throbber
United States Patent [19J
`Rhoads
`
`I lllll llllllll Ill lllll lllll lllll lllll lllll 111111111111111111111111111111111
`US005841978A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,841,978
`Nov. 24, 1998
`
`[54]
`
`NETWORK LINKING METHOD USING
`STEGANOGRAPHICALLY EMBEDDED DATA
`OBJECTS
`
`[75]
`
`Inventor: Geoffrey B. Rhoads, West Linn, Oreg.
`
`[73]
`
`Assignee: Digimarc Corporation, Portland, Oreg.
`
`[21]
`
`Appl. No.: 508,083
`
`[22]
`
`Filed:
`
`Jul. 27, 1995
`
`Related U.S. Application Data
`
`[63]
`
`[51]
`[52]
`
`[58]
`
`Continuation-in-part of Ser. No. 436,098, May 8, 1995, Pat.
`No. 5,636,292, and a continuation-in-part of Ser. No. 436,
`099, May 8, 1995, Pat. No. 5,710,834, Ser. No. 436,134,
`May 8, 1995, Ser. No. 438,159, May 8, 1995, Ser. No.
`215,289, Mar. 17, 1994, abandoned, and Ser. No. 327,426,
`Oct. 21, 1994, which is a continuation-in-part of Ser. No.
`154,866, Nov. 18, 1993, abandoned and a continuation-in(cid:173)
`part of PCT/US94/13366 Nov. 16, 1994 ..
`Int. Cl.6
`............................... G06F 13/00; H04L 9/00
`U.S. Cl. ................................ 395/200.47; 395/187.01;
`395/335; 380/4; 380/28
`Field of Search ............................ 395/200.3, 200.48,
`395/200.38, 200.47, 200.75, 200.66, 187.01,
`682, 602, 610, 329, 335, 339, 200.49; 380/3,
`4,5, 6,54,28
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,569,619
`3,665,162
`3,703,628
`3,805,238
`3,838,444
`3,914,877
`3,922,074
`3,984,624
`4,225,967
`
`3/1971 Simjian .................................... 178/6.8
`5/1972 Yamamoto et al.
`.................... 235/380
`11/1972 Philipson, Jr ...................... 235/61.9 R
`4/1974 Rothfjell ................................. 382/118
`9/1974 Loughlin et al. .
`10/1975 Hines ........................................ 380/54
`11/1975 Ikegami et al. ............................. 380/3
`10/1976 Waggener ............................... 348/473
`9/1980 Miwa et al.
`.............................. 455/68
`
`(List continued on next page.)
`
`FOREIGN PATENT DOCUMENTS
`
`372 601
`411 232
`441 702
`493 091
`581 317
`629 972
`650 146 Al
`705 025 A2
`3806411
`4-248771
`5-242217
`2063018
`2067871
`2196167
`2204984
`W089/08915
`W095/10835
`W095/14289
`W095/20291
`
`6/1990
`2/1991
`8/1991
`7/1992
`2/1994
`12/1994
`4/1995
`4/1996
`9/1989
`9/1992
`9/1993
`5/1981
`7 /1981
`4/1988
`11/1988
`9/1989
`4/1995
`5/1995
`7/1995
`
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`Germany.
`Japan.
`Japan.
`United Kingdom .
`United Kingdom .
`United Kingdom .
`United Kingdom .
`WIPO.
`WIPO.
`WIPO.
`WIPO.
`
`OTHER PUBLICATIONS
`
`Choudhury, et al., "Copyright Protection for Electronic
`Publishing over Computer Networks," IEEE Network
`Magazine, Jun. 1994, 18 pages.
`Moller, et al., "Rechnergestutzte Steganographie: Wie sie
`Funktioniert und warum folglich jede Reglementierung von
`Verschlusselung unsinnig ist," DuD, Datenschutz und Dat(cid:173)
`ensicherung, 18/6 (1994) 318-326.
`
`(List continued on next page.)
`
`Primary Examiner-Parshotam S. Lall
`Assistant Examiner-Viet Vu
`Attorney, Agent, or Firm---Marger, Johnson, McCollom &
`Stolowitz, P.C.
`
`[57]
`
`ABSTRACT
`
`A given data object can effectively contain both a graphical
`representation to a network user and embedded information,
`such as the URL address of another network node, thereby
`to permit the object itself to serve as an automated hot link.
`The underlying development tools and web site browsers
`create and identify such an object for use in a manner similar
`to a hot link, as provided on the World Wide Web.
`
`058 482
`
`8/1982 European Pat. Off ..
`
`13 Claims, 18 Drawing Sheets
`
`1006
`
`1002
`
`WEB SITE
`DEVELOPMENT TOOL
`WWW SITE
`
`1004
`
`1006
`
`:.:.-:-::.:.·>:
`
`i(Q)••··
`
`0
`
`.----~--~1010
`BROWSER
`WWW SITE
`
`APPLE 1004 - Page 1
`
`

`
`5,841,978
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`4,230,990 10/1980 Lert, Jr. et al. ............................. 455/4
`4,231,113 10/1980 Blasbalg .................................... 380/34
`4,238,849 12/1980 Gassmann ............................... 370/204
`4,252,995
`2/1981 Schmidt et al.
`..................... 179/1 GD
`1/1982 Maxemchuk ............................ 370/210
`4,313,197
`4,379,947
`4/1983 Warner .................................... 370/204
`4,395,600
`7/1983 Lundy et al.
`.......................... 381/73.1
`4,423,415 12/1983 Goldman ............................ 340/825.34
`........................... 370/477
`4,425,642
`1/1984 Moses et al.
`4,476,468 10/1984 Goldman .......................... 340/825.034
`4,528,588
`7/1985 Liifberg ................................... 358/122
`4,532,508
`7/1985 Ruell .................................. 340/825.34
`4,547,804 10/1985 Greenberg ............................... 348/460
`4,553,261 11/1985 Froessl ...................................... 382/57
`4,590,366
`5/1986 Rothfjell ................................. 235/494
`4,595,950
`6/1986 Liifberg ................................... 358/122
`4,637,051
`1/1987 Clark ........................................... 382/1
`4,654,867
`3/1987 Labedz et al. ............................ 379/59
`4/1987 Dlugos ...................................... 380/23
`4,660,221
`4,663,518
`5/1987 Borror et al. ........................... 235/487
`5/1987 Cooper .................................... 348/480
`4,665,431
`4,672,605
`6/1987 Hustig et al. ........................... 370/201
`4,675,746
`6/1987 Tetrick et al.
`.......................... 358/296
`6/1987 Causse D' Agraives et al.
`. 340/825.31
`4,677,435
`4,682,794
`7/1987 Margolin ................................... 283/82
`4,703,476 10/1987 Howard ................................... 370/491
`4,712,103 12/1987 Gotanda ............................. 340/825.31
`4,718,106
`1/1988 Weinblatt .................................... 455/2
`4,739,377
`4/1988 Allen ....................................... 355/133
`6/1988 Bliithgen ................................. 370/528
`4,750,173
`4,765,656
`8/1988 Becker et al.
`............................ 283/70
`4,775,901 10/1988 Nakano ..................................... 360/60
`4,776,013 10/1988 Kafri et al.
`............................... 380/54
`2/1989 Greenberg ............................... 348/460
`4,805,020
`2/1989 Broughton et al. ..................... 348/460
`4,807,031
`4,811,357
`3/1989 Betts et al. .............................. 375/700
`4,811,408
`3/1989 Goldman ..................................... 382/2
`4,820,912
`4/1989 Samyn .................................... 235/449
`5/1989 van der Gracht et al. ........ 340/310.07
`4,835,517
`4,864,618
`9/1989 Wright et al. ............................. 380/51
`4,866,771
`9/1989 Bain .......................................... 380/23
`4,876,617 10/1989 Best et al. ................................. 360/60
`4,879,747 11/1989 Leighton et al.
`......................... 380/23
`4,884,139 11/1989 Pommier ................................... 348/21
`4,903,301
`2/1990 Kondo et al. .......................... 395/7.92
`3/1990 Rushforth et al. ...................... 375/207
`4,908,836
`4,908,873
`3/1990 Philibert et al. ........................ 382/100
`4,921,278
`5/1990 Shiang et al. ............................. 283/87
`7/1990 Adelson .................................... 341/51
`4,939,515
`7/1990 Iwasaki ................................... 375/200
`4,941,150
`4,943,973
`7/1990 Werner .................................... 375/200
`4,943,976
`7/1990 Ishigaki ................................... 375/200
`7/1990 Hyatt ......................................... 367/43
`4,944,036
`4,963,998 10/1990 Maufe ....................................... 360/60
`4,965,827 10/1990 McDonald ................................ 380/25
`4,967,273 10/1990 Greenberg ............................... 348/460
`4,969,041 11/1990 O'Grady et al. ........................ 348/473
`................................ 380/3
`4,972,471 11/1990 Gross et al.
`4,972,476 11/1990 Nathans .................................... 380/23
`.............................. 380/3
`4,979,210 12/1990 Nagata et al.
`4,993,068
`2/1991 Piosenka et al.
`......................... 380/23
`4,996,530
`2/1991 Hilton ..................................... 341/120
`5,010,405
`4/1991 Schreiber et al.
`...................... 348/432
`5,027,401
`6/1991 Soltesz ...................................... 380/54
`7/1991 Greenblatt ............................... 370/259
`5,036,513
`5,063,446 11/1991 Gibson .................................... 348/484
`5,073,899 12/1991 Collier et al. ........................... 370/202
`5,079,648
`1/1992 Maufe ....................................... 360/31
`5,086,469
`2/1992 Gupta et al. .............................. 380/48
`5,095,196
`3/1992 Miyata .................................... 235/382
`
`5,148,498
`5,150,409
`5,161,210
`5,166,676
`5,181,786
`5,185,736
`5,199,081
`5,200,822
`5,212,551
`5,213,337
`5,228,056
`5,243,423
`5,245,329
`5,253,078
`5,258,998
`5,259,025
`5,267,334
`5,280,537
`5,293,399
`5,295,203
`5,299,019
`5,305,400
`5,315,098
`5,319,453
`5,319,724
`5,319,735
`5,325,167
`5,351,302
`5,379,345
`5,394,274
`5,404,377
`5,408,542
`5,422,963
`5,422,995
`5,428,607
`5,432,870
`5,446,273
`5,450,490
`5,469,506
`5,473,631
`5,479,168
`5,499,294
`5,515,081
`5,530,852
`5,613,004
`
`9/1992 Resnikoff .................................. 382/54
`9/1992 Elsner ....................................... 380/23
`11/1992 Druyvesteyn et al.
`..................... 395/2
`11/1992 Milheiser ........................... 340/825.54
`1/1993 Hujink ...................................... 400/61
`2/1993 Tyrrell et al. ........................... 370/358
`3/1993 Saito et al. . ... ... .... ... ... ... ... ... .... ... . 382/2
`4/1993 Bronfin et al. .......................... 348/460
`5/1993 Conanan ................................. 348/484
`5/1993 Sherman ................................... 463/40
`7/1993 Schilling ................................. 375/200
`9/1993 DeJean et al. .......................... 348/473
`9/1993 Gokcebay .......................... 340/825.31
`10/1993 Balkanski et al. ...................... 358/426
`11/1993 Koide ...................................... 375/220
`11/1993 Monroe ..................................... 380/23
`11/1993 Normille et al.
`......................... 382/56
`1/1994 Sugiyama et al. ...................... 375/200
`3/1994 Hefti ......................................... 375/75
`3/1994 Krause et al.
`............................ 382/56
`3/1994 Pack et al. ........................... 358/261.3
`4/1994 Butera ....................................... 382/56
`5/1994 Tow ........................................ 235/494
`6/1994 Copriviza .................................... 348/6
`6/1994 Blonstein et al.
`........................ 382/56
`6/1994 Preuss et al.
`. ... ... .... ... ... ... ... ... 395 /2.14
`6/1994 Melen ....................................... 356/71
`......................... 380/30
`9/1994 Leighton et al.
`1/1995 Greenberg ... ... ... ... ... .... ... ... ... ... .. 380/23
`2/1995 Kahn ......................................... 360/27
`4/1995 Moses ..................................... 370/200
`4/1995 Callahan ................................... 382/56
`6/1995 Chen et al.
`............................. 382/232
`6/1995 Aoki et al. .............................. 395/515
`............................ 370/352
`6/1995 Hiller et al.
`7/1995 Schwartz ................................. 382/232
`8/1995 Leslie ...................................... 235/487
`9/1995 Jensen et al. ............................... 380/6
`11/1995 Berson et al.
`... ... .... ... ... ... ... .... .. 380/23
`12/1995 Moses ..................................... 375/202
`12/1995 Johnson et al. ......................... 341/110
`3/1996 Friedman .................................. 380/10
`5/1996 Vasilik .................................... 345/189
`6/1996 Meske, Jr. et al. ................ 395/200.36
`3/1997 Cooperman et al. ..................... 380/28
`
`OTHER PUBLICATIONS
`
`Pennebaker et al., JPEG Still Image Data Compression
`Standard, Chapter 3, "Aspects of the Human Visual Sys(cid:173)
`tem," pp. 23-27, 1993, Van Nostrand Reinhold, New York.
`Castro et al., "Registration of Translated and Rotated Images
`Using Finite Fourier Transforms," IEEE Transactions on
`Pattern Analysis and Machine Intelligence, vol. PAMI-9,
`No. 5, Sep. 1987,pp. 700--703.
`Weber et al., "Correlative Image Registration," Seminars in
`Nuclear Medicine, vol XXIV, No. 4, Oct., 1994, pp.
`311-323.
`Toga et al., "Registration Revisited," Journal of Neuro(cid:173)
`science Methods, 48 (1993), pp. 1-13.
`Sheng et al., "Experiments on Pattern Recognition Using
`Invariant Fourier-Mellin Descriptors," Journal of Optical
`Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776.
`Kurak et al., "A Cautionary Note On Image Downgrading,"
`1992 IEEE, pp. 153-159.
`Wagner, "Fingerprinting," 1983 IEEE, pp. 18-22.
`Hecht, "Embedded Data Glyph Technology for Hardcopy
`Digital Documents," SPIE vol. 2171, Feb. 1994, pp.
`341-352.
`
`APPLE 1004 - Page 2
`
`

`
`5,841,978
`Page 3
`
`Roberts, "Picture Coding Using Pseudorandom Noise," IRE
`Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp.
`145-154.
`Pitas et al., "Applying Signatures on Digital Images," IEEE
`Workshop on Nonlinear Image and Signal Processing, Neas
`Marmaras, Greece, pp. 460-463, Jun., 1995.
`Rindfrey, "Towards an Equitable System for Access Control
`and Copyright Protection in Broadcast Image Services: The
`Equicrypt Approach," Intellectual Property Rights and New
`Technologies, Proc. of the Conference, R. Oldenbourg Ver(cid:173)
`lag Wien Miinchen 1995, 12 pages.
`Komatsu et al., "A Proposal on Digital Watermark in Docu(cid:173)
`ment Image Communication and Its Application to Realiz(cid:173)
`ing a Signature," Electronics and Communications inJ apan,
`Part 1, vol. 73, No. 5, 1990, pp. 22-33.
`Schneier, "Digital Signatures, Cryptographic Algorithms
`Can Create Nonforgeable Signatures for Electronic Docu(cid:173)
`ments, Making Them Valid Legal Instruments" BYTE, Nov.
`1993, pp. 309-312.
`Komatsu et al., "Authentication System Using Concealed
`Image in Telematics," Memoirs of the School. of Science &
`Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.
`Machado, "Announcing Stego 1.0a2, The First Steganogra(cid:173)
`phy Tool for the Macintosh," Internet reference, Nov. 28,
`1993, 3 pages.
`Arachelian, "White Noise Storm," Apr. 11, 1994, Internet
`reference, 13 pages.
`Brown, "S-Tools for Windows, Version 1.00, ©1994 Andy
`Brown, What is Steganography," Internet reference, Mar. 6,
`1994, 6 pages.
`shaggy@phantom.com, "Hide and Seek v. 4.0," Internet
`reference, Apr. 10, 1994, 3 pages.
`Wise, "The History of Copyright, Photographers' Rights
`Span Three Centuries," PHOTO>Electronic Imaging, vol.
`37, No. 6, 1994.
`Kassam, Signal Detection in Non-Gaussian Noise, Dowden
`& Culver, 1988, pp. 1-96.
`Brassil et al., "Electronic Marking and Identification Tech(cid:173)
`niques to Discourage Document Copying, Proceedings of
`INFOCOM '94 Conference on Computer, IEEE Commun.
`Soc Conference, Jun. 12-16, 1994, 1278-1287.
`Jain, "Image Coding Via a Nearest Neighbors Image
`Model," IEEE Transactions on Communications, vol.
`COM-23, No. 3, Mar. 1975, pp. 318-331.
`Arthur, "Digital Fingerprints Protect Artwork," New Scien(cid:173)
`tist, Nov. 12, 1994, p. 24.
`Matthews, "When Seeing is Not Believing," New Scientist,
`Oct. 16, 1993, pp. 13-15.
`Bender et al., "Techniques for Data Hiding," Massachusetts
`Institute of Technology, Media Laboratory, Jan. 1995, 10
`pages.
`Walton, "Image Authentication for a Slippery New Age," Dr.
`Dobb's Journal, Apr. 1995, pp. 18-26, 82-87.
`Port, "Halting Highway Robbery on the Internet," Business
`Week, Oct. 17, 1994, p. 212.
`"Foiling Card Forgers With Magnetic 'Noise,"' Wall Street
`Journal, Feb. 8, 1994.
`Fitzgerald, "Invisible Digital Copyright ID," Editor & Pub(cid:173)
`lisher, Jun. 25, 1994, p. 62.
`van Schyndel et al., "A Digital Watermark," IEEE Interna(cid:173)
`tional Conference on Image Processing, Nov. 13-16, 1994,
`pp. 86-90.
`Matsui et al., "Video-Steganography: How to Secretly
`Embed a Signature in a Picture," IMA Intellectual Property
`Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205.
`
`Tanaka et al., "Embedding Secret Information Into a Dith(cid:173)
`ered Multi-Level Image," Proc. IEEE Military Comm.
`Conf, Sep. 1990, pp. 216-220.
`Tanaka et al., "New Integrated Coding Schemes for Com(cid:173)
`puter-Aided Facsimile," Proc. IEEE Int'l Conf on Sys.
`Integration, Apr. 1990, pp. 275-281.
`Schreiber et al., "A Compatible High-Definition Television
`the Noise-Margin Method of Hiding
`System Using
`Enhancement Information," SMPTE Journal, Dec. 1989, pp.
`873-879.
`Short, "Steps Toward Unmasking Secure Communications,"
`International Journal of Bifurcation and Chaos, vol. 4, No.
`4, 1994,pp. 959-977.
`Tanaka, "Embedding the Attribute Information Into a Dith(cid:173)
`ered Image," Systems and Computers in Japan, vol. 21, No.
`7, 1990,pp. 43-50.
`Nakamura et al., "A Unified Coding Method of Dithered
`Image and Text Data Using Micropatterns," Electronics and
`Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp.
`50-56.
`Simmons, "Subliminal Channels; Past and Present," ETT,
`vol. 5, No. 4, Jul.-Aug. 1994, pp. 45-59.
`Nakamura et al., "A Unified Coding Method of Image and
`Text Data Using Discrete Orthogonal Transform," Systems
`and Computers in Japan, vol. 21, No. 3, 1990, pp. 87-92.
`Tanaka et al., "A Visual Retrieval System with Private
`Information for Image Database," Proceeding International
`Conference on DSP Applications and Technology, Oct.
`1991, pp. 415-421.
`Sapwater et al.,
`"Electronic Copyright Protection,"
`PHOTO>Electronic Imaging, vol. 37, No. 6, 1994, pp.
`16-21.
`JPEG Group's JPEG Software (release 4), FTP.CSU(cid:173)
`A.BEREKELEY.EDU /PUB/CYPHERPUNKS/APPLICA(cid:173)
`TIONS/JSTEG/JPEG.ANNOUNCEMENT.GZ,
`Jun.
`7,
`1993, 2 pages.
`Caronni, "Assuring Ownership Rights for Digital Images,"
`Published in the Proceedings of 'Reliable It Systems,' vis
`'95, HH. Briiggemann and W. Gerhardt-Hackl (Ed.),
`Vieweg Publishing Company, Germany, 1995, Jun. 14,
`1994, 10 pages.
`Tirkel et al, "Electronic Water Mark," DICTA-93, Macqua(cid:173)
`rie University, Sydney, Australia, Dec., 1993, pp. 666-673.
`Koch et al., "Copyright Protection for Multimedia Data,"
`Fraunhofer Institute for Computer Graphics, Dec. 16, 1994,
`15 pages.
`"Access Control and Copyright Protection for Images,
`WorkPackage 8: Watermarking," Jun. 30, 1995, 46 pages.
`"Access Control and Copyright Protection for Images,
`WorkPackage 3: Evaluation of Existing Systems," Apr. 19,
`1995, 68 pages.
`Boneh, "Collusion-Secure Fingerprinting for Digital Data,"
`Department of Computer Science, Princeton University,
`1995, 31 pages.
`Friedman, "The Trustworthy Digital Camera: Restoring
`Credibility to the Photographic Image," IEEE Transactions
`on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp.
`905-910.
`"Cyphertech Systems: Introduces Digital Encoding Device
`to Prevent TV Piracy," Hollywood Reporter, Oct. 20, 1993,
`p. 23.
`"NAB-Cyphertech Starts Anti-Piracy Broadcast Tests,"
`Newsbytes, NEW03230023, Mar. 23, 1994.
`Humphrey, "Stamping Out Crime," Hollywood Reporter,
`Jan. 26, 1994, p. S48.
`
`APPLE 1004 - Page 3
`
`

`
`5,841,978
`Page 4
`
`Koch et al., "Towards Robust and Hidden Image Copyright
`Labeling," Proc. of 1995 IEEE Workshop on Nonlinear
`Signal and Image Processing, Jun. 20-22, 1995, 4 pages.
`"Copyright Protection for Digital Images, Digital Finger(cid:173)
`printing from FBI," Highwater FBI brochure, 1995, 4 pages.
`"High Water FBI Limited Presentation Image Copyright
`Protection Software," FBI Ltd brochure, Jul., 1995, 17
`pages.
`Boland et al, "Watermarking Digital Images for Copyright
`Protection," Fifth International Conference on Image Pro(cid:173)
`cessing and its Applications, Conference Date 4-6 Jul. 1995,
`Conf. Publ. No. 410, pp. 326-330.
`Clarke, "Invisible Code Tags Electronic Images," Electronic
`Engineering Times, Jun. 12, 1995, n. 852, p. 42.
`"The Copyright Can of Worms Opened Up By The New
`Electronic Media,"
`Computergram
`Internations,
`pCGN07170006, Jul. 17, 1995 and The Copyright Can of
`Worms Opened Up By the New Electronic Media-2,
`Computergraminternations, pCGN07210008, Jul. 21, 1995,
`3 pages total.
`
`"Access Control and COpyright Protection for Images,
`WorkPackage 1: Access Control and Copyright Protection
`for Images Need Evaluation," Jun., 1995, 21 pages.
`
`"Access Control and COpyright Protection for Images,
`Conditional Access and Copyright Protection Based on the
`Use of Trusted Third Parties," 1995, 43 pages.
`
`Luc, "Analysis of Spread Spectrum System Parameters for
`Design of Hidden Transmission," Radioengineering, vol. 4,
`No. 2, Jun. 1995, pp. 26-29.
`
`Macq, "Cryptology for Digital TV Broadcasting," Proceed(cid:173)
`ings of the IEEE, vol. 83, No. 6, Jun. 1995, pp. 944--957.
`
`Sandford II, et al., "The Data Embedding Method," SPIE
`vol. 2615, Oct. 23, 1995, pp. 226-259.
`
`Dautzenberg, "Watermarking Images," Department of
`Microelectronics and Electrical Engineering, Trinity Col(cid:173)
`lege Dublin, 47 pages, Oct. 1994.
`
`APPLE 1004 - Page 4
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 1of18
`
`5,841,978
`
`FIG. 1
`
`12
`DIGITAL
`NUMBER 8
`(SIGNAL
`LEVEL) 4
`
`0
`
`'4-BITS'
`
`-
`-
`T
`1
`1
`I
`I
`I
`I
`T
`:
`0 1 2 3 4 5 6 7 8 9 10 11 12 1314
`SAMPLE NUMBER (INDEX)
`
`-
`
`FIG. 4
`
`"\_102
`
`COMPUTER
`
`106
`
`I
`
`~104
`~ 100
`
`7777777~7777777(,7
`
`----1~~ EXPOSE AND STEP
`
`APPLE 1004 - Page 5
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 2 of 18
`
`5,841,978
`
`FIG. 2
`
`I OBTAIN OR CREATE ORIGINAL I
`DIGITAL SIGNAL OR IMAGE
`+
`I ESTIMATE ROUGH OFFSET
`I
`AND RMS NOISE
`+
`I
`I
`CHOOSE N OR N-BIT
`IDENTIFICATION WORD E.G. 32
`I
`I
`
`•
`
`GENERATE N-BIT
`IDENTIFICATION WORD
`+
`GENERATE OR SYNTHESIZE N "RANDOM" INDEPENDENT
`SIGNALS WITH ROUGHLY GAUSSIAN DISTRIBUTION
`ABOUT SOME MEAN VALUE, WHERE SIGNALS HAVE
`EQUAL EXTENT AND DIGITAL SPACING OF
`ORIGINAL DIGITAL SIGNAL OR IMAGE
`
`•
`APPLY DIGITAL FILTER WHICH ATTENUATES
`BOTH LOW AND HIGH FREQUENCIES, LEAVING
`MIDDLE-RANGE FREQUENCIES LARGELY INTACT
`+
`CONDENSE N RANDOM SIGNALS TO A LOWEST
`ACCEPTABLE BIT VALUE IF MEMORY OR
`STORAGE SPACE IS AT A PREMIUM
`•
`
`ADD ALL RANDOM IMAGES TOGETHER WHICH HAVE
`A CORRESPONDING '1' IN THEIR ASSOCIATED
`BIT-PLACE-VALUE OF THEN-BIT IDENTIFICATION WORD,
`CALL THIS THE BASE COMPOSITE SIGNAL OR IMAGE
`+
`EXPERIMENT VISUALLY WITH GAIN AND GAMMA APPLIED
`TO BASE COMPOSITE SIGNAL OR IMAGE, ADDING THIS TO
`ORIGINAL DIGITAL SIGNAL OR IMAGE, AND DETERMINING
`THE ACCEPTABLE PERCEIVED NOISE LEVEL
`+
`APPLY FOUND GAIN AND GAMMA TO BASE COMPOSITE,
`ADD TO ORIGINAL, THEN CALL THIS
`THE DISTRIBUTABLE SIGNAL OR IMAGE
`+
`STORE AWAY AND SECURE ORIGINAL SIGNAL OR IMAGE,
`ALONG WITH N-BIT IDENTIFICATION WORD AND
`THEN RANDOM SIGNALS
`+
`I SELL OR DISTRIBUTE THE DISTRIBUTABLE SIGNAL OR IMAGE I
`
`APPLE 1004 - Page 6
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 3 of 18
`
`5,841,978
`
`FIG. 3
`
`I OBTAIN DIGITAL OR NON-DIGITAL COPY'
`OF SUSPECT SIGNAL OR IMAGE
`'
`I DIGITIZE IF NOT ALREADY DIGITAL I
`'
`'
`
`CUT AND MASK PORTION OF SIGNAL OR IMAGE
`BELIEVED TO BE SUSPECT
`(ONLY IF ENTIRE SIGNAL OR IMAGE IS NOT SUSPECT)
`
`PROCURE ORIGINAL DIGITAL SIGNAL OR
`IMAGE AND CUT AND MASK TO ROUGHLY
`THE SAME LOCATION OR SEQUENCE
`i
`VISUALLY RESCALE AND REGISTER THE CUT-OUT
`SUSPECT SIGNAL TO THE CUT-OUT ORIGINAL SIGNAL
`
`'
`
`RUN THROUGH SEARCH PROGRAM WITH MEAN
`SQUARED ERROR AS CRITERIA AND X OFFSET, Y OFFSET,
`AND SCALE AS THE THREE VARIABLES
`+
`APPLY X OFFSET, Y OFFSET, AND SCALE TO CUT-OUT SUSPECT,
`THEN RESAMPLE ONTO EXACT GRID AND CUT-OUT
`OF ORIGINAL SIGNAL
`+
`RUN THROUGH SEARCH PROGRAM WITH MEAN
`SQUARED ERROR AS CRITERIA AND DC OFFSET, GAIN, AND
`GAMMA AS THE THREE VARIABLES; APPLY TO SUSPECT
`'
`I SUBTRACT ORIGINAL FROM SUSPECT,
`GIVING DIFFERENCE SIGNAL OR IMAGE
`+
`STEP THROUGH ALL N RANDOM INDEPENDENT SIGNALS, MASKED
`AS ORIGINAL AND CROSS-CORRELATED WITH DIFFERENCE SIGNAL
`IN IMMEDIATE NEIGHBORHOOD OF REGISTRATION POINTS
`+
`FIND 0 AND 1 LEVEL BY AVERAGING FIRST FOUR 0101 CODE VALUES I
`i
`ASSIGN EITHER A 0 OR A 1 TO EACH CROSS-CORRELATION RESULT
`DEPENDING ON PROXIMITY TO THE AVERAGES OF PREVIOUS STEP
`
`I CHECK RESULT AGAINST SECURED IDENTIFICATION NUMBER I
`i
`PROSECUTE IF IT MATCHES? OR AT LEAST SEND
`A NASTY LETTER DEMANDING RECOMPENSE
`
`'
`
`APPLE 1004 - Page 7
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 4 of 18
`
`5,841,978
`
`FIG. 5
`
`CODEWORD
`)
`(e,g. 01101001
`
`INPUT
`SIGNAL
`
`FIG. 6
`
`~
`
`~
`
`REAL-TIME
`ENCODER
`
`~ -
`
`I DENTIFICATION(cid:173)
`CODED OUTPUT
`SIGNAL
`
`-.
`
`KEY DATA
`(OPTIONAL)
`
`FIRST
`SCALER
`
`204
`
`LOOKUP
`TABLE
`
`220
`
`214
`
`I MEM~Rvl
`
`ADDER
`IN PUT r---:----e--~ SUBTRACTER i - - - - - - -4 - - - -< OUTPUT
`I
`I
`I 234
`232
`2181
`212
`______ J
`L _____ _ _
`
`230-=:i - :
`+
`01011000
`~216
`
`APPLE 1004 - Page 8
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 5 of 18
`
`5,841,978
`
`NOISE
`SOURCE
`
`NOISE
`STORE
`
`206
`
`CODE1
`
`CODE 2-N
`
`242
`
`202
`
`REAL
`TIME
`ENCODER
`
`i - - - - -< OUTPUT
`234
`0 0 1 0 0 0 0 0
`0 0 1 0 0 0 0 1
`0 0 1 0 0 0 1 0
`0 0 1 0 0 0 1 1
`0 0 1 0 0 1 0 0
`0 0 1 0 0 1 0 1
`0 0 1 0 0 1 1 0
`0 0 1 0 0 1 1 1
`10 1 0 i 1 0 0 01
`
`•
`•
`•
`•
`•
`•
`
`1ST
`THROUGH
`NTH CODE
`WORDS
`
`REAL
`TIME
`ENCODER
`NOISE
`
`/248
`
`202
`
`/
`
`CODE
`
`INPUT">--~
`
`FIG. 7
`
`FIG. 8
`
`250
`
`SYNC
`DETECTOR
`
`NOISE
`SOURCE
`RESET
`
`0 0 1
`0 0 1
`0 0 1
`0 0 1
`0 0 1
`INCREMENT
`
`_____________ _J
`
`0 0 0 0 0
`0 0 0 0 1
`0 0 0 1 0
`0 0 0 1 1
`0 0 1 0 0
`
`APPLE 1004 - Page 9
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 6 of 18
`
`5,841,978
`
`FIG. 9A
`I t\.o Onn I\ A~.,• I\ II I\" l hn~, A~•oOn n I\ Ah '\J •I\ II I\ "l An~, A~
`400
`~v II vuvv'\I yq \I~ l ~V r 411/y
`TIME'Hfll vuvy'VoVq u~l VQ 1' vvy
`0.0
`1.0
`-
`SECONDS
`SECONDS
`
`FIG. 98
`
`NORMALIZE~..\IU
`
`-20dB
`402
`FREQUENCY -40dB
`
`FIG. 9C
`BORDER
`CONTINUITY
`404
`
`OHZ
`
`50KHZ
`
`1.0 0.0 REPEATED
`__. __.
`
`. ··-
`
`..
`
`DETAIL OF MATCH AT BORDER;
`CONTINUOUS TO mth DERIVITIVE
`
`FIG. 10
`
`ROM; 504
`STANDARD NOISE SIGNATURES
`
`AUDIO
`
`T
`
`500
`
`COPYRIGHT
`G
`DETECTION FLA -
`~502.
`FLAG VALID
`
`-
`C5oa ...
`
`\__ 506
`
`APPLE 1004 - Page 10
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 7 of 18
`
`5,841,978
`
`FIG. 11
`
`599"
`
`600
`
`STANDARD NOISE
`SIGNATURE
`
`READ OUT AT125%
`NORMAL RATE
`
`PITCH CHANG ED
`NOISE SIGNAL
`
`504
`
`604
`
`606
`
`INPUT AUDIO __
`SIGNAL
`
`SIGNAL-PITCH CANCELLED
`NOISE SIGNAL
`
`602
`
`TIME AVERAGED
`POWER SIGNAL
`PSIG
`
`I
`I I _______ _
`
`TIME AVERAGED
`POWER SIGNAL P.C. NOISE
`SIGNAL PS-PCN
`
`608
`
`610
`
`POWER DIFFERENCE SIGNAL
`'-------!--- 612
`L_P.~S'..::.'..-P~C~N_-___:PS~IG~--8~o~UT~===::::J 613
`: 6141
`;---CASE 1:
`
`I
`s8
`08
`108 158
`: 616,
`~---CASE 2· ~HF"\M~
`v
`v u
`. IJ
`08
`58
`108 158
`"'-' 4 SECOND BEATS
`\..__ 618
`
`624
`
`FIG. 12
`600~
`SIGNAL ONE----'-..........+
`.05s DIGITAL DELAY
`
`AUDIO VALID
`COUNTER
`
`FLAG VALID
`SIGNAL'-- 508
`622
`BEAT
`DETECTION
`
`599
`
`599
`
`620
`
`.05s DIGITAL DELAY
`
`.05s DIGITAL DELAY
`
`.05s DIGITAL DELAY
`
`502
`)
`DETECTION
`___. FLAG
`
`APPLE 1004 - Page 11
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 8 of 18
`
`5,841,978
`
`FIG. 13
`
`MOVIE: BUD'S ADVENTURES
`
`700
`
`FRAME#: 12183
`DISTRIBUTION LOT: REGION 14
`
`v ROUTINE #28, 702
`I f-r ENCRYPTION/SCAMBLING
`
`• • • • •
`
`• ~ • •
`•
`-:!Hi • •
`. •
`:~_ ~-.. •-flt' : : . . . . . . . . . : .... "ff : : : ... .
`• "ffF
`
`. ' ; . % . ' . tJ• . ·:.: ...... ·:.: ..... ·:.: ..
`: : :
`.. . : : . "0 . : : : ..... : . : : .
`. .
`... ~=.: ......... :·~ :_._ ...... :·~· .. : ......... ~ · ..
`" . : ·::iff: .. " · .. : ... · ... ·." .. G·~" .. 0•· .. " .
`·:··."flr·:·::··r""I.-.·:·::··.-.-.·:·. : .. h-.·I r704
`• • • • • {] •• L,J. • LI
`• • ~ • •
`
`·=:.:q: ·::·:· :·': ·=:<·:*:":' :·': : .• ·:: :-:: ·::·:·: . ='..:.:.::•:·
`• • ....... ·•• ··o· ·.· .... .
`. : . : ........ :": .: .......... ~ .... : :: : .. : ... ·: :": .: .... ~ .. ~
`. :··.-.·. ·:·. =·· ... ·.·:·. :·· ... ·. ·~· . :-·.'.'ttl-
`·o· · · · .·.····· .·.·····
`..... .
`·=:.- .. ·:: ... : . : . :~¥:-:.'.·:: ..... : :": :=:ci·:: ... : ':.: .. '.'.·:: ..... :
`= :· ::t;:F .. · : · : :o" .. ~· : · : : •· · .. : · : :m" .. ~
`o·:.:-.:.--.-. .::.:.-:-.·:.:-.:.-:-.
`:.
`. . . . : .. ·. . : .. _·.: .. : .. ·. . · ........ : . ·. . · ..... : .. : .. ·. . :
`
`PSEUDO-RANDOM MASTER SNOWY IMAGE
`(SCALED DOWN AND ADDED TO FRAME 12183)
`
`APPLE 1004 - Page 12
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 9 of 18
`
`5,841,978
`
`FIG. 14
`
`...-EMBEDDED
`
`720~
`
`DIFFERENCE
`
`'
`
`MEAN-REMOVED HISTOGRAMS OF
`DIFFERENCE SIGNAL AND KNOWN EMBEDDED
`CODE SIGNAL
`
`722~
`
`...-EMBEDDED
`
`DIFFERENCE
`'-----Hirt---
`'-... T~ESHOLDING
`
`MEAN-REMOVED HISTOGRAMS OF
`FIRST DERIVATIVES (OR SCALER GRADIENTS
`IN CASE OF AN IMAGE)
`
`APPLE 1004 - Page 13
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 10 of 18
`
`5,841,978
`
`STEP Z FRAMES
`
`750
`
`RENDER LOGO FRAME
`
`ENCRYPT/SCRAMBLE
`
`700
`
`702
`
`FIG. 15
`
`. . . OUTPUT MASTER SNOWY
`IMAGE FRAME
`
`704
`
`HIGH BRIGHTNESS MASTER
`SNOWY MOVIE
`
`752
`
`756 754
`
`MPEG
`
`COMPRESSED MASTER .· ···
`SNOWY MOVIE
`
`SCALE DOWN
`
`758
`
`760
`
`DIFFERENCE
`
`"CHEAP MASTER
`SNOWY MOVIE"
`
`ORIGINAL MOVIE
`
`770
`
`DISTRIBUTABLE
`MOVIE
`
`766
`768
`\
`SIDE-BY-SIDE
`VIEWING
`
`.
`'
`:... ........................................... j
`
`762
`
`762
`
`ORIGINAL MOVIE
`
`APPLE 1004 - Page 14
`
`

`
`FIG. 16
`I ... JOE'S IMAGE... I 001101011011101001?:~0 ...
`
`802
`
`/
`
`800
`
`/
`
`HEADER
`
`DATA STREAM
`
`!JOE'S IMAGE!
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`d •
`\JJ.
`•
`~
`~ ......
`~ = ......
`
`z
`0
`~
`N
`~,J;;..
`""""
`\C
`\C
`00
`
`'Jl =(cid:173)~
`~ .....
`""""
`"""" 0 .....,
`"""" 00
`
`Ul
`....
`00
`~
`~ ....
`\C
`.....::.
`00
`
`APPLE 1004 - Page 15
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 12 of 18
`
`5,841,978
`
`FIG. 17
`"SHADOW CHANNEL", 828
`96 BIT LEADER STRING, 820
`+
`--------__________ f_ ____ ----------------------------·
`I
`64 BIT LENGTH I 32 BIT DATA WORD SIZE I DATA. __
`822~
`824~
`826~
`UNIVERSAL EMPIRICAL DATA FORMAT
`
`FIG. 18
`
`854
`
`~/
`
`864
`
`/
`
`APPLE 1004 - Page 16
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 13 of 18
`
`5,841,978
`
`FIG. 19
`866"
`
`FIG. 20
`
`CENTER POINT OF
`RING, 872
`
`NOMINAL DISTANCE
`TO CENTER OF OUTER
`
`APPLE 1004 - Page 17
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 14 of 18
`
`5,841,978
`
`FIG. 21A
`
`900-..... c 2C
`2C 4C
`c 2C
`
`/
`c
`2C
`c
`
`FIG. 21 B
`
`\
`
`WHERE C = 1/16
`
`2
`
`6
`
`2
`
`6
`
`3
`
`7
`
`3
`
`7
`
`4
`
`0
`
`c
`4 2C
`c
`
`0
`
`5
`
`6
`
`2
`
`1
`2C c
`4C 2C 6
`2C c
`1
`
`2
`
`7
`
`3
`
`7
`
`3
`
`0
`
`4
`
`0
`
`4
`
`FIG. 23
`
`CABLE, 964,
`TO DATA LINE,
`966
`
`960
`
`962
`
`958
`
`APPLE 1004 - Page 18
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 15 of 18
`
`5,841,978
`
`DIGITAL IMAGE TAKEN
`OF CUSTOMER
`
`FIG. 22
`
`942
`
`I
`
`COMPUTER
`PROCESSES NEW
`ENCODED IMAGE
`
`952
`
`/
`
`/
`
`PRINTS
`PROCESSED
`IMAGE ONTO
`PLASTIC CARD
`
`954
`
`APPLE 1004 - Page 19
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 16 of 18
`
`5,841,978
`
`FIG. 24
`
`972
`
`/
`
`ORIGINAL DIGITAL IMAGE WITH
`BARCODE AND FIDUCIALS
`ADDED
`
`COMPUTER GENERATES MASTER
`SNOWY IMAGE WHICH IS
`GENERALLY ORTHOGONAL TO
`ORIGINAL IMAGE AT LEFT
`
`COMBINED TO FORM PERSONAL CASH CARD
`
`APPLE 1004 - Page 20
`
`

`
`FIG. 25
`
`TYPICAL TRANSACTION STEPS
`
`1. READER SCANS IMAGE ON CARD, STORES IN
`MEMORY, EXTRACTS PERSON'S ID
`2. OPTIONAL: USER KEYS IN PIN NUMBER
`3. READER CALLS CENTRAL ACCOUNT DATA NETWORK, HANDSHAKES
`4. READER SENDS ID, (PIN), MERCHANT INFORMATION, AND
`REQUESTED TRANSACTION AMOUNT TO CENTRAL NETWORK
`5. CENTRAL NETWORK VERIFIES ID, PIN, MERCHANT INFO,
`AND ACCOUNT BALANCE
`6. IF OK, CENTRAL NETWORK GENERATES TWENTY-FOUR
`SETS OF SIXTEEN DISTINCT RANDOM NUMBERS,
`WHERE THE RANDOM NUMBERS ARE INDEXES
`TO A SET OF 64K ORTHOGONAL SPATIAL PATTERNS
`7. CENTRAL NETWORK TRANSMITS FIRST OK, AND THE
`SETS OF RANDOM NUMBERS
`8. READER STEPS THROUGH THE TWENTY-FOUR SETS
`BA. READER ADDS TOGETHER SET OF ORTHOGONAL
`PATTERNS
`BB. READER PERFORMS DOT PRODUCT OF
`RESULTANT PATTERN AND CARD SCAN,
`STORES RESULT
`9. READER TRANSMITS THE TWENTY-FOUR
`DOT PRODUCT RESULTS TO CENTRAL NETWORK
`10. CENTRAL NETWORK CHECKS RESULTS AGAINST MASTER
`11. CENTRAL NETWORK SENDS FINAL APPROVAL OR DENIAL
`12. CENTRAL NETWORK DEBITS MERCHANT ACCOUNT,
`CREDITS CARD ACCOUNT
`
`d •
`\JJ.
`•
`~
`~ ......
`~ = ......
`
`z
`0
`~
`N
`~,J;;..
`""""
`\C
`\C
`00
`
`'Jl =(cid:173)~
`~ .....
`""""
`-..J
`0 .....,
`"""" 00
`
`Ul
`....
`00
`~
`~ ....
`\C
`.....::.
`00
`
`APPLE 1004 - Page 21
`
`

`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 18 of 18
`
`5,841,978
`
`FIG. 26
`
`FIG. 27
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket