throbber
11111111111111101111111111!!!!11111111 J11111111111111111110111111
`
`USOO6668246B1
`(10) Patent No.:
`US 6,668,246 B1
`US 6,668,246 B1
`(to) Patent No.:
`(45) Date of Patent:
`Dec. 23, 2003
`(45) Date of Patent:
`Dec. 23, 2003
`
`(12) United States Patent
`(12) United States Patent
`Yeung et al.
`Yeung et al.
`
`(54) MULTIMEDIA DATA DELIVERY AND
`MULTIMEDIA DATA DELIVERY AND
`(54)
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`
`(75) Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`(75)
`CA (US); Matthew J. Holliman,
`CA (US); Matthew J. Holliman,
`Libertyville, IL (US); Robert G. Liu,
`Libertyville, IL (US); Robert G. Liu,
`Sunnyvale, CA (US); William W.
`Sunnyvale, CA (US); William W.
`Macy, Palo Alto, CA (US); Boon-Lock
`Macy, Palo Alto, CA (US); Boon-Lock
`Yeo, Sunnyvale, CA (US)
`Yeo, Sunnyvale, CA (US)
`
`(*) Notice:
`Notice:
`* )
`
`(73) Assignee: Intel Corporation, Santa Clara, CA
`Assignee: Intel Corporation, Santa Clara, CA
`(73)
`(US)
`(US)
`Subject to any disclaimer, the term of this
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`U.S.C. 154(b) by 0 days.
`(21) Appl. No.: 09/275,905
`Appl. No.: 09/275,905
`(21)
`(22) Filed:
`Mar. 24, 1999
`Filed:
`(22)
`Mar. 24, 1999
`(51) Int. Cl. ................................................ G06F 17/60
`(51)
` GO6F 17/60
`Int. C1.7
`(52) U.S. Cl. ............................. 705/57; 380/211: 705/1:
`(52)
`U.S. Cl.
` 705/57; 380/211; 705/1;
`705/51; 713/150
`705/51; 713/150
`380/200, 201
`(58) Field of Search
`(58)
` 380/200, 201,
`Field of Search
`380/211; 705/ 50.51.52 s 4, 57. 71.7150
`380/211; 705/1, 50, 51, 52, 54, 57; 713/150
`s
`s a Yu’s a u-s a as a
`s a
`s
`References Cited
`References Cited
`
`(56)
`(56)
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`
` 380/44
`4,933,971 A * 6/1990 Bestock et al.
`4,933,971. A * 6/1990 Bestock et al. ............... 380/44
`5,638,448 A * 6/1997 Nguyen
` 380/29
`5,638,448 A * 6/1997 Nguyen ....................... 380/29
`
`JP
`JP
`
`5,689,566 A * 11/1997 Nguyen ...................... 713/155
`713/155
`5,689,566 A * 11/1997 Nguyen
`6,275,939 B1 * 8/2001 Garrison
`713/200
`6,275,939 B1
`8/2001 Garrison ..................... 713/200
`6,298,446 B1 * 10/2001 Schreiber et al.
`713/201
`6,298.446 B1 * 10/2001 Schreiber et al. ........... 713/201
`6,304,969 B1 * 10/2001 Wasserman et al.
`713/172
`6,304,969 B1 * 10/2001 Wasserman et al. ........ 713/172
`6,353,892 B2 * 3/2002 Schreiber et al.
`713/201
`6,353,892 B2 * 3/2002 Schreiber et al. ........... 713/201
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`2000-148689 A * 5/2000
`2000-148689 A * 5/2000
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`Bobrowski: "Database in a client/server world-Under
`Bobrowski: "Database in a client/server world—Under-
`Standing the unique challenges of keeping your client/server
`standing the unique challenges of keeping your client/server
`database environment secure'; DBMS, Sep. 1, 1994, vol. 7,
`database environment secure"; DBMS, Sep. 1, 1994, vol. 7,
`No. 10, pp. 48–48, (Abstract Onlv).
`No. 10, pp. 48-48, (Abstract Only).*
`O. IU, pp
`, (Abstract Only)
`* cited by examiner
`* cited by examiner
`Primary Examiner Edward R. Cosimano
`Primary Examiner—Edward R. Cosimano
`(74) Attorney, Agent, or Firm-Blakely, Sokoloff, Taylor &
`(74) Attorney, Agent, or Firm—Makely, Sokoloff, Taylor &
`Zafman LLP
`Zafman LLP
`ABSTRACT
`(57)
`ABSTRACT
`(57)
`A content distribution System comprising a server platform
`A content distribution system comprising a server platform
`and a client platform. The Server platform includes a
`and a client platform. The server platform includes a
`memory unit to Store digital content and access control logic
`memory unit to store digital content and access control logic
`to activate content protection mechanisms that provide mul
`to activate content protection mechanisms that provide mul-
`tiple levels of access protection to the digital content. In
`tiple levels of access protection to the digital content. In
`communication with the Server platform, the client platform
`communication with the server platform, the client platform
`plays back Segments of the digital content at one of a
`plays back segments of the digital content at one of a
`plurality of quality levels.
`plurality of quality levels.
`
`24 Claims, 9 Drawing Sheets
`24 Claims, 9 Drawing Sheets
`
`Data
`Data
`
`22
`220
`
`( Content )--er.
`EN2
`EN2-0.
`
`225
`225
`
`236
`( -230
`Edecompression
`Decompression
`Unit
`Unit
`
`f
`
`Process ControlLogic
`Process Control Logic
`210
`2.
`4 4 4 4 4 4
`ENEN2EN3EN4 ENS EN3
`EN1 EN2 EN3 EN4 ENS EN6
`
`-------------------
`s
`( -215
`
`Robust
`Robust
`Watermark HEN
`Watermark 1-ENI
`insertion
`Insertion
`
`FROM
`FROM
`120
`12
`Request80
`Request 180
`Client
`Client
`identifier
`Identifier
`(CPUID)
`(CPU JD)
`Order info
`Order Info
`
`5
`185
`
`REC_ID
`Compression w
`Compression
`Unit
`
`:
`
`/
`
`y
`Jit
`235
`235
`EN3
`EN3
`r c Content
`
`)
`
`---------------------wou
`
`240
`
`k
`
`:
`:
`
`R.
`
`
`
`)
`Delivered'.
`iDelivered
` Content
`Content
`290
`29t
`
`Memory EN4-0.
`200 Unit
`
`ENS-4.
`
`KEY] 4.
`KEY
`251 -
`250 22551; KEY1
`250 -
`KEY
`252
`EN6
`EN6-1.
`
`Fast Waternark
`Fast Watermark
`Insertion
`280
`280
`Insertion
`Visual. Perceptual
`Visual/Perceptual
`Scrambiing
`Scrambling
`260
`260
`Data Scrambling
`Data Scrambling
`(Encrypt
`(Encrypt)
`270
`270
`
`CEient-Based
`Client-Based
`Information
`information
`
`185
`35
`
`Authentication
`Authentication
`Check
`Check
`(CPUIDs, REC IDs,
`(CPU_lDs, REC_IDs,
`etc.)
`
`Key
`Key
`Generation
`Generation
`(Mapping
`(Mapping
`Function)
`Function)
`255
`255
`
`
`
`WER
`SERVER
`p
`PLATFORM
`f
`110
`
`YS 250
`Y1 5
`252
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0001
`
`

`

`U.S. Patent
`Waled *S11
`
`Dec. 23, 2003
`
`Sheet 1 of 9
`6 JO 1 lamIS
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`
`120
`
`PLATFORM
`
`CLIENT
`
`185
`
`
`
`140
`Th
`
`az
`
`-<
`
`145
`
`135
`
`
`I:
`
`.z.e•
`SIG
`
`155
`
`CHIPSET
`
`150
`
`m130
`
` k
`
`Th
`
`CPU ID
`
`RHOSSHOONHA
`
`PROCESSOR
`
`CONTENT
`
`,-160
`
`110
`
`PLATFORM
`
`
`
`WRIO HILVTd?
`
`(HGHARIGHS
`
`SERVER
`
`100
`
`FIG. 1
`
`
`
`
`
`DEVICE
`
`<_TENT-BASED INFO
`
`' 180
`
`NOILVOINOWNWOO
`
`COMMUNICATION
`
`REQUEST
`10
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0002
`
`

`

`U.S. Patent
`U.S. Patent
`
`Dec. 23, 2003
`Dec. 23, 2003
`
`Sheet 2 of 9
`Sheet 2 of 9
`
`US 6,668,246 B1
`US 6,668,246 B1
`
`FIG. 2
`
`Data
`Data
`
`220
`2201/4
`
`Content
`EN2
`EN2—*
`
`225
`225 '1
`
`( -230
`230
`Decompression
`Decompression
`Unit
`Unit
`
`-
`
`25
`r215
`
`
`
`
`
`
`
`Robust
`Robust
`Watermark
`-EN1;
`Watermark 4-EN1
`Insertion
`Insertion
`
`
`
`
`
`
`
`
`
`FROM
`FROM
`120
`120
`Request 180
`Request 180
`Client
`Client
`Identifier
`Identifier
`(CPUID)
`(CPU_ID)
`Order Info
`
`
`
`
`
`85
`}185
`
`•
`
`REC_ID
`
`/
`
`280
`
`Fast Watermark
`Fast Watermark
`280
`Insertion
`Visual/Perceptual
`Visual/Perceptual
`Scrambling
`Scrambling
`260
`260
`
`Disting
`Data Scrambling
`(Encrypt)
`C
`Er
`270
`
`SERVER
`SERVER
`PLATFORM
`PLATFORM
`
`110
`10
`
`Delivered
`Delivered
`Content
`Content
`290
`290
`
`Process Control Logic
`210
`
`EN1 EN2 EN3 EN4 EN5 EN6
`
`Compression
`Unit
`
`235
`EN3
`
`240
`
`K Content
`CD
`r Memory
`t
`200 Unit
`
`EN4
`
`ENS
`EN5-0.
`
`
`
`
`
`Client-Based
`Client-Based
`Information
`Information
`
`250
`
`251
`252
`
`85
`
`KEY
`KEY1
`
`
`
`
`
`KEY1
`EN6
`EN6-10.
`
`
`
`185 /
`
`
`
`Authentication
`Authentication
`Check
`Check
`(CPUIDs, REC IDs,
`(CPUJ:Ds, REC_1D
`etc.)
`etc.)
`
`
`
`Key
`Key
`Generation
`Generation
`(Mapping
`(Mapping
`Function)
`Function)
`255
`255
`
`KEYS 250
`KEYS 250
`KEY
`KEYI
`
`251
`25
`
`KEY1
`KEY
`
`252
`252
`
`
`
`
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0003
`
`

`

`U.S. Patent
`U.S. Patent
`
`Dec. 23, 2003
`Dec. 23, 2003
`
`Sheet 3 of 9
`Sheet 3 of 9
`
`US 6,668,246 B1
`US 6,668,246 B1
`
`
`
`0 MPEG Video Content Delivery System
`
`300
`
`380
`
`Fr4
`
`370
`
`11 0 oOr,
`
`0, 0
`
`I0
`
`/ 0
`/ 0
`
`382
`
`381
`v. DataScrambling
`gi
`Key I--
`Data Scrambling
`Visual Scrambling
`330-
`Visual Scrambling is...N-
`-
`gi
`Source
`340
`ostern
`go
`Fingerprinting
`340
`Fingerprinting
`DestinationL_
`360
`
`320 —
`
`Encode
`
`Fingerprint I
`
`Watermarking Message
`Watermarking Message
`
`350
`350
`
`FIG 3
`FIG, 3
`
`310
`510
`311
`3.11
`
`312
`312
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0004
`
`

`

`Waled *S11
`
`6 JO 17 lamIS
`
`HI 917Z`899`9 Sfl
`
`FIG, 4
`
`. CONTROL
`
` 0
`
`120
`
`PLATFORM
`CLIENT
`
`450
`
`PLAYER
`CONTENT
`
`( 490
`
`EXTRACTION 440
`
`WATERMARK
`
`DESCRAMBLING 430
`VISUAL/PERCEPTUAL
`
`420
`
`DATA DESCRAMBLING
`
`410
`UNIT
`
`
`
`•
`
`MEMORY
`
`(CONTENT
`
`290
`
`1470
`
`471
`
`KEY
`
`KEY
`
`471
`
`472
`
`460
`
`FUNCTION
`MAPPING
`
`11(114S
`(470
`
`AUX. INFO
`
`CPU ID
`
`150
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0005
`
`

`

`U.S. Patent
`Waled *S11
`
`Dec. 23, 2003
`
`6 JO S lamIS
`Sheet 5 of 9
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`
` IGC4,11GB15
`
`0:43
`
` 1
`
` IMPEG-2
`
` IType: P
`
` !Frame: rams (Time: 1134)
`
` 'FPS: 303111927
`
`Re
`
`1
`
`FIG. 5
`
`Stream Navigation
`
`500
`
`??? TET
`
`OK
`
`pi
`
`
`
`aInvalid MPEG stream or incorrect key
`
`MPL error
`
`-0101P
`
`Y U V F.:7-02.i4,
`
`E
`
`e 0-0+1 I P B
`File View Help
`
`synergy_outfic_key1234.mpg - Player
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0006
`
`

`

`Poled *S11
`U.S. Patent
`
`6 JO 9 loolIS
`
`iti 917e899`9 Sa US 6,668,246 B1
`
`li WI AGEP 5
`
`NO
`
`I
`
`3 MPEG-2
`
`I Tre, P
`
`1.134)
`
`'Frame: ono (rtrne:
`
`
`
`[FPS: 30.71/19.27
`
`Ifs
`
`FIG. 6
`
`.•...'"°"<#)
`
`....1
`
`'''''
`
`_--.''
`
`."......'
`
`......
`
`.4.' \
`
`........
`
`-?..../
`
`6
`
`((4
`
`Stream Navigation
`
`--N
`
`1-jc3 2i
`
`dor
`
`-----,
`
`2C0
`CO
`
`,#),/
`
`ocoo 05
`
`orzikete, -
`NII,14/11186,1
`
`..„,,
`
`r
`
`qt
`
`
`
`Iliad ar
`
`,,
`
`111111
`
`111141
`
`117
`
`lilt,
`1411
`
`1....
`
`11111111,4
`
`440
`
`, ..
`
`V, -0101
`
`r
`
`',..
`
`. ,r...........
`
`1
`
`i
`
`l
`
`Mil
`
`
`
`,
`
`I
`
`il
`
`f
`
`MI
`*11/4
`
`lik
`
`kit IBM MIMI i
`
`10111
`
`01,
`
`liariiiii1
`
`I
`
`1:
`
`i
`
`Ile°
`
`ill
`
`It
`
`ii
`
`li
`
`laill
`
`110,11
`
`0.
`
`Et 11/Z0=
`
`k
`
`I la
`
`ilk
`
`1!7777-
`
`"17
`
`1.1;"""W
`
`lt.:11
`
`4;
`
`k#
`
`gli
`
`gigli
`
`_........, _ ,.. if
`.111 i> El +1 I P B YIU V Li j
`
`frii;;A:morgivitig
`
`File View Help
`
`.v":',G synergy_aut_sc_key1 234.mpg - Player
`
`
`
`
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0007
`
`

`

`Juaied 'S11
`U.S. Patent
`
`6 JO L lamIS
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`
`-,
`s,
`...
`
`LA
`
`\\,..
`
`—ICA Z
`
`
`
`ilii
`
`Cancel
`
`OK
`
`700
`KeY: 1
`
`y
`
`4zZ,------,.. /./
`
`Descrambling key
`
`-
`
`1101:30,561.5
`
`3676
`
` I
`
` I 14PEG-2
`
`ITyPel
`
`'Frame: 506035 (Time: 1.134)
`
`I IPS: 30.71/1927
`
`I
`
`•
`
`•
`
`i
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`!
`
`1
`
`11
`
`1.
`
`.
`
`t
`
`l
`
`I
`
`„
`
`Stream Navigation
`
`(Ready
`
`,
`
`n
`
`FIG. 7
`
`N.
`N.
`
`,...
`
`.. _
`
`C°
`
`)D°
`
`*"..
`
`.....--
`
`CA
`
`ii
`
`-7.1
`
`.....
`,411
`
`1.
`
`C
`
`4
`
`49
`
`"
`
`j
`„.......
`
`--.---'
`I P 8 YUI/F101 d 2,1-Acip
`
`elarMalU ali non*
`ili. ill: "mar Jr
`__ , „„......,,
`
`fa or 1.e.o...'"-
`
`I I iiMile MOW
`ill
`iiii :ill anises,
`iii ism kalif /
`6:::::F. :Was/
`ri,-;;;;;;;;Hrom
`air it
`IS:VX....ZIL'a al fif
`
`1
`
`Voi)
`
`F ile View Help
`Wm
`U synergy_out_vscfp_nods_key1234.mpg - Player
`
`4'
`1.
`
`iiirk
`
`00.111111.
`
`IN
`
`...0
`
`'
`
`.......t__ _
`
`HSI
`..4?!..1-"P-----zillti
`- - . . .1 4 ;0 4 ,i 1_ "
`Aiiiiiiii.P5
`lijirrear.91!
` AO a. il r 9 lir
`
`* i0.
`
`+1
`
`EJI>111
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0008
`
`

`

`U.S. Patent
`Waled °S'Il
`
`Dec. 23, 2003
`
`6 JO 8 laNS
`Sheet 8 of 9
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`
`Asf
`
`I
`
` I GDI,RGB15
`
`316x6
`
`J
`
`II MPEG-2
`
`I [Type: B
`
`3.
`
`IfFrame: WOO (T
`
`I n
`
` IFPS: 17
`
`I Reach,
`
`)
`
`FIG. 8
`
`r---__7-----
`i ______
`-_-:.:-.---- --•\
`
`Stream Navigation
`
`(
`
`\:-..,....\_,,,_\
`
`1
`
`\
`
`Y
`
`/
`
`) e) )
`
`I
`
`0 0 r\
`
`<->)
`
`I I 1
`
`I
`
`800
`
`Cool!
`
`Created on Katmai A
`Copyright information: watermark not found
`
`Recipient information:
`
`Extracted watermarks
`
`1/1„10°°
`
`i.c..•
`
`l'
`
`72"L
`
`i
`
`_-----
`
`/
`
`;, -%''`-•
`
`,,,,i ._,:i.%,
`
`—
`
`--"---::-------"-----
`—.
`
`-
`
`Z
`
`
`
`Y U V 1: ELLI 14, ^01©l P
`
`I P B
`
`I> 0 +1
`
`6
`
`File View Help
`mi'G synergy_out_vecip_nods_nokey.mpg - Player
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0009
`
`

`

`U.S. Patent
`Waled *S11
`
`6 JO 6 lamIS
`
`US 6,668,246 B1
`HI 917Z`899`9 Sfl
`
`FIG, 9
`
`6 91-7
`
`PLAYER
`CONTENT
`
`270
`
`SCRAMBLING
`
`DATA
`
`260
`
`SCRAMBLING
`PERCEPTUAL
`
`VISUAL/
`
`280
`
`INSERTION
`
`WATERMARK
`
`FAST
`
`DESCRAMBLING
`
`DATA
`
`SCRAMBLING
`
`DATA
`
`CONTENT
`
`CONTENT
`
`900 -\
`
`KEY 2
`
`KEY I
`
`410
`UNIT
`
`MEMORY
`
`120
`
`JQ
`
`PLATFORM
`CLIENT
`
`PLATFORM
`SERVER
`
`KEY
`
`INSERTION
`
`WATERMARK
`
`026
`
`920
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0010
`
`

`

`US 6,668,246 B1
`US 6,668,246 B1
`
`1
`1
`MULTIMEDIA DATA DELIVERY AND
`MULTIMEDIA DATA DELIVERY AND
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`
`BACKGROUND
`BACKGROUND
`
`2
`2
`FIG. 3 is an embodiment of a screen menu produced at the
`FIG. 3 is an embodiment of a screen menu produced at the
`Server platform for Selecting the origin of the content and the
`server platform for selecting the origin of the content and the
`level of access control based on the Selected content pro
`level of access control based on the selected content pro-
`tection mechanisms.
`tection mechanisms.
`FIG. 4 is an illustrative block diagram of an embodiment
`FIG. 4 is an illustrative block diagram of an embodiment
`of a client platform of the content distribution system of
`of a client platform of the content distribution system of
`FIG. 1.
`FIG. 1.
`1. Field
`1. Field
`FIG. 5 is an embodiment of a screen display produced by
`FIG. 5 is an embodiment of a screen display produced by
`The present invention relates to the field of data security.
`The present invention relates to the field of data security.
`the client platform of FIG. 4 when the content client
`More particularly, this invention relates to a platform and
`the client platform of FIG. 4 when the content client
`More particularly, this invention relates to a platform and
`10 platform is unable to pass a first level of access control.
`platform is unable to pass a first level of acceSS control.
`corresponding method for protecting content through mul
`corresponding method for protecting content through mul-
`tiple content control.
`FIG. 6 is an embodiment of a Screen display featuring
`tiple content control.
`FIG. 6 is an embodiment of a screen display featuring
`degraded digital content produced by the client platform of
`2. General Background
`degraded digital content produced by the client platform of
`2. General Background
`FIG. 4 when the client platform is unable to pass a second
`FIG. 4 when the client platform is unable to pass a second
`For over fifty years, the entertainment industry has pro
`For over fifty years, the entertainment industry has pro-
`level of acceSS control.
`level of access control.
`Vided audio-visual information to the general populous in
`vided audio-visual information to the general populous in
`FIG. 7 is an embodiment of a screen display featuring a
`the form of television programming. When transmitted in an
`FIG. 7 is an embodiment of a screen display featuring a
`the form of television programming. When transmitted in an
`user identification window that prompting input of user
`analog format Such as National Television Systems Com
`user identification window that prompting input of user
`analog format such as National Television Systems Com-
`information before removing visual degradation from the
`mittee (NTSC) or Phase Alternating Line (PAL), this pro
`information before removing visual degradation from the
`mittee (NTSC) or Phase Alternating Line (PAL), this pro-
`digital content.
`gramming is Somewhat protected due to the inherent nature
`digital content.
`gramming is somewhat protected due to the inherent nature
`of analog signaling. For example, analog Signals are trouble
`FIG. 8 is an embodiment of a screen display featuring a
`of analog signaling. For example, analog signals are trouble-
`FIG. 8 is an embodiment of a screen display featuring a
`fingerprinting menu to provide ownership information con
`Some to illicitly copy and redistribute. Also, the recorded
`some to illicitly copy and redistribute. Also, the recorded
`fingerprinting menu to provide ownership information con-
`copies have poorer image quality than the original program
`cerning the digital content prior to playback on the content
`copies have poorer image quality than the original program-
`cerning the digital content prior to playback on the content
`ming.
`client platform.
`ming.
`client platform.
`Due to advances in digital processing technology and
`FIG. 9 is an illustrative block diagram of a second
`Due to advances in digital processing technology and
`FIG. 9 is an illustrative block diagram of a second
`acceptance of the Internet, digital content distribution is now
`embodiment of the content distribution system of FIG. 1.
`25
`acceptance of the Internet, digital content distribution is now
`25 embodiment of the content distribution system of FIG. 1.
`growing in popularity. Presently, original equipment manu
`growing in popularity. Presently, original equipment manu-
`facturers (OEMs) are providing personal computers with
`DETAILED DESCRIPTION
`DETAILED DESCRIPTION
`facturers (OEMs) are providing personal computers with
`open, programmable architectures that are capable of receiv
`open, programmable architectures that are capable of receiv-
`The present invention relates to a platform and corre
`The present invention relates to a platform and corre-
`ing and/or transmitting audio-Visual information in a digital
`ing and/or transmitting audio-visual information in a digital
`sponding method to protect content from unauthorized
`sponding method to protect content from unauthorized
`format. In many instances, the digitized audio-visual infor
`format. In many instances, the digitized audio-visual infor-
`observation and/or manipulation through hardware-based
`observation and/or manipulation through hardware-based
`mation is encrypted before transmission and decryption
`mation is encrypted before transmission and decryption
`identification and a variety of content protection mecha
`identification and a variety of content protection mecha-
`upon receipt. Thus, most conventional personal computers
`upon receipt. Thus, most conventional personal computers
`nisms. Selected combinations of content protection mecha
`nisms. Selected combinations of content protection mecha-
`only rely on a single content protection mechanism (e.g.,
`only rely on a single content protection mechanism (e.g.,
`nisms combined with hardware-based identification can
`nisms combined with hardware-based identification can
`encryption and decryption) that either provides program
`encryption and decryption) that either provides program-
`provide different levels of access control. Each level of
`provide different levels of access control. Each level of
`ming in full quality or prevents the programming from being
`ming in full quality or prevents the programming from being
`acceSS control is associated with a unique degree of protec
`access control is associated with a unique degree of protec-
`displayed. Due to a lack of multiple content protection
`displayed. Due to a lack of multiple content protection
`tion against unauthorized observation and/or manipulation
`tion against unauthorized observation and/or manipulation
`mechanisms, conventional computers are unable to protect
`mechanisms, conventional computers are unable to protect
`of content. Hence, each level of acceSS control comprises:
`of content. Hence, each level of access control comprises:
`the decrypted, digitized Video from being observed by an
`the decrypted, digitized video from being observed by an
`one or more authentication checks of a client identifier
`one or more authentication checks of a client identifier
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`and/or auxiliary information associated with the content
`and/or auxiliary information associated with the content
`by a malicious program during playback. This has greatly
`by a malicious program during playback. This has greatly
`purchaser, content transformation and distortion; and pos
`purchaser; content transformation and distortion; and pos-
`impeded the expansion of digital content distribution.
`impeded the expansion of digital content distribution.
`sibly extraction of meta-data from delivered content.
`sibly extraction of meta-data from delivered content.
`Therefore, it would be desirable to create a platform and
`Therefore, it would be desirable to create a platform and
`It should be apparent that certain embodiments are
`It should be apparent that certain embodiments are
`method for protecting digital content through hardware
`method for protecting digital content through hardware-
`described in order to provide a thorough understanding of
`described in order to provide a thorough understanding of
`based identification and a variety of content protection
`based identification and a variety of content protection
`the invention; however, these embodiments should be con
`45 the invention; however, these embodiments should be con-
`45
`mechanisms to achieve a Selected level of access control.
`mechanisms to achieve a selected level of access control.
`Strued as illustrative in nature, not restrictive. Also, well
`strued as illustrative in nature, not restrictive. Also, well-
`known logic is not set forth in detail in order to avoid
`known logic is not set forth in detail in order to avoid
`unnecessarily obscuring the present invention.
`unnecessarily obscuring the present invention.
`In the following description, certain terminology is used
`In the following description, certain terminology is used
`to describe characteristics of the present invention as well as
`so to describe characteristics of the present invention as well as
`50
`cryptographic functionality. For example, a “platform com
`cryptographic functionality. For example, a "platform" com-
`prises an electronic device including a processor (e.g., a
`prises an electronic device including a processor (e.g., a
`microprocessor, a microcontroller, a state machine, etc.) and
`microprocessor, a microcontroller, a state machine, etc.) and
`a communication device to transmit and/or receive content.
`a communication device to transmit and/or receive content.
`Examples of a platform include, but are not limited or
`55 Examples of a platform include, but are not limited or
`55
`restricted to a computer (e.g., a laptop, desktop, hand-held,
`restricted to a computer (e.g., a laptop, desktop, hand-held,
`mainframe, etc.), communication equipment (e.g.,
`mainframe, etc.), communication equipment (e.g.,
`telephone, telephone with video display, etc.), or a set-top
`telephone, telephone with video display, etc.), or a set-top
`box (e.g., cable box, network computer, etc.).
`box (e.g., cable box, network computer, etc.).
`“Content” is generally defined as (i) data in the form of
`"Content" is generally defined as (i) data in the form of
`Video, images, audio, text, programs or any combination
`video, images, audio, text, programs or any combination
`thereof, and/or (ii) control information Such as Internet
`thereof, and/or (ii) control information such as Internet
`Protocol (IP) commands, identifiers and the like. The term
`Protocol (IP) commands, identifiers and the like. The term
`“quality” is a measure of the visual clarity of an image or
`"quality" is a measure of the visual clarity of an image or
`Video, audible clarity during audio playback, accuracy of
`65 video, audible clarity during audio playback, accuracy of
`65
`characters in text or programs as well as other factors.
`characters in text or programs as well as other factors.
`Content is considered “full quality” when its visual or
`Content is considered "full quality" when its visual or
`
`SUMMARY
`SUMMARY
`Briefly, one embodiment of the present invention relates
`Briefly, one embodiment of the present invention relates
`to a content distribution system. The content distribution
`to a content distribution system. The content distribution
`System comprises a Server platform and a client platform.
`system comprises a server platform and a client platform.
`The Server platform includes a memory unit to Store digital
`The server platform includes a memory unit to store digital
`content and access control logic to activate content protec
`content and access control logic to activate content protec-
`tion mechanisms that provide multiple levels of acceSS
`tion mechanisms that provide multiple levels of access
`protection to the digital content. In communication with the
`protection to the digital content. In communication with the
`Server platform, the client platform plays back Segments of
`server platform, the client platform plays back segments of
`the digital content at one of a plurality of quality levels.
`the digital content at one of a plurality of quality levels.
`BRIEF DESCRIPTION OF THE DRAWINGS
`BRIEF DESCRIPTION OF THE DRAWINGS
`The features and advantages of the present invention will
`The features and advantages of the present invention will
`become apparent from the following detailed description of
`become apparent from the following detailed description of
`the present invention in which:
`the present invention in which:
`FIG. 1 is an illustrative block diagram of a first embodi
`FIG. 1 is an illustrative block diagram of a first embodi-
`ment of a content distribution System.
`ment of a content distribution system.
`FIG. 2 is an illustrative block diagram of an embodiment
`FIG. 2 is an illustrative block diagram of an embodiment
`of a server platform of the content distribution system of
`of a server platform of the content distribution system of
`FIG. 1.
`FIG. 1.
`
`5
`
`1
`15
`5
`
`20
`
`0
`3
`
`35
`3 5
`
`
`4 0
`
`40
`
`60
`60
`
`DISH-Blue Spike-408
`Exhibit 1014, Page 0011
`
`

`

`1 0
`
`2
`
`40
`40
`
`US 6,668,246 B1
`US 6,668,246 B1
`
`5
`
`
`
`3
`4
`3
`4
`audible clarity is Substantially the Same as its original
`that have been authorized to retrieve content from server
`audible clarity is substantially the same as its original
`that have been authorized to retrieve content from server
`platform 110. To enhance security, it is contemplated that
`(master) form even though the underlining data may be
`platform 110. To enhance security, it is contemplated that
`(master) form even though the underlining data may be
`server platform 110 may store hash values of authorized
`different. Content is considered “lesser quality” when its
`server platform 110 may store hash values of authorized
`different. Content is considered "lesser quality" when its
`client identifiers. As a result, for the CPU ID
`visual or audible clarity is substantially inferior to the
`client identifiers. As a result, for the CPU ID
`visual or audible clarity is substantially inferior to the
`implementation, the client identifier of client platform 120
`original form.
`implementation, the client identifier of client platform 120
`original form.
`would have to undergo a one-way hash function prior to
`would have to undergo a one-way hash function prior to
`Additionally, a “communication link' is defined as one or
`Additionally, a "communication link" is defined as one or
`comparison. For the Secure platform Signature
`comparison. For the secure platform signature
`more mediums to transfer content from one location to
`more mediums to transfer content from one location to
`implementation, data associated with the Signature could be
`implementation, data associated with the signature could be
`another. Examples of a communication link include, but are
`another. Examples of a communication link include, but are
`recovered and compared with the pre-stored hash values. Of
`recovered and compared with the pre-stored hash values. Of
`not limited or restricted to electrical wire, fiber optic, cable,
`not limited or restricted to electrical wire, fiber optic, cable,
`course, in lieu of client identifiers, authentication checks
`course, in lieu of client identifiers, authentication checks
`wireless channel(s) established using infrared (IR) or radio
`wireless channel(s) established using infrared (IR) or radio
`may be performed on user information (e.g., passwords,
`may be performed on user information (e.g., passwords,
`frequency (RF) Signaling, a private local area network, a
`frequency (RF) signaling, a private local area network, a
`assigned recipient identification values, etc.) or even a
`assigned recipient identification values, etc.) or even a
`wide area network or even the Internet. A "mechanism”
`wide area network or even the Internet. A "mechanism"
`Software-based magic cookie.
`software-based magic cookie.
`includes a particular functionality performed through execu
`includes a particular functionality performed through execu-
`In the event that an authentication check fails, all Seg
`In the event that an authentication check fails, all seg-
`tion of Software and/or operation of hardware.
`tion of software and/or operation of hardware.
`ments of content 170 scheduled for playback at client
`ments of content 170 scheduled for playback at client
`1
`15
`With respect to cryptographic functionality, a “key” is
`5
`platform 120 (whether already delivered or not) would fail
`With respect to cryptographic functionality, a "key" is
`platform 120 (whether already delivered or not) would fail
`information used by a cryptographic function (e.g., Sym
`to play or cannot be played at “full quality until a Subse
`information used by a cryptographic function (e.g., sym-
`to play or cannot be played at "full quality" until a subse-
`metric function) for encryption and/or decryption. Herein,
`quent authentication check is Successful. This periodic con
`metric function) for encryption and/or decryption. Herein,
`quent authentication check is successful. This periodic con-
`each key is sized to be 160-bits in length, although any bit
`tent delivery technique constitutes an additional level of
`each key is sized to be 160-bits in length, although any bit
`tent delivery technique constitutes an additional level of
`Size may be used. A “one-way hash function' converts
`size may be used. A "one-way hash function" converts
`acceSS control.
`access control.
`content from a variable-length into a fixed-length with no
`content from a variable-length into a fixed-length with no
`In general, client platform 120 issues a request 180 for
`In general, client platform 120 issues a request 180 for
`ability to recover the variable-length content. Examples of a
`ability to recover the variable-length content. Examples of a
`content from server platform 110 via communication link
`content from server platform 110 via communication link
`one-way hash function include a Secure Hash Algorithm
`one-way hash function include a Secure Hash Algorithm
`160. Content request 180 is accompanied by client-based
`160. Content request 180 is accompanied by client-based
`(SHA-1) as specified a 1995 publication entitled Secure
`(SHA-1) as specified a 1995 publication entitled Secure
`information 185 needed by server platform 110 to identify
`information 185 needed by server platform 110 to identify
`Hash Standard FIPS 180-1 (Apr. 17, 1995). The term
`Hash Standard FIPS 180-1 (Apr. 17, 1995). The term
`the specific content ordered and to verify whether client
`25 the specific content ordered and to verify whether client
`25
`“secure' (and any other tense or form thereof) indicates a
`"secure" (and any other tense or form thereof) indicates a
`platform 120 and/or an intended recipient is authorized to
`platform 120 and/or an intended recipient is authorized to
`State where it is virtually computationally infeasible for an
`state where it is virtually computationally infeasible for an
`receive that content. In one embodiment, this client-based
`receive that content. In one embodiment, this client-based
`unauthorized individual to gain access to content or other
`unauthorized individual to gain access to content or other
`information 185 comprises (1) a client identifier, (2) order
`information 185 comprises (1) a client identifier, (2) order
`data in a plain text format.
`data in a plain text format.
`information to identify the content ordered by the content
`information to identify the content ordered by the content
`purchaser, (3) optional auxiliary information Such as a
`Referring to FIG. 1, an illustrative block diagram of a first
`Referring to FIG. 1, an illustrative block diagram of a first
`30

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket