`
`March 19, 2019
`
`THIS IS TO CERTIFY THAT ANNEXED IS A TRUE COPY FROM THE
`RECORDS OF THIS OFFICE OF THE FILE WRAPPER AND CONTENTS
`OF:
`
`APPLICATION NUMBER: 60/147,134
`FILING DATE: August 04, 1999
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0001
`
`
`
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET(Small Entity)
`This is a requestforfiling a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53 (c).
`
`_«
`
`Docket Number:
`
`066112.0133
`
`=
`
`
`
`INVENTOR(S)/APPLICANT(S)
`
`
`
`MOSKOWITZ
`BERRY
`
`
`
`Please type a plus sign(+) inside this box. —» [+]
`0 e799
`Mit
`66/40/8
`Wa
`
`
`ftayy
`
`
`Miami, Florida USA
`Scott A.
`
`
`
`Albuquerque, New Mexico USA
`Michael
`
` 74MW
`
`r| Additional inventors are being named on page 2 attached hereto 60 wh
`4c8
` TITLE OF THE INVENTION(280 characters max)
`
`A SECURE PERSONAL CONTENT SERVER
`
`
`
`CORRESPONDENCE ADDRESS
`
`Direct all correspondence to:
`
`Place Customer Number
`
`
`J Customer Number
`———
`Bar Code Labelhere
`
`
`OR
`Firm or
`
`
`xX
`
`
`Individual Name|Floyd B. Chapman, Esq.
`
`
`
`
`Baker & Botts, L.L.P.
`
`
`1299 Pennsylvania Avenue, N.W.
`
`
`
`
`Washington
`ZIP
`20004-2400
`
`
`
`202/639-7890
`
`Telephone|202/639-7700
`
`ENCLOSED APPLICATION PARTS(checkall that apply)
`
`
`
`
`
`
`bd Specification
`NumberofPages
`[| Small Entity Statement
`Drawing(s)
`NumberofSheets
`[_] Other(specify)
`
`
`
`
`
`METHOD OF PAYMENTOFFILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT(check one)
`
`
`FILING FEE
`AMOUNT($)
`A check or moneyorderis enclosed to coverthefiling fees
`The Commissioner is hereby authorized to chargefiling fees or
`|
`$75.00
`]
`|
`credit any overpaymentto Deposit Account Number:
`
`
`
`
`
`The invention was made by an agency of the United States Government or under a contract with an agency of the United States Government.
`No.
`
`C] Yes, the nameof the U.S. Governmentagency and the Government contract number are:
`
`
`
`
`SIGNATURE Monde BP ehira August4, 1999 Date
`
`iA
`
`Respectfully submitted,
`
`
`
`
`
`TYPED or PRINTED NAME Floyd B. Chapman
`
`
`40,555
`REGISTRATION NO.
`(if appropriate) —
`
`TELEPHONE
`
`
`202/639-7700
`
`USE ONLY FORFILING A PROVISIONAL APPLICATION FOR PATENT
`SEND TO: Box Provisional Application, Assistant Commissionerfor Patents, Washington, DC 20231enheavO
`[Page 1 of
`]
`PISSMALUREVO4
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0002
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0002
`
`
`
`eeerrieIL2SBy
`
`
`i?
`*
`
`nrhkia“ea,
` araePy
`iiSaewTN
`
`August 4, 1999
`
`066112.0133
`
`Inventors:
`
`Scott Moskowitz & Michael Berry
`
`A Secure Personal Content Server
`
`Field of Invention
`The present inventionrelates to the secure distribution of digitized value-
`added information, or media content, while preserving the ability of publishers
`to make available unsecure versions of the same value-added information, or
`media content, without adverse effect to the systemssecurity.
`Authentication, verification and authorization are all handled with a
`combination of cryptographic and steganographicprotocols to achieveefficient,
`trusted, secure exchangeof digital information.
`
`Summary of the Invention
`Digital technology offers economies of scale to value-added data not
`possible with physical or tangible media distribution. The ability to digitize
`information both reduces the cost of copying and enables perfect copies: an
`advantage and a disadvantage to commercial publishers who face the real threat
`of unauthorized duplication of their value-added data content. Where cost
`reduction is an important business consideration, securing payment and
`authentication of an individual copy of digital
`information, such as media
`content, presents unique opportunities to information service and media content
`providers with the appropriate tools. The present invention seeks to leverage the
`benefits of digital distribution to consumers and publishersalike, while ensuring
`the development and persistence of trust between these parties, or third parties
`involved, directly or indirectly, in a given transaction.
`In another approachthatis related to this goal, there are instances where
`transactions must be allowed to happen after perceptually-based [acoustic
`(hearing) /psychoacoustic (perceived hearing) or visual (viewing)/psychovisual
`(perceived viewing)] digital information can be authenticated. This type of
`verification will become increasingly important for areas where the distributed
`material relates more to a provided, trust-requiring transaction event. A number
`of examplesexist. These include virtualretailers (for example, an on-line music
`store selling CDs and electronic versions of songs); service providers (for
`example, an on-line bank or broker who performs transactions on behalf of a
`consumer); transaction providers (for example, wholesalers or auction houses).
`These parties rely on different authentication issues which can be separated and
`independently quantified or qualified by market participants in shorter periods
`of time under whatis described by the present invention.
`is
`Any party who must establish authentication of information that
`perceptually-observed, by nature of media content-richness, by users or market
`
`DCOI:229139
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0003
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0003
`
`
`
`participants. This information is typically digitized, and may be perceptually
`based in nature, can easily be copied and redistributed, negatively impacting
`buyers and sellers or other market participants, in confusing authenticity, non-
`repudiation, limit of liability and other important “transaction events”.
`In a
`networked environment, transactions and interactions occur over a transmission
`line between a buyer and seller, or networked groups of users (Internet
`communities, closed electronic trading environments, etc.). While network
`effects may lead to increasing economic utility of the underlying value-added
`information:in the absolute instantaneous piracy can render the economic value
`of the good and services being offered to zero, or less than optimal profit
`positions.
`Related situations extend to instances ranging from theability to provably
`establish the “existence” of a virtual financial institution to determining the
`reliability of an “electronic stamp”. The present invention seeks to improve on
`the existing prior art by describing optimal combinations of cryptographic and.
`steganographic protocols
`for “trusted” verification, confidence and non-
`repudiation of perceptually-based, digitized representations of the actual seller,
`vendoror another associated institution which may not be commercial in nature
`(confidence building with logo’s such as the SEC, FDIC, Federal Reserve, FBI,etc.
`apply). To the extent that an entity playsa role in purchase decisions madeby a
`consumer of goods and services that are not physically present for the actual
`transaction, the present invention has a wide range of beneficial applications.
`One is enabling independenttrust based on real world representations that are
`not physically available to a consumeror user. Theability to match information
`needs between buyers andsellers that may not be universally appealing or cost
`effective in given market situations. These include auction models based on
`recognition of the interests or demand of consumers and market participants—
`and servesto assist in narrowing and focusing profitable trade between parties.
`Another is to establish limits on the liability of such institutions and profit-
`seeking entities, such as insurance providers or credit companies. These vendors
`lack appropriate tools for determining intangible asset risk and exposure, value-
`added information is such an asset. By encouraging separate and distinct “trust”
`arrangements over an electronic network, profitable, market-based relationships
`can result.
`Utilizing the present invention in one of its many embodiments,efficient,
`openly accessible markets for trade-based information can be made possible.
`Existing transaction security, including on-line credit card purchasing, electronic
`cash or its equivalents, wallets, electronic tokens, etc. which primarily use
`cryptographic techniques to secure a transmission channel but are not directly
`associated or dependent on the value-added information being transacted or
`purchased fails to meet this valuable need. The present invention proposes a
`departure from the prior art by separating transactions from authentication of
`digitized data. These data may include videos, songs, images,electronic stamps,
`electronic trademarks, electronic logos used to ensure membership in some
`
`DCO1:229139
`
`9.
`
`r=
`
`“HaeUeofTe,»
`shaieAEtenEe
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0004
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0004
`
`
`
`institutional body whose purposeis to assist in a dispute, limit liability and
`provide indirect guidance to consumers and marketparticipants, alike.
`Buyers’ should still beware: but with an increasingly anonymous
`marketplace, the present invention offers invaluable embodiments to accomplish
`“trusted” transactions in a more flexible, transparent manner while enabling
`marketparticipants to negotiate terms and conditions. Negotiation should not
`only be seller driven through predetermined usage rules or parameters,
`especially as the information economy offers potentially many competitive
`marketplaces in which to transact, trade or exchange among businesses and
`consumers.
`As
`information grows exponentially,
`flexibility becomes an
`advantage to market participants, in that they need to screen,filter and verify
`information in making a transaction decision. Moreover, the accuracy and speed
`at which decisions can be madereliably enables confidence to grow with an
`aggregate of “trusted transactions”.
`“Trusted transactions” beget
`further
`“trusted transactions” through experience. The present invention also provides
`for
`improvements over
`the prior art
`in the ability to utilize different
`independently important “modules” to enable a “trusted transaction” using
`competitive cryptographic and steganographic elements, as well as being able to
`support a wide variety of perceptually-based media and information formats.
`The envisioned system is not bound by a proprietary means of creating
`recognition for a good or service, such as that envisioned in existing closed
`system.
`Instead, the flexibility of the present invention’s architecture is sure to
`enable a greater and more diverse information marketplace.
`The present invention is not a “trusted system”, per say, but “trusted
`transactions”are enabled, since the same value-added informationthat is sought
`maystill be in the clear, not in a protected storage area or closed, rule-based
`“inaccessible virtual environment”.
`A related additional set of embodiments regards the further separation of
`the transaction and the consumer’s identification versus the identification of the
`transaction only. This is accomplished through separated “trusted transactions”
`boundby authentication, verification and authorization in a transparent manner.
`With these embodiments, consumer and vendor privacy could be incorporated.
`Moresophisticated relationships are anticipated between parties, who can mix
`information abouttheir physical goods and services with a transparent meansfor
`consumers, who maynot be known to the seller, who choose notto confide in an
`inherently closed “trusted system” or provide additional personalinformation or
`purchasing information (in the form of a credit card or other electronic payment
`system), in advanceof an actual purchasedecision or ability to observe (audibly
`or visibly) the content in the clear. This dynamic is inconsistent with existing
`systems’ emphasis on access control, not transparent access to value-added
`information (in the form or goods or services), that can be transacted on an
`electronic or otherwise anonymousexchange.
`These embodiments may include decisions about availability of a
`particular good orservice through electronic means (recognition, search engine
`
`DCO] :229139
`
`3
`
`me
`bs
`=
`ate
`ee
`enegpm
`
`=
`
`
`
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0005
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0005
`
`
`
`
`
`function or find, so-called push, functions), such as the Internet, or means that
`can be modularized to conduct a transaction based on the present invention
`(such as WebTV, a Nintendo or Sony game console which can be networked,
`cellular phone, PalmPilot, etc.) that may have the capability of interconnections
`with a network of users (including sellers and consumers). Additionally,
`modularity of price and service desired by the consumer and available by the
`seller (fixed price, Dutch auction where the consumer fixes a price, auction where
`a marketof buyers and sellers can “decide” a price). Consumers may view their
`anonymous marketplace transactions very differently because of a lack of
`physical human interactions, but the present
`invention can enable realistic
`transactions
`to occur by maintaining open access
`and offering strict
`authentication and verification of value-added information. This has the effect of
`allowing legacyrelationships, legacy information, and legacy business models to
`be offered in a manner which moreclosely reflects many observable transactions
`in the physical world. The tremendous benefits to sellers and consumers is
`obvious but the ability to isolate and quantify aspects of an over transaction by
`module potentially allows for better price determinations of intangible asset
`insurance, transaction costs, advertising costs, liability, etc. which have physical
`world precedent. In some embodiments, standardization or government support
`are surely anticipated, as the physical world will undoubtedly continue to make
`legal determinations in transactions underdispute.
`An important area of the prior art is discussed under the heading of
`“trusted systems” which architecturally enable users, almost always
`the
`publisher or rights owner, to set rules which bind digitized information copies to
`an inflexible and “containerized” architecture. System security is typically based
`on persistence of access control over the content in a variety of implementations,
`with access and subsequent usage beingtightly tied into the distribution system.
`The prior art has many disclosures which fail to mimic the real world and, in
`effect, eliminate impulse buying, sampling,re-creation of existing works, making
`a transaction more transparent to consumers, providing for support of both
`controlled and uncontrolled value-added information within the same system,
`andother importantaspects of information distribution that cannot be predicted
`in advance of more open consumeraccess or recognition of the information in
`question. See US Pat. No. 5,428,606 for a discussion on democratizing digital
`information exchange between publishers and subscribers of said information.
`A goal for providers of value-added content is to maximize profits for the
`sale of their content. Marketing and promotion of this contentstill requires
`costly advertising that will not be eliminated with an ever-increasing amount of
`information vying for consumers and other market participants attention.
`Pricing, when inflexible, and expense limitations in creating recognition of a
`particular piece of value-added content are inherent to the nature of a market for
`speculatively valued goods. Where such markets have participants, both buyers
`and sellers and their respective agents, with access to the same information in
`real time, market mechanismsefficiently price the market goods or services.
`
`DCO) :229139
`
`_4-
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0006
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0006
`
`
`
`These markets are characterized by “price commoditization” so buyers and
`sellers are limited to differentiating their offerings by selection and service. If the
`markets are about informationitself, it has proven more difficult to accurately
`forecast the market price where sellers maximize their profits. Quality and
`quantity provide different evaluation criteria of selection and service relating to
`the value-added information to be traded. The present invention regards a
`particular set of implementations of value-added content security in markets
`which mayinclude unsecure and secure versions of the same value-added data
`(such as songs, video, research, pictures, electronic logos, electronic trademarks,
`value-added information,etc.).
`One fundamental weakness with systems knownto those skilled in the art
`is the lack of mechanisms to ensure that buyers and sellers can reach pricing
`equilibrium. This deficit is related to the “speculative”, “fashion”, “vanity”
`aspect of perceptual content (such as music, video, and art or some future
`recognition to purchasers). For other goods andservices being marketed to an
`anonymous marketplace, market participants may never or choose never to see
`an actual
`location with which the transaction is being sought. A physical
`location may simply not exist. There are number of such virtual operations in
`business today who would benefit from the improvements offered under the
`present system.
`The present invention also seeks to provide improvements to the art in
`enablinga realistic modelfor building trust between parties (or their agents) not
`ina “system”, per se. Becauseprior art systemslack any inherentability to allow
`for information to flow freely to enable buyers and sellers to react to changing
`market conditions, as a matter of maintaining “security”. The present invention
`can co-exist with these “trusted systems” to the extent
`that all market
`participants in a given industry haverelatively similar information in which to
`price value-added data.
`The improvement over such systems, however,
`addresses a core features in most data-added value markets: predictions,
`forecasts, and speculation over the value of information is largely a unsuccessful
`activity for buyers andsellers alike. The additional improvementisthe ability to
`maintain security even with unsecure or
`legacy versions of value-added
`information available to those who seek choices that
`fit
`less quantitative
`criteria—“aesthetic quality” of
`the information versus “commercial price”.
`Purchase or transaction decisions can be made first by authenticating an
`electronic version of a song, image, video, trademark, stamp, currency,etc.
`Additional anticipated improvements are the ability to support varying
`pricing models such as auctions that are difficult or impossible to accomplish
`under existing prior art that leaves all access and pricing control with the seller
`alone. As well, the separation of the transaction from the exchange of the value-
`added information, giving more control
`to buyers over their identities and
`purchasing habits, both sensitive and separately distinct forms of “unrelated”
`value-added information. Essentially, no system known in the art allows for
`realistic protocols to establish trust between buyers andsellers in a manner more
`DCOI;229139
`
`-5-
`
`sl
`bs
`=
`Md
`;
`=
`-
`
`
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0007
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0007
`
`
`
`at,fl
`
`“HAtee,
`
`avnHyUDBetL
`oettyenn
`orae
`
`
`closely reflecting actual purchasing behavior of consumers andchangingselling
`behaviorof sellers. The goal in such transactionsis the creation of trust between
`parties as well as “trusted relationships” with those parties. The present
`invention is an example of one such system for media content where the
`“aesthetic” or “gestalt” of the underlying content and its characteristics is a
`componentof buying habits. Without an ability to open distribution systemsto
`varying buyers andsellers, media content maybepriced at less than maximum
`economic value and buyers may be deprived of a competitive, vigorous
`marketplace
`for
`exciting media
`content
`from many different
`creative
`participants.
`To the extent that recognition (“recognition, recognition, recognition”)
`plays such a key role in an information economy, value-added data should beas
`accessible as possible to the highest number of market participants in the
`interests of further creativity, competitive marketplace for goods and services.
`This is to the benefit of both buyers andsellers as well as the other participants in
`such an economic ecosystem.
`The Internet and other
`transmission-based
`transactions with unknown parties presents a number of challenges
`to
`information age vendors—continuing to develop customerrelations, trust and
`profitable sales of their products and services. While the information economy,if
`largely an anonymous marketplace,
`is making it much harder to identify
`consumers “and” sellers alike: a fundamental problem for an information
`economy. The present invention provides remedies to these weaknesses versus
`other related systems described in the priorart.
`relies on
`One approach U.S. Pat. No. 5, 892, 900 to Ginter et al.,
`“universal” adoption of a “virtual distribution environment” (VDE) leaving all
`control over distribution to the publisher, without any flexibility provided to the
`consumer. The limited flexibility that exists is predetermined by theseller.
`While in theory this approach appears to offer important advantages in markets
`where price and product information may be readily available and known to
`market participants (such as commodities), often the sale and exchange of
`“value-added information”,itself, is speculative. Absent open accessto said data
`by consumers or other market participants
`(aggregators, distributors,
`wholesalers,
`financial
`interests, etc.)
`leaves a condition of
`indeterminable
`valuation, or even underexploitation of the intangible information asset.
`While Ginter et al. discusses “persistence” of the separation between
`rights applications and the foundation of the VDE, whatresults is a strict set of
`control which unnecessarily limits potentially useful and economically beneficial
`access by those potential purchasers who do not chooseto rigidly make decision
`solely on price. The pricing structure has no relationship with the underlying
`value-added data, only the predetermined rules governing the use of the content
`is anticipated. Additionally, the architecture replaces one set of controlled
`distribution with another in the form of a proprietary VDE distribution channel
`or channels; preservation of a “virtual black box” limits the free flow of content,
`
`DCO01:229139
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0008
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0008
`
`
`
`and information about that content, that actually exists to the commercial benefit
`of media content owners.
`The present invention concernsitself with higher economicefficiencies by
`preserving an open architecture that is focused primarily on authentication,
`verification and authorization of value-added information: access restriction is
`not a primary goal. Thus, failure of authentication or verification do not
`constitute a security failure within the context of the present invention as it
`would with Ginter el al. Moreover, legacy media which may exist as physical
`media such as CDs, LaserDiscs, MiniDiscs, photographs, PhotoCD, VHS,Digital
`Video, etc., pre-recorded or otherwise, or other unsecure tangible recorded
`media is not excluded by fiat. Consumers are given flexibility in their choice of
`recording media, content characteristics such as quality, time of delivery, etc.:
`publishers arestill assured payment and also benefit from better information
`flow to and from the marketplace. This is not possible with Ginter et al. because
`information is used and accessed in only “authorized ways”.
`Anotherseries of related systems, are US Pat. No. 5,715,403, US Patent No.
`5,634,012, US Pat. No. 5,629,980 all to Stefik, propose associations between
`“usage rights” and a digital work. While these system offer arguably more
`flexibility in enabling different
`rule sets
`for different proposed digital
`distribution channels, all digital works have permanently attached rights. And
`all transactions must be coupled to a repository. It is not clear that affixing rights
`to content necessarily aides sellers or owners of content, especially if the
`consumers or other participants in the market find use in the information not
`knownbytheseller at the time rights were affixed. Unlike, physical media sold
`and exchanged, limited only by the “format” (CD, MiniDisc, cassette, LP, for
`examples in music) or “player” (respectively, CD player, MiniDisc player,
`cassette player, LP player, for examples in music, more generally a reader which
`connects to a transducer) chosen by consumers, the digital works must always
`pass through a repository. While this favors owners of digitized media, the
`proposed technologies cannot handle any legacy media or media which will
`undoubtedly remain unsecure even with an increasing number of digitized
`works being madeavailable to consumers. Not all publishers chooseto restrict
`their data, but the format must be readily acceptable for consumers to make
`purchasedecisions. Additionally such transactions create situations where the
`information in the digital work has the appearance of being obscured by the
`rights and usage rules attached and coupled to a repository. The present
`invention alleviates the main concern of publishers, that they get paid for their
`value-added data while seeking to maximizetheir profits, because the security is »
`obscured through steganography (digital watermarkingin particular), and only
`authentication protocols are necessary to effect a transaction.
`This leaves
`consumers less suspect of the system or seller and enables the developmentof
`relationships based on trust between parties, not between a consumer and: a
`closed system.
`
`DCOI:229139
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0009
`
`seewaeayAtoe
`n*eaTe
`geWe,leait
`
`F:al
`
`2
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0009
`
`
`
`mewaeseed
`A:
`TeoAaa
`
`
`
`mnHall
`
`iyEyey,
`
`is not
`it wants to be free,
`that
`the nature of information,
`Simply,
`equivalentto the desire of creators of intellectual property (such as a copyrights,
`design, value-added datum) to maximize the commercial value of his work by
`economic incentives. But legal concepts such as “fair use”, “first sale doctrine”,
`and “copyright” are necessarily gray areas that should remain open so as to
`increase the potential growth in an information marketplace that is both robust
`and competitive; e.g., both buyers andsellers are satisfied. The present invention
`de-couples the value-added information media from the underlying distribution
`mechanism by emphasizing authentication, verification and authorization
`independent of the transaction mechanisms which are persistently included in
`the prior art. Consumers benefit with the present
`invention, because the
`processes envisioned more closely resemblereal world exchange of content and
`other value-added data. The prior art is limiting in that consumers are not
`trusted, trust
`is “held” or “escrowed” in an inflexible system.
`Instead of
`relationships with consumers,
`these systems mandate relationships with
`protocols.
`USPat. No. 5,638,443 and USPat. No. 5,530,235 bothto Stefik et al. seek to
`alleviate problems in determining the contents of value-added data and enabling
`a system of repository-stored “composite digital works”. The deficiencies of
`these two applicationslie in the restriction of access by consumers to media or
`other value-added data, and prevent legacy media or unsecure, non-content
`revealing storage media to be inaccessible without any increased benefit to any
`given publisher. For recognizable digital works, these complementary systems
`may offer some limited benefits in access control, but they do not allow for
`interactions with unsecured or existing legacy mediafiles, as they exist in the real
`world, or as contemplated under the present invention. Further, the system may
`give the appearance to consumers that they cannot be trusted. The present
`invention seeks to “keep honest people honest”.
`Another approach which is arguably less stringent than the “trusted
`systems” and “secure containers” in the art is that disclosed in US Pat No.
`5,673,316 to Auerbach et al. Auerbach et al. disclose a means for restricting
`access to digital information by breaking information parts and associating
`encryption keys for these parts. The parts form a cryptographic envelope with
`related part encryption keys (PEKs) which predetermine access, control and
`distribution of the digital data, based on pre-determined terms and conditions.
`In essence, Auerbachis using the “open nature” of public key cryptography and
`its “scalable” infrastructure but based on pre-processing of data to enable
`secured access.
`The
`implicit assumption is
`that
`sellers benefit
`from
`“superdistribution”, meaning so long as a rights owneris paid no other factor in
`a transaction for media is valuableto the seller. The present invention seeks to
`bring buyers andsellers closer together for beneficial economic relationships, not
`distance them with predetermined rules for purchase and use. Because the PEKs
`must be permanently associated with the digital information, again, as with the
`above mentionedprior art, legacy media in pre-recorded format (CD, Laser Disc,
`
`DCO] :229139
`
`-8-
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0010
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0010
`
`
`
`PhotoCD, Nintendo, etc.) cannot be effectively leveraged, nor can unsecure
`media in the future coexist in a consistent manner to the benefit of both the
`publisher and consumer.
`It would not be possible to successfully authenticate
`the content unless all content passed through Auerbach et al.’s contemplated
`embodiments. While publishers may certainly choose to limit access to their
`value-added data, the present invention offers a unique meansto leverage the
`overall commercial value of such works by incorporating open authentication,
`verification and authorization protocols and allowing co-existence of legacy
`media. Moreover, the present invention does not changethefile’s format as does
`Auerback et al. The present invention accomplishes this with cryptographic (for
`confidence,
`authentication and data
`integrity)
`and steganographic
`(for
`tamperproofing,
`authentication
`and
`content-based
`embedding security)
`protocols seeking to isolate a transaction from exchange of value-added data at
`various content characteristic-based quality levels.
`Some further
`related prior art
`includes US Pat. No. 5,412,718 to
`Narasimhalu et
`al.
`disclose
`a means
`for utilizing
`storage medium
`“nonuniformities” which are processed as a signature for any particular storage
`medium andits subsequently generated cryptographic signature. Although this
`represents a form of copy protection security, more robust techniquesin theart,
`including those by the present
`inventor, are better able
`at
`securing,
`authenticating and maintaining content quality—namely digital watermarks.
`The present invention is not storage medium-based, but portable and scalable in
`authentication and distribution of value-added media. Bright el al. disclose, in
`US Pat. No. 4,262,329, means for maintaining all cryptographic processes in a
`secure “vault”. This example of prior art is morerestrictive than many “trusted
`systems” disclosures, and thus suffers from the same weaknesses described
`above. US Pat. No. 5,287,407 to Holmes suggests a means for software copy
`protection.
`To the extent
`that
`tools are now available to rid any non-
`cryptographically embedded data in a file without adverse repercussions is a
`weakness that
`is overcome with digital watermarking techniques for both
`content (digital sampled content) and functional software (zero error tolerance).
`The present
`invention relies on content quality degradation as well as
`verification of authentic value-added information as important
`facets
`in
`increasing the benefits of both buyers and sellers of value-added data. USPat.
`No. 5,191,573 and US Patent No. 5,675,734 both to Hair, describe a means for
`distributing audio or video signals.
`The present
`invention offers
`the
`improvement on this art, and related systems, in separating the transaction
`function from the delivery functions.
`The present
`invention also has
`mechanisms for ensuring payment, authentication of the content signal, and the
`ability to handle secure and unsecure information in a consistent, secure manner.
`The present invention is concerned with methods and systems which
`enable secure, paid exchange of value-added information, while separating
`transaction protocols. The present invention improves on existing means for
`distribution control by relying on authentication, verification and authorization
`
`DCO1:229139
`
`2s
`
`=jcywear
`sepyeateTt
`
`
` 2et
`
`Pi
`Sit
`Fi
`iare
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0011
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0011
`
`
`
`These
`that may be flexibly determined by both buyers and sellers.
`determinations may not need to be predetermined, although pricing matrix and
`varia