey, for
`example using a symmetric block-ciphering encryption,
`such that it cannot properly rendered without first decrypting
`the digital multimedia content with the CKey. In an embodi(cid:173)
`ment, an audio portion of the digitized content is not
`encrypted. In an embodiment, the multimedia digital content
`is at least partially encrypted.
`
`[0024]
`In general, substantially encrypting the multimedia
`digital content would provide the greatest protection against
`unauthorized decryption. However, decrypting a fully
`encrypted may also be substantially time consuming. Con(cid:173)
`sequently, the use of a partially encrypted file may be
`quickly decrypted, yet still may not be rendered on a
`rendering device. In an embodiment, the rendering device
`includes a DRM enabled multimedia player (DRM player).
`In an embodiment, the DRM player is provided via a
`ViDeOnline service website.
`
`[0025] For example, a common encryption technique
`involves the use of symmetric block-ciphering encryption,
`such AES (Rijndael), DES, Triple DES, Lucifer, Blowfish,
`CAST, IDEA, RCS, RC2, etc. In general, symmetric block(cid:173)
`ciphering encryption involves dividing a plaintext M (digital
`multimedia content) into blocks of fixed length M=M1 , M2
`... MN. Each message block Mi is encrypted to ciphertext
`block, which, in turn, is concatenated into the ciphertext
`message (encrypted digital multimedia content). The more
`times this is done, that is the more rounds, the more resistant
`to cryptanalysis is the ciphertext. However, in general, as the
`number of rounds increase, so does the decryption time at
`the rendering device.
`
`[0019] Frame rate is generally the number of still images
`that make up one second of a moving video image. At 30
`frames per second (fps), images seem to move fluidly and
`naturally. However, if the video is going to be rendered on
`
`[0026] With appropriate strong encryption, the inventor
`believes that the cost of attacking a strongly encrypted
`digital multimedia content would far exceed the economic
`value of that content. Consequently, even a partial encryp-
`
`DISH, Exh. 1018, p. 7
`
`

`
`US 2006/0200415 Al
`
`Sep. 7,2006
`
`3
`
`tion would generally provide sufficient protection of the
`digital multimedia content, while still allowing that content
`to be quickly decrypted and rendered at the rendering
`device. In an embodiment, a single round is used. In an
`embodiment, every other block is encrypted. In an embodi(cid:173)
`ment, a set of blocks are encrypted based on a predetermined
`algorithm that is also known or transmitted to the rendering
`device.
`
`[0027] Next, at 110, the encrypted digital multimedia
`content is fragmented at 110. In general, in order to further
`decrease the likelihood that the digital multimedia content is
`compromised, and to facilitate bandwidth and load balanc(cid:173)
`ing during playback, the digital multimedia content file is
`divided in a set of sub-parts using a predetermined algo(cid:173)
`rithm. Each of those sub-parts may then be distributed
`among a set of content management servers, at 112. Con(cid:173)
`sequently, in response to an authorized request to transmit
`the multimedia digital content, each of the sub-parts would
`be properly assembled and transmitted to the requestor's
`rendering device. A table may be employed to trace the
`sub-parts and their location for subsequently assembly.
`
`[0028] However, if one of the content management servers
`is compromised, only a portion of the sub-parts may be
`obtained. In general, the value of digital multimedia content
`(e.g., movie, etc.) is substantially related to its complete
`renderability. For example, few users would be interested in
`seeing only every third minute of a movie. In an embodi(cid:173)
`ment, the digital multimedia content is fragmented into a set
`of substantially symmetric sub-parts. That is, each of the
`sub-parts is of the same size. In an embodiment, the digital
`multimedia content is fragmented into a set of asymmetric
`sub-parts. In an embodiment, the sub-parts may be interwo(cid:173)
`ven into the original digital multimedia content file after an
`authorized request is received.
`
`[0029] Referring now to FIG. 2, a simplified diagram of a
`secured multimedia digital content delivery architecture,
`according to an embodiment of the invention. As previously
`described, each encrypted digital multimedia content file is
`generally fragmented into a set of sub-parts, which are
`subsequently stored in a distributed manner on a set of
`content management system servers 202 (CMS). In an
`embodiment, the set of CMS servers 202 are coupled
`together in a secured peer to peer network, such that each
`may request any required sub-parts from the secured peer to
`peer network in order to first assemble, and then securely
`transmit a multimedia digital content file. In addition, a
`license server 203 may also be coupled to CMS servers 202.
`License server 203 is commonly configured to verify user
`rights with respect to specific multimedia digital content,
`authorize new access, and revoke access.
`
`[0030] As previously described, rendering devices 214
`may be configured with a DRM player. In general, a ren(cid:173)
`dering device may be any device capable of running a DRM
`player, a license manager, a user interface for rendering the
`particular multimedia digital content (e.g., personal com(cid:173)
`puter, laptop, MS Windows Mobile device, Palm device,
`etc.), and direct or indirect network access to CMS servers
`202 and licensing server 203.
`
`[0031] Commonly, rendering devices 214a-c are coupled
`to some type of network access server (NAS) 208. NAS is
`typically a computer server that enables an independent
`service provider (ISP) (e.g., Comcast, China Telecom, Cin-
`
`gular, etc.) to provide connected customers with Internet
`access. NAS 208 generally has interfaces to both the local
`telecommunication service provider such as the phone com(cid:173)
`pany and to the Internet backbone. Typically, NAS 208
`authenticates users requesting login, performing the neces(cid:173)
`sary steps to authenticate and authorize each user, usually by
`verifying a user name and password, and then allows
`requests to begin to flow between the user host and hosts
`(computers) elsewhere on the Internet. NAS 208 may be
`further configured to provide a host of services such as VoIP,
`etc.
`
`In an embodiment, rendering devices 214a is fur(cid:173)
`[0032]
`ther configured with smart key 213, such as a USB smart
`key, or any other processor-driven smart-key-type device
`that may be implemented using any protocol for I/O. Smart
`key 213 is generally a security authorization storage device
`configured to move authorizations from one rendering
`device 214a to another 214c. In general, if a smart key is
`used, an additional session key (SKey) is transmitted with
`the CKey, as previously described, in order to for that
`particular rendering device 214c to decode and render the
`digital multimedia content file. Generally, the SKey is tied to
`a unique identifier on the smart key, such that a combination
`of the CKey, the SKey is required to decode and render the
`digital multimedia content file. For example, if a user moves
`a smart key from rendering device 214a to rendering device
`214c, rendering device 214a can no longer render the digital
`multimedia content file, whereas rendering device 214c may
`render the digital multimedia content file.
`
`[0033]
`In another configuration, a mobile rendering device
`214d (e.g., mobile phone, Windows ME wireless device,
`Palm wireless device, etc.) is first coupled to a mobile
`gateway 210, which is in tum coupled to NAS 208. Mobile
`gateway 210 is generally configured to enable mobile
`devices that are not directly compatible with the Internet, to
`access resources on the Internet. For example, mobile gate(cid:173)
`way 210 may serve as the interface between NAS 208 and
`a micro browser in the mobile rendering device 214d,
`performing translations between HTML, HDML and WML
`coming from the Web.
`
`In an alternate configuration, rendering devices 214
`[0034]
`may be directly coupled to a cache server 212 that locally
`stores the multimedia digital content, for example for use in
`a kiosk. In general, cache server 212 securely stores the
`requested multimedia digital content locally, and also sends
`the multimedia digital content to rendering device 214e. The
`next time cache server 212 gets a request for the same
`multimedia digital content, it simply returns the locally
`cached data instead of retrieving the content from a CMS
`server 202, thus reducing Internet traffic and response time
`
`[0035]
`In addition, a rendering device with a DRM player,
`such as rendering device 214b, may also function as a trust
`proxy for other devices 220 that do not directly (indirectly)
`access the network, yet are still capable of rendering the
`particular multimedia digital content. In this instance,
`secured rendering device 214b would manage the authenti(cid:173)
`cation and authorization process for device 220, request that
`the multimedia digital content be securely transferred to
`secured rendering device 214b, and then transfer the mul(cid:173)
`timedia digital content to device 220.
`
`[0036]
`In a common configuration, a user desires to render
`(e.g., view, listen, etc.) a particular multimedia digital con-
`
`DISH, Exh. 1018, p. 8
`
`

`
`US 2006/0200415 Al
`
`Sep. 7,2006
`
`4
`
`tent file. The user would log on to a secured rendering device
`214a, and then be authenticated by the license manager. The
`license manager would, in turn, access a CMS server 202 in
`order to determine the user's then current rights. For
`example, the user may have the right to render on a
`particular rendering device 214 (e.g, DRM player, a Win(cid:173)
`dows ME device, a Palm OS device, and a personal com(cid:173)
`puter, etc.), the right to render before a particular end date,
`the right to render for a specified number of times, the right
`to render on a specified number of rendering devices 214a-e,
`the right to render in a specified resolution, the right to
`render if obtained through a specified distribution channel,
`etc. In an embodiment, an owner of the multimedia digital
`content may dynamically change the ability of a multimedia
`digital content file to be rendered on a particular rendering
`device, from a particular origin, or by a specific user.
`
`[0037]
`If sufficient rights exist, then the user is authorized
`to render the multimedia digital content in rendering device
`214a. If the content is locally stored, the user may imme(cid:173)
`diately begin rendering (e.g., viewing a movie, listening to
`a song, etc.). If the content is not locally stored, the DRM
`player requests that license server 203 authorizes CMS
`server 202 to transmit the content to rendering device 214a.
`
`[0038]
`If sufficient rights do not exist, but may be
`obtained, then the user is given an option to obtain those
`rights. For example, if a multimedia digital content file has
`already been licensed for a set number of rendering devices
`(e.g., home PC, work laptop, Windows ME device, etc.), the
`user may be given the option of disabling a previously
`authorized rendering device, in order to enable current
`rendering device 214a. Likewise the user may be given the
`option of purchasing another license to render the multime(cid:173)
`dia digital content file.
`
`[0039] For example, a user may want to purchase the right
`to play a movie on rendering device 214a. The license
`manager installed on rendering device 214a would contact
`license server 203, through NAS 208a, requesting authori(cid:173)
`zation. License server 203 would, in turn, contact the
`appropriate ISP's subscriber management server 204 in
`order to request that the user be billed for the movie.
`Subscriber management server 204 then would contact
`billing server 206 to initiate a charge that may appear on the
`user's bill. If the charge is successful, subscriber manage(cid:173)
`ment server 204 informs license server 203, which in tum,
`authorizes a CMS server 202 to begin to transmit the movie
`to rendering device 214a.
`
`[0040] Referring now to FIG. 3, a simplified diagram of a
`multimedia digital content stream is shown, according to an
`embodiment of the invention. As previously described, a
`multimedia digital content 305 is encrypted with a particular
`CKey, using a symmetric block-ciphering encryption, as
`well as being watermarked in order to determine origin.
`Prior to being transmitted to rendering device 214, addi(cid:173)
`tional security indicia may be added to the watermark, for
`example, a rendering device ID, a user ID, transmission
`timestamp, etc.
`
`[0041] Consequently, ifthe multimedia digital content file
`is compromised, stripped of DRM protection, and made
`publicly available on the Internet, the source of the com(cid:173)
`promised file may still be determined from the watermark.
`In an embodiment, the watermark may be added to an audio
`portion 304 of multimedia digital content file 305. In an
`
`embodiment, the watermark is periodically repeated in the
`audio portion 304 multimedia digital content file. In an
`embodiment, the watermark may be added to a video 303
`portion of multimedia digital content file 305. In an embodi(cid:173)
`ment, the watermark is periodically repeated in video por(cid:173)
`tion 303 of multimedia digital content file 305.
`
`In addition, a content header 302 is also generated
`[0042]
`and added to multimedia digital content file 305 including a
`public part 308, a private device part 306 and a private
`license part 310. Public part 308 generally includes unen(cid:173)
`crypted identification information that may be access by
`anyone, such as content ID, content description, copyright
`information, service URL, user readable DRM information,
`etc. In general, this information may be displayed in the
`DRM player. For example, if a user attempts to render
`multimedia digital content file 104 without authorization,
`the user would still be able to view public part 308 of content
`header 302.
`
`[0043] Private device part 306 generally includes an
`encrypted CKey, as well as an optional SKey if a smart key
`is used. In general, the CKey is encrypted with a set of public
`key infrastructure (PKI) keys and unique IDs that are issued
`or stored by the license server [not shown], such as media
`content ID, the device ID, the user's personal identification
`code (PIC), a transaction ID, etc.
`
`[0044] Media content ID is a unique identifier assigned to
`the particular multimedia digital content file. Device ID is a
`unique identifier assigned to the particular rendering device
`that is registered with the license server. PIC is a unique
`identifier identifying a user for billing and DRM purposes.
`Transaction ID is a unique identifier assigned to the specific
`purchase transaction associated with the particular multime(cid:173)
`dia digital content file.
`
`[0045] Private license part 310 generally includes specific
`rights and limitation for the specific multimedia digital
`content file 305, and is considered a complete license.
`Private license part 310 may include information related to
`the DRM attributes for the multimedia digital content file,
`and is generally used by the license manager to validate
`access to the multimedia digital content file, such as trans(cid:173)
`action type (e.g., purchase, rental, etc.), transaction specifics
`associated with that transaction type (e.g., end date, number
`of plays, etc.), a unique transaction key (TKey) associated
`with the transaction type, etc. In general, the TKey is
`uniquely generated for each issued multimedia digital con(cid:173)
`tent file license. Typically, private license part 310 is
`encrypted using the public key of the license manager. For
`example, if the user has purchased a multimedia digital
`content file 305, the number of plays may be unlimited.
`However, if a user rents multimedia digital content file 305,
`the number of plays may be limited, or the time in which to
`view the multimedia digital content file 305 is limited.
`
`[0046]
`In general, PKI key cryptography, as used in this
`invention, is based on the use of key pairs. When using a key
`pair, only one of the keys, referred to as the private key, must
`be kept secret and (usually) under the control of the owner.
`The other key, referred to as the public key, can be dissemi(cid:173)
`nated freely for use by any person who wishes to participate
`in security services with the person holding the private key.
`This is possible because the keys in the pair are mathemati(cid:173)
`cally related but it remains computationally infeasible to
`derive the private key from knowledge of the public key. In
`
`DISH, Exh. 1018, p. 9
`
`

`
`US 2006/0200415 Al
`
`Sep. 7,2006
`
`5
`
`an embodiment, the license server stores both a private and
`public key pair for each issued or used PKI key.
`[0047] After multimedia digital content file 305 has been
`authorized for transmission to a rendering device [not
`shown], the content header 302 is generated. In an embodi(cid:173)
`ment, private license part 310 is delivered when the down(cid:173)
`load occurs. In an embodiment, private license part 310 is
`delivered at a later time when a user wishes to access the
`multimedia digital content file.
`[0048] For example, when the user requests a DRM
`license for a multimedia digital content file, a content ID of
`the requested content file may be retrieved. Next, a unique
`T-Key may be created. A symmetric key may then be created
`by combining the content ID, device ID, PIC, and T-

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket