`
`USOO6668246B1
`(10) Patent No.:
`US 6,668,246 B1
`US 6,668,246 B1
`(to) Patent No.:
`(45) Date of Patent:
`Dec. 23, 2003
`(45) Date of Patent:
`Dec. 23, 2003
`
`(12) United States Patent
`(12) United States Patent
`Yeung et al.
`Yeung et al.
`
`(54) MULTIMEDIA DATA DELIVERY AND
`MULTIMEDIA DATA DELIVERY AND
`(54)
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`
`(75) Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`(75)
`CA (US); Matthew J. Holliman,
`CA (US); Matthew J. Holliman,
`Libertyville, IL (US); Robert G. Liu,
`Libertyville, IL (US); Robert G. Liu,
`Sunnyvale, CA (US); William W.
`Sunnyvale, CA (US); William W.
`Macy, Palo Alto, CA (US); Boon-Lock
`Macy, Palo Alto, CA (US); Boon-Lock
`Yeo, Sunnyvale, CA (US)
`Yeo, Sunnyvale, CA (US)
`
`(*) Notice:
`Notice:
`* )
`
`(73) Assignee: Intel Corporation, Santa Clara, CA
`Assignee: Intel Corporation, Santa Clara, CA
`(73)
`(US)
`(US)
`Subject to any disclaimer, the term of this
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`U.S.C. 154(b) by 0 days.
`(21) Appl. No.: 09/275,905
`Appl. No.: 09/275,905
`(21)
`(22) Filed:
`Mar. 24, 1999
`Filed:
`(22)
`Mar. 24, 1999
`(51) Int. Cl. ................................................ G06F 17/60
`(51)
` GO6F 17/60
`Int. C1.7
`(52) U.S. Cl. ............................. 705/57; 380/211: 705/1:
`(52)
`U.S. Cl.
` 705/57; 380/211; 705/1;
`705/51; 713/150
`705/51; 713/150
`380/200, 201
`(58) Field of Search
`(58)
` 380/200, 201,
`Field of Search
`380/211; 705/ 50.51.52 s 4, 57. 71.7150
`380/211; 705/1, 50, 51, 52, 54, 57; 713/150
`s
`s a Yu’s a u-s a as a
`s a
`s
`References Cited
`References Cited
`
`(56)
`(56)
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`
` 380/44
`4,933,971 A * 6/1990 Bestock et al.
`4,933,971. A * 6/1990 Bestock et al. ............... 380/44
`5,638,448 A * 6/1997 Nguyen
` 380/29
`5,638,448 A * 6/1997 Nguyen ....................... 380/29
`
`JP
`JP
`
`5,689,566 A * 11/1997 Nguyen ...................... 713/155
`713/155
`5,689,566 A * 11/1997 Nguyen
`6,275,939 B1 * 8/2001 Garrison
`713/200
`6,275,939 B1
`8/2001 Garrison ..................... 713/200
`6,298,446 B1 * 10/2001 Schreiber et al.
`713/201
`6,298.446 B1 * 10/2001 Schreiber et al. ........... 713/201
`6,304,969 B1 * 10/2001 Wasserman et al.
`713/172
`6,304,969 B1 * 10/2001 Wasserman et al. ........ 713/172
`6,353,892 B2 * 3/2002 Schreiber et al.
`713/201
`6,353,892 B2 * 3/2002 Schreiber et al. ........... 713/201
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`2000-148689 A * 5/2000
`2000-148689 A * 5/2000
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`Bobrowski: "Database in a client/server world-Under
`Bobrowski: "Database in a client/server world—Under-
`Standing the unique challenges of keeping your client/server
`standing the unique challenges of keeping your client/server
`database environment secure'; DBMS, Sep. 1, 1994, vol. 7,
`database environment secure"; DBMS, Sep. 1, 1994, vol. 7,
`No. 10, pp. 48–48, (Abstract Onlv).
`No. 10, pp. 48-48, (Abstract Only).*
`O. IU, pp
`, (Abstract Only)
`* cited by examiner
`* cited by examiner
`Primary Examiner Edward R. Cosimano
`Primary Examiner—Edward R. Cosimano
`(74) Attorney, Agent, or Firm-Blakely, Sokoloff, Taylor &
`(74) Attorney, Agent, or Firm—Makely, Sokoloff, Taylor &
`Zafman LLP
`Zafman LLP
`ABSTRACT
`(57)
`ABSTRACT
`(57)
`A content distribution System comprising a server platform
`A content distribution system comprising a server platform
`and a client platform. The Server platform includes a
`and a client platform. The server platform includes a
`memory unit to Store digital content and access control logic
`memory unit to store digital content and access control logic
`to activate content protection mechanisms that provide mul
`to activate content protection mechanisms that provide mul-
`tiple levels of access protection to the digital content. In
`tiple levels of access protection to the digital content. In
`communication with the Server platform, the client platform
`communication with the server platform, the client platform
`plays back Segments of the digital content at one of a
`plays back segments of the digital content at one of a
`plurality of quality levels.
`plurality of quality levels.
`
`24 Claims, 9 Drawing Sheets
`24 Claims, 9 Drawing Sheets
`
`Data
`Data
`
`22
`220
`
`( Content )--er.
`EN2
`EN2-0.
`
`225
`225
`
`236
`( -230
`Edecompression
`Decompression
`Unit
`Unit
`
`f
`
`Process ControlLogic
`Process Control Logic
`210
`2.
`4 4 4 4 4 4
`ENEN2EN3EN4 ENS EN3
`EN1 EN2 EN3 EN4 ENS EN6
`
`-------------------
`s
`( -215
`
`Robust
`Robust
`Watermark HEN
`Watermark 1-ENI
`insertion
`Insertion
`
`FROM
`FROM
`120
`12
`Request80
`Request 180
`Client
`Client
`identifier
`Identifier
`(CPUID)
`(CPU JD)
`Order info
`Order Info
`
`5
`185
`
`REC_ID
`Compression w
`Compression
`Unit
`
`:
`
`/
`
`y
`Jit
`235
`235
`EN3
`EN3
`r c Content
`
`)
`
`---------------------wou
`
`240
`
`k
`
`:
`:
`
`R.
`
`
`
`)
`Delivered'.
`iDelivered
` Content
`Content
`290
`29t
`
`Memory EN4-0.
`200 Unit
`
`ENS-4.
`
`KEY] 4.
`KEY
`251 -
`250 22551; KEY1
`250 -
`KEY
`252
`EN6
`EN6-1.
`
`Fast Waternark
`Fast Watermark
`Insertion
`280
`280
`Insertion
`Visual. Perceptual
`Visual/Perceptual
`Scrambiing
`Scrambling
`260
`260
`Data Scrambling
`Data Scrambling
`(Encrypt
`(Encrypt)
`270
`270
`
`CEient-Based
`Client-Based
`Information
`information
`
`185
`35
`
`Authentication
`Authentication
`Check
`Check
`(CPUIDs, REC IDs,
`(CPU_lDs, REC_IDs,
`etc.)
`
`Key
`Key
`Generation
`Generation
`(Mapping
`(Mapping
`Function)
`Function)
`255
`255
`
`
`
`WER
`SERVER
`p
`PLATFORM
`f
`110
`
`YS 250
`Y1 5
`252
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0001
`
`
`
`U.S. Patent
`Waled *S11
`
`Dec. 23, 2003
`
`Sheet 1 of 9
`6 JO 1 lamIS
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`
`120
`
`PLATFORM
`
`CLIENT
`
`185
`
`
`
`140
`Th
`
`az
`
`-<
`
`145
`
`135
`
`
`I:
`
`.z.e•
`SIG
`
`155
`
`CHIPSET
`
`150
`
`m130
`
` k
`
`Th
`
`CPU ID
`
`RHOSSHOONHA
`
`PROCESSOR
`
`CONTENT
`
`,-160
`
`110
`
`PLATFORM
`
`
`
`WRIO HILVTd?
`
`(HGHARIGHS
`
`SERVER
`
`100
`
`FIG. 1
`
`
`
`
`
`DEVICE
`
`<_TENT-BASED INFO
`
`' 180
`
`NOILVOINOWNWOO
`
`COMMUNICATION
`
`REQUEST
`10
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0002
`
`
`
`U.S. Patent
`U.S. Patent
`
`Dec. 23, 2003
`Dec. 23, 2003
`
`Sheet 2 of 9
`Sheet 2 of 9
`
`US 6,668,246 B1
`US 6,668,246 B1
`
`FIG. 2
`
`Data
`Data
`
`220
`2201/4
`
`Content
`EN2
`EN2—*
`
`225
`225 '1
`
`( -230
`230
`Decompression
`Decompression
`Unit
`Unit
`
`-
`
`25
`r215
`
`
`
`
`
`
`
`Robust
`Robust
`Watermark
`-EN1;
`Watermark 4-EN1
`Insertion
`Insertion
`
`
`
`
`
`
`
`
`
`FROM
`FROM
`120
`120
`Request 180
`Request 180
`Client
`Client
`Identifier
`Identifier
`(CPUID)
`(CPU_ID)
`Order Info
`
`
`
`
`
`85
`}185
`
`•
`
`REC_ID
`
`/
`
`280
`
`Fast Watermark
`Fast Watermark
`280
`Insertion
`Visual/Perceptual
`Visual/Perceptual
`Scrambling
`Scrambling
`260
`260
`
`Disting
`Data Scrambling
`(Encrypt)
`C
`Er
`270
`
`SERVER
`SERVER
`PLATFORM
`PLATFORM
`
`110
`10
`
`Delivered
`Delivered
`Content
`Content
`290
`290
`
`Process Control Logic
`210
`
`EN1 EN2 EN3 EN4 EN5 EN6
`
`Compression
`Unit
`
`235
`EN3
`
`240
`
`K Content
`CD
`r Memory
`t
`200 Unit
`
`EN4
`
`ENS
`EN5-0.
`
`
`
`
`
`Client-Based
`Client-Based
`Information
`Information
`
`250
`
`251
`252
`
`85
`
`KEY
`KEY1
`
`
`
`
`
`KEY1
`EN6
`EN6-10.
`
`
`
`185 /
`
`
`
`Authentication
`Authentication
`Check
`Check
`(CPUIDs, REC IDs,
`(CPUJ:Ds, REC_1D
`etc.)
`etc.)
`
`
`
`Key
`Key
`Generation
`Generation
`(Mapping
`(Mapping
`Function)
`Function)
`255
`255
`
`KEYS 250
`KEYS 250
`KEY
`KEYI
`
`251
`25
`
`KEY1
`KEY
`
`252
`252
`
`
`
`
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0003
`
`
`
`U.S. Patent
`U.S. Patent
`
`Dec. 23, 2003
`Dec. 23, 2003
`
`Sheet 3 of 9
`Sheet 3 of 9
`
`US 6,668,246 B1
`US 6,668,246 B1
`
`
`
`0 MPEG Video Content Delivery System
`
`300
`
`380
`
`Fr4
`
`370
`
`11 0 oOr,
`
`0, 0
`
`I0
`
`/ 0
`/ 0
`
`382
`
`381
`v. DataScrambling
`gi
`Key I--
`Data Scrambling
`Visual Scrambling
`330-
`Visual Scrambling is...N-
`-
`gi
`Source
`340
`ostern
`go
`Fingerprinting
`340
`Fingerprinting
`DestinationL_
`360
`
`320 —
`
`Encode
`
`Fingerprint I
`
`Watermarking Message
`Watermarking Message
`
`350
`350
`
`FIG 3
`FIG, 3
`
`310
`510
`311
`3.11
`
`312
`312
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0004
`
`
`
`Waled *S11
`
`6 JO 17 lamIS
`
`HI 917Z`899`9 Sfl
`
`FIG, 4
`
`. CONTROL
`
` 0
`
`120
`
`PLATFORM
`CLIENT
`
`450
`
`PLAYER
`CONTENT
`
`( 490
`
`EXTRACTION 440
`
`WATERMARK
`
`DESCRAMBLING 430
`VISUAL/PERCEPTUAL
`
`420
`
`DATA DESCRAMBLING
`
`410
`UNIT
`
`
`
`•
`
`MEMORY
`
`(CONTENT
`
`290
`
`1470
`
`471
`
`KEY
`
`KEY
`
`471
`
`472
`
`460
`
`FUNCTION
`MAPPING
`
`11(114S
`(470
`
`AUX. INFO
`
`CPU ID
`
`150
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0005
`
`
`
`U.S. Patent
`Waled *S11
`
`Dec. 23, 2003
`
`6 JO S lamIS
`Sheet 5 of 9
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`
` IGC4,11GB15
`
`0:43
`
` 1
`
` IMPEG-2
`
` IType: P
`
` !Frame: rams (Time: 1134)
`
` 'FPS: 303111927
`
`Re
`
`1
`
`FIG. 5
`
`Stream Navigation
`
`500
`
`??? TET
`
`OK
`
`pi
`
`
`
`aInvalid MPEG stream or incorrect key
`
`MPL error
`
`-0101P
`
`Y U V F.:7-02.i4,
`
`E
`
`e 0-0+1 I P B
`File View Help
`
`synergy_outfic_key1234.mpg - Player
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0006
`
`
`
`Poled *S11
`U.S. Patent
`
`6 JO 9 loolIS
`
`iti 917e899`9 Sa US 6,668,246 B1
`
`li WI AGEP 5
`
`NO
`
`I
`
`3 MPEG-2
`
`I Tre, P
`
`1.134)
`
`'Frame: ono (rtrne:
`
`
`
`[FPS: 30.71/19.27
`
`Ifs
`
`FIG. 6
`
`.•...'"°"<#)
`
`....1
`
`'''''
`
`_--.''
`
`."......'
`
`......
`
`.4.' \
`
`........
`
`-?..../
`
`6
`
`((4
`
`Stream Navigation
`
`--N
`
`1-jc3 2i
`
`dor
`
`-----,
`
`2C0
`CO
`
`,#),/
`
`ocoo 05
`
`orzikete, -
`NII,14/11186,1
`
`..„,,
`
`r
`
`qt
`
`
`
`Iliad ar
`
`,,
`
`111111
`
`111141
`
`117
`
`lilt,
`1411
`
`1....
`
`11111111,4
`
`440
`
`, ..
`
`V, -0101
`
`r
`
`',..
`
`. ,r...........
`
`1
`
`i
`
`l
`
`Mil
`
`
`
`,
`
`I
`
`il
`
`f
`
`MI
`*11/4
`
`lik
`
`kit IBM MIMI i
`
`10111
`
`01,
`
`liariiiii1
`
`I
`
`1:
`
`i
`
`Ile°
`
`ill
`
`It
`
`ii
`
`li
`
`laill
`
`110,11
`
`0.
`
`Et 11/Z0=
`
`k
`
`I la
`
`ilk
`
`1!7777-
`
`"17
`
`1.1;"""W
`
`lt.:11
`
`4;
`
`k#
`
`gli
`
`gigli
`
`_........, _ ,.. if
`.111 i> El +1 I P B YIU V Li j
`
`frii;;A:morgivitig
`
`File View Help
`
`.v":',G synergy_aut_sc_key1 234.mpg - Player
`
`
`
`
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0007
`
`
`
`Juaied 'S11
`U.S. Patent
`
`6 JO L lamIS
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`
`-,
`s,
`...
`
`LA
`
`\\,..
`
`—ICA Z
`
`
`
`ilii
`
`Cancel
`
`OK
`
`700
`KeY: 1
`
`y
`
`4zZ,------,.. /./
`
`Descrambling key
`
`-
`
`1101:30,561.5
`
`3676
`
` I
`
` I 14PEG-2
`
`ITyPel
`
`'Frame: 506035 (Time: 1.134)
`
`I IPS: 30.71/1927
`
`I
`
`•
`
`•
`
`i
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`!
`
`1
`
`11
`
`1.
`
`.
`
`t
`
`l
`
`I
`
`„
`
`Stream Navigation
`
`(Ready
`
`,
`
`n
`
`FIG. 7
`
`N.
`N.
`
`,...
`
`.. _
`
`C°
`
`)D°
`
`*"..
`
`.....--
`
`CA
`
`ii
`
`-7.1
`
`.....
`,411
`
`1.
`
`C
`
`4
`
`49
`
`"
`
`j
`„.......
`
`--.---'
`I P 8 YUI/F101 d 2,1-Acip
`
`elarMalU ali non*
`ili. ill: "mar Jr
`__ , „„......,,
`
`fa or 1.e.o...'"-
`
`I I iiMile MOW
`ill
`iiii :ill anises,
`iii ism kalif /
`6:::::F. :Was/
`ri,-;;;;;;;;Hrom
`air it
`IS:VX....ZIL'a al fif
`
`1
`
`Voi)
`
`F ile View Help
`Wm
`U synergy_out_vscfp_nods_key1234.mpg - Player
`
`4'
`1.
`
`iiirk
`
`00.111111.
`
`IN
`
`...0
`
`'
`
`.......t__ _
`
`HSI
`..4?!..1-"P-----zillti
`- - . . .1 4 ;0 4 ,i 1_ "
`Aiiiiiiii.P5
`lijirrear.91!
` AO a. il r 9 lir
`
`* i0.
`
`+1
`
`EJI>111
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0008
`
`
`
`U.S. Patent
`Waled °S'Il
`
`Dec. 23, 2003
`
`6 JO 8 laNS
`Sheet 8 of 9
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`
`Asf
`
`I
`
` I GDI,RGB15
`
`316x6
`
`J
`
`II MPEG-2
`
`I [Type: B
`
`3.
`
`IfFrame: WOO (T
`
`I n
`
` IFPS: 17
`
`I Reach,
`
`)
`
`FIG. 8
`
`r---__7-----
`i ______
`-_-:.:-.---- --•\
`
`Stream Navigation
`
`(
`
`\:-..,....\_,,,_\
`
`1
`
`\
`
`Y
`
`/
`
`) e) )
`
`I
`
`0 0 r\
`
`<->)
`
`I I 1
`
`I
`
`800
`
`Cool!
`
`Created on Katmai A
`Copyright information: watermark not found
`
`Recipient information:
`
`Extracted watermarks
`
`1/1„10°°
`
`i.c..•
`
`l'
`
`72"L
`
`i
`
`_-----
`
`/
`
`;, -%''`-•
`
`,,,,i ._,:i.%,
`
`—
`
`--"---::-------"-----
`—.
`
`-
`
`Z
`
`
`
`Y U V 1: ELLI 14, ^01©l P
`
`I P B
`
`I> 0 +1
`
`6
`
`File View Help
`mi'G synergy_out_vecip_nods_nokey.mpg - Player
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0009
`
`
`
`U.S. Patent
`Waled *S11
`
`6 JO 6 lamIS
`
`US 6,668,246 B1
`HI 917Z`899`9 Sfl
`
`FIG, 9
`
`6 91-7
`
`PLAYER
`CONTENT
`
`270
`
`SCRAMBLING
`
`DATA
`
`260
`
`SCRAMBLING
`PERCEPTUAL
`
`VISUAL/
`
`280
`
`INSERTION
`
`WATERMARK
`
`FAST
`
`DESCRAMBLING
`
`DATA
`
`SCRAMBLING
`
`DATA
`
`CONTENT
`
`CONTENT
`
`900 -\
`
`KEY 2
`
`KEY I
`
`410
`UNIT
`
`MEMORY
`
`120
`
`JQ
`
`PLATFORM
`CLIENT
`
`PLATFORM
`SERVER
`
`KEY
`
`INSERTION
`
`WATERMARK
`
`026
`
`920
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0010
`
`
`
`US 6,668,246 B1
`US 6,668,246 B1
`
`1
`1
`MULTIMEDIA DATA DELIVERY AND
`MULTIMEDIA DATA DELIVERY AND
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`
`BACKGROUND
`BACKGROUND
`
`2
`2
`FIG. 3 is an embodiment of a screen menu produced at the
`FIG. 3 is an embodiment of a screen menu produced at the
`Server platform for Selecting the origin of the content and the
`server platform for selecting the origin of the content and the
`level of access control based on the Selected content pro
`level of access control based on the selected content pro-
`tection mechanisms.
`tection mechanisms.
`FIG. 4 is an illustrative block diagram of an embodiment
`FIG. 4 is an illustrative block diagram of an embodiment
`of a client platform of the content distribution system of
`of a client platform of the content distribution system of
`FIG. 1.
`FIG. 1.
`1. Field
`1. Field
`FIG. 5 is an embodiment of a screen display produced by
`FIG. 5 is an embodiment of a screen display produced by
`The present invention relates to the field of data security.
`The present invention relates to the field of data security.
`the client platform of FIG. 4 when the content client
`More particularly, this invention relates to a platform and
`the client platform of FIG. 4 when the content client
`More particularly, this invention relates to a platform and
`10 platform is unable to pass a first level of access control.
`platform is unable to pass a first level of acceSS control.
`corresponding method for protecting content through mul
`corresponding method for protecting content through mul-
`tiple content control.
`FIG. 6 is an embodiment of a Screen display featuring
`tiple content control.
`FIG. 6 is an embodiment of a screen display featuring
`degraded digital content produced by the client platform of
`2. General Background
`degraded digital content produced by the client platform of
`2. General Background
`FIG. 4 when the client platform is unable to pass a second
`FIG. 4 when the client platform is unable to pass a second
`For over fifty years, the entertainment industry has pro
`For over fifty years, the entertainment industry has pro-
`level of acceSS control.
`level of access control.
`Vided audio-visual information to the general populous in
`vided audio-visual information to the general populous in
`FIG. 7 is an embodiment of a screen display featuring a
`the form of television programming. When transmitted in an
`FIG. 7 is an embodiment of a screen display featuring a
`the form of television programming. When transmitted in an
`user identification window that prompting input of user
`analog format Such as National Television Systems Com
`user identification window that prompting input of user
`analog format such as National Television Systems Com-
`information before removing visual degradation from the
`mittee (NTSC) or Phase Alternating Line (PAL), this pro
`information before removing visual degradation from the
`mittee (NTSC) or Phase Alternating Line (PAL), this pro-
`digital content.
`gramming is Somewhat protected due to the inherent nature
`digital content.
`gramming is somewhat protected due to the inherent nature
`of analog signaling. For example, analog Signals are trouble
`FIG. 8 is an embodiment of a screen display featuring a
`of analog signaling. For example, analog signals are trouble-
`FIG. 8 is an embodiment of a screen display featuring a
`fingerprinting menu to provide ownership information con
`Some to illicitly copy and redistribute. Also, the recorded
`some to illicitly copy and redistribute. Also, the recorded
`fingerprinting menu to provide ownership information con-
`copies have poorer image quality than the original program
`cerning the digital content prior to playback on the content
`copies have poorer image quality than the original program-
`cerning the digital content prior to playback on the content
`ming.
`client platform.
`ming.
`client platform.
`Due to advances in digital processing technology and
`FIG. 9 is an illustrative block diagram of a second
`Due to advances in digital processing technology and
`FIG. 9 is an illustrative block diagram of a second
`acceptance of the Internet, digital content distribution is now
`embodiment of the content distribution system of FIG. 1.
`25
`acceptance of the Internet, digital content distribution is now
`25 embodiment of the content distribution system of FIG. 1.
`growing in popularity. Presently, original equipment manu
`growing in popularity. Presently, original equipment manu-
`facturers (OEMs) are providing personal computers with
`DETAILED DESCRIPTION
`DETAILED DESCRIPTION
`facturers (OEMs) are providing personal computers with
`open, programmable architectures that are capable of receiv
`open, programmable architectures that are capable of receiv-
`The present invention relates to a platform and corre
`The present invention relates to a platform and corre-
`ing and/or transmitting audio-Visual information in a digital
`ing and/or transmitting audio-visual information in a digital
`sponding method to protect content from unauthorized
`sponding method to protect content from unauthorized
`format. In many instances, the digitized audio-visual infor
`format. In many instances, the digitized audio-visual infor-
`observation and/or manipulation through hardware-based
`observation and/or manipulation through hardware-based
`mation is encrypted before transmission and decryption
`mation is encrypted before transmission and decryption
`identification and a variety of content protection mecha
`identification and a variety of content protection mecha-
`upon receipt. Thus, most conventional personal computers
`upon receipt. Thus, most conventional personal computers
`nisms. Selected combinations of content protection mecha
`nisms. Selected combinations of content protection mecha-
`only rely on a single content protection mechanism (e.g.,
`only rely on a single content protection mechanism (e.g.,
`nisms combined with hardware-based identification can
`nisms combined with hardware-based identification can
`encryption and decryption) that either provides program
`encryption and decryption) that either provides program-
`provide different levels of access control. Each level of
`provide different levels of access control. Each level of
`ming in full quality or prevents the programming from being
`ming in full quality or prevents the programming from being
`acceSS control is associated with a unique degree of protec
`access control is associated with a unique degree of protec-
`displayed. Due to a lack of multiple content protection
`displayed. Due to a lack of multiple content protection
`tion against unauthorized observation and/or manipulation
`tion against unauthorized observation and/or manipulation
`mechanisms, conventional computers are unable to protect
`mechanisms, conventional computers are unable to protect
`of content. Hence, each level of acceSS control comprises:
`of content. Hence, each level of access control comprises:
`the decrypted, digitized Video from being observed by an
`the decrypted, digitized video from being observed by an
`one or more authentication checks of a client identifier
`one or more authentication checks of a client identifier
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`and/or auxiliary information associated with the content
`and/or auxiliary information associated with the content
`by a malicious program during playback. This has greatly
`by a malicious program during playback. This has greatly
`purchaser, content transformation and distortion; and pos
`purchaser; content transformation and distortion; and pos-
`impeded the expansion of digital content distribution.
`impeded the expansion of digital content distribution.
`sibly extraction of meta-data from delivered content.
`sibly extraction of meta-data from delivered content.
`Therefore, it would be desirable to create a platform and
`Therefore, it would be desirable to create a platform and
`It should be apparent that certain embodiments are
`It should be apparent that certain embodiments are
`method for protecting digital content through hardware
`method for protecting digital content through hardware-
`described in order to provide a thorough understanding of
`described in order to provide a thorough understanding of
`based identification and a variety of content protection
`based identification and a variety of content protection
`the invention; however, these embodiments should be con
`45 the invention; however, these embodiments should be con-
`45
`mechanisms to achieve a Selected level of access control.
`mechanisms to achieve a selected level of access control.
`Strued as illustrative in nature, not restrictive. Also, well
`strued as illustrative in nature, not restrictive. Also, well-
`known logic is not set forth in detail in order to avoid
`known logic is not set forth in detail in order to avoid
`unnecessarily obscuring the present invention.
`unnecessarily obscuring the present invention.
`In the following description, certain terminology is used
`In the following description, certain terminology is used
`to describe characteristics of the present invention as well as
`so to describe characteristics of the present invention as well as
`50
`cryptographic functionality. For example, a “platform com
`cryptographic functionality. For example, a "platform" com-
`prises an electronic device including a processor (e.g., a
`prises an electronic device including a processor (e.g., a
`microprocessor, a microcontroller, a state machine, etc.) and
`microprocessor, a microcontroller, a state machine, etc.) and
`a communication device to transmit and/or receive content.
`a communication device to transmit and/or receive content.
`Examples of a platform include, but are not limited or
`55 Examples of a platform include, but are not limited or
`55
`restricted to a computer (e.g., a laptop, desktop, hand-held,
`restricted to a computer (e.g., a laptop, desktop, hand-held,
`mainframe, etc.), communication equipment (e.g.,
`mainframe, etc.), communication equipment (e.g.,
`telephone, telephone with video display, etc.), or a set-top
`telephone, telephone with video display, etc.), or a set-top
`box (e.g., cable box, network computer, etc.).
`box (e.g., cable box, network computer, etc.).
`“Content” is generally defined as (i) data in the form of
`"Content" is generally defined as (i) data in the form of
`Video, images, audio, text, programs or any combination
`video, images, audio, text, programs or any combination
`thereof, and/or (ii) control information Such as Internet
`thereof, and/or (ii) control information such as Internet
`Protocol (IP) commands, identifiers and the like. The term
`Protocol (IP) commands, identifiers and the like. The term
`“quality” is a measure of the visual clarity of an image or
`"quality" is a measure of the visual clarity of an image or
`Video, audible clarity during audio playback, accuracy of
`65 video, audible clarity during audio playback, accuracy of
`65
`characters in text or programs as well as other factors.
`characters in text or programs as well as other factors.
`Content is considered “full quality” when its visual or
`Content is considered "full quality" when its visual or
`
`SUMMARY
`SUMMARY
`Briefly, one embodiment of the present invention relates
`Briefly, one embodiment of the present invention relates
`to a content distribution system. The content distribution
`to a content distribution system. The content distribution
`System comprises a Server platform and a client platform.
`system comprises a server platform and a client platform.
`The Server platform includes a memory unit to Store digital
`The server platform includes a memory unit to store digital
`content and access control logic to activate content protec
`content and access control logic to activate content protec-
`tion mechanisms that provide multiple levels of acceSS
`tion mechanisms that provide multiple levels of access
`protection to the digital content. In communication with the
`protection to the digital content. In communication with the
`Server platform, the client platform plays back Segments of
`server platform, the client platform plays back segments of
`the digital content at one of a plurality of quality levels.
`the digital content at one of a plurality of quality levels.
`BRIEF DESCRIPTION OF THE DRAWINGS
`BRIEF DESCRIPTION OF THE DRAWINGS
`The features and advantages of the present invention will
`The features and advantages of the present invention will
`become apparent from the following detailed description of
`become apparent from the following detailed description of
`the present invention in which:
`the present invention in which:
`FIG. 1 is an illustrative block diagram of a first embodi
`FIG. 1 is an illustrative block diagram of a first embodi-
`ment of a content distribution System.
`ment of a content distribution system.
`FIG. 2 is an illustrative block diagram of an embodiment
`FIG. 2 is an illustrative block diagram of an embodiment
`of a server platform of the content distribution system of
`of a server platform of the content distribution system of
`FIG. 1.
`FIG. 1.
`
`5
`
`1
`15
`5
`
`20
`
`0
`3
`
`35
`3 5
`
`
`4 0
`
`40
`
`60
`60
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0011
`
`
`
`1 0
`
`2
`
`40
`40
`
`US 6,668,246 B1
`US 6,668,246 B1
`
`5
`
`
`
`3
`4
`3
`4
`audible clarity is Substantially the Same as its original
`that have been authorized to retrieve content from server
`audible clarity is substantially the same as its original
`that have been authorized to retrieve content from server
`platform 110. To enhance security, it is contemplated that
`(master) form even though the underlining data may be
`platform 110. To enhance security, it is contemplated that
`(master) form even though the underlining data may be
`server platform 110 may store hash values of authorized
`different. Content is considered “lesser quality” when its
`server platform 110 may store hash values of authorized
`different. Content is considered "lesser quality" when its
`client identifiers. As a result, for the CPU ID
`visual or audible clarity is substantially inferior to the
`client identifiers. As a result, for the CPU ID
`visual or audible clarity is substantially inferior to the
`implementation, the client identifier of client platform 120
`original form.
`implementation, the client identifier of client platform 120
`original form.
`would have to undergo a one-way hash function prior to
`would have to undergo a one-way hash function prior to
`Additionally, a “communication link' is defined as one or
`Additionally, a "communication link" is defined as one or
`comparison. For the Secure platform Signature
`comparison. For the secure platform signature
`more mediums to transfer content from one location to
`more mediums to transfer content from one location to
`implementation, data associated with the Signature could be
`implementation, data associated with the signature could be
`another. Examples of a communication link include, but are
`another. Examples of a communication link include, but are
`recovered and compared with the pre-stored hash values. Of
`recovered and compared with the pre-stored hash values. Of
`not limited or restricted to electrical wire, fiber optic, cable,
`not limited or restricted to electrical wire, fiber optic, cable,
`course, in lieu of client identifiers, authentication checks
`course, in lieu of client identifiers, authentication checks
`wireless channel(s) established using infrared (IR) or radio
`wireless channel(s) established using infrared (IR) or radio
`may be performed on user information (e.g., passwords,
`may be performed on user information (e.g., passwords,
`frequency (RF) Signaling, a private local area network, a
`frequency (RF) signaling, a private local area network, a
`assigned recipient identification values, etc.) or even a
`assigned recipient identification values, etc.) or even a
`wide area network or even the Internet. A "mechanism”
`wide area network or even the Internet. A "mechanism"
`Software-based magic cookie.
`software-based magic cookie.
`includes a particular functionality performed through execu
`includes a particular functionality performed through execu-
`In the event that an authentication check fails, all Seg
`In the event that an authentication check fails, all seg-
`tion of Software and/or operation of hardware.
`tion of software and/or operation of hardware.
`ments of content 170 scheduled for playback at client
`ments of content 170 scheduled for playback at client
`1
`15
`With respect to cryptographic functionality, a “key” is
`5
`platform 120 (whether already delivered or not) would fail
`With respect to cryptographic functionality, a "key" is
`platform 120 (whether already delivered or not) would fail
`information used by a cryptographic function (e.g., Sym
`to play or cannot be played at “full quality until a Subse
`information used by a cryptographic function (e.g., sym-
`to play or cannot be played at "full quality" until a subse-
`metric function) for encryption and/or decryption. Herein,
`quent authentication check is Successful. This periodic con
`metric function) for encryption and/or decryption. Herein,
`quent authentication check is successful. This periodic con-
`each key is sized to be 160-bits in length, although any bit
`tent delivery technique constitutes an additional level of
`each key is sized to be 160-bits in length, although any bit
`tent delivery technique constitutes an additional level of
`Size may be used. A “one-way hash function' converts
`size may be used. A "one-way hash function" converts
`acceSS control.
`access control.
`content from a variable-length into a fixed-length with no
`content from a variable-length into a fixed-length with no
`In general, client platform 120 issues a request 180 for
`In general, client platform 120 issues a request 180 for
`ability to recover the variable-length content. Examples of a
`ability to recover the variable-length content. Examples of a
`content from server platform 110 via communication link
`content from server platform 110 via communication link
`one-way hash function include a Secure Hash Algorithm
`one-way hash function include a Secure Hash Algorithm
`160. Content request 180 is accompanied by client-based
`160. Content request 180 is accompanied by client-based
`(SHA-1) as specified a 1995 publication entitled Secure
`(SHA-1) as specified a 1995 publication entitled Secure
`information 185 needed by server platform 110 to identify
`information 185 needed by server platform 110 to identify
`Hash Standard FIPS 180-1 (Apr. 17, 1995). The term
`Hash Standard FIPS 180-1 (Apr. 17, 1995). The term
`the specific content ordered and to verify whether client
`25 the specific content ordered and to verify whether client
`25
`“secure' (and any other tense or form thereof) indicates a
`"secure" (and any other tense or form thereof) indicates a
`platform 120 and/or an intended recipient is authorized to
`platform 120 and/or an intended recipient is authorized to
`State where it is virtually computationally infeasible for an
`state where it is virtually computationally infeasible for an
`receive that content. In one embodiment, this client-based
`receive that content. In one embodiment, this client-based
`unauthorized individual to gain access to content or other
`unauthorized individual to gain access to content or other
`information 185 comprises (1) a client identifier, (2) order
`information 185 comprises (1) a client identifier, (2) order
`data in a plain text format.
`data in a plain text format.
`information to identify the content ordered by the content
`information to identify the content ordered by the content
`purchaser, (3) optional auxiliary information Such as a
`Referring to FIG. 1, an illustrative block diagram of a first
`Referring to FIG. 1, an illustrative block diagram of a first
`30