`
`PCT/US00/06522
`
`22
`
`13.
`
`A method of securing a data signal comprising:
`applying a data reduction technique to reduce the data signal into a reduced data
`signal;
`
`subtracting said reduced data signal from the data signal to produce a remainder
`
`signal;
`
`using a first cryptographic technique to encrypt the reduced data signal to
`produce an encrypted, reduced data signal;
`using a second cryptographic technique to encrypt the remainder signal to
`produce an encrypted remainder signal; and
`adding said encrypted, reduced data signal to said encrypted remainder signal
`to produce an output signal.
`The method of claim 13 wherein said first and second cryptographic techniques
`14.
`are identical.
`The method of claim 13 wherein at least one of said first and second
`cryptographic techniques is a watermarking technique.
`The method of claim 15, wherein at least one of the watermarks is embedded
`using at least one key.
`The method of claim 15, wherein at least one of the watermarks is embedded
`using a key pair.
`The method of claim 13 wherein at least one of said first and second
`cryptographic techniques is a scrambling technique.
`The method of claim 13 wherein one of said first and second cryptographic
`techniques is a watermarking technique and the other is a scrambling technique.
`The method of claim 13 wherein said first and second cryptographic techniques
`are identical.
`A system for securing a data signal comprising:
`means to apply a data reduction technique to reduce the data signal into a
`reduced data signal;
`
`15.
`
`16.
`
`17.
`
`18.
`
`19.
`
`20.
`
`21.
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1604
`
`
`
`WO 00/57643
`
`PCT/E/S00/06522
`
`23
`
`means to subtract said reduced data signal from the data signal to produce a
`remainder signal;
`means to apply a first cryptographic technique to encrypt the reduced data signal
`to produce an encrypted, reduced data signal;
`means to apply a second cryptographic technique to encrypt the remainder
`signal to produce an encrypted remainder signal; and
`means to add said encrypted, reduced data signal to said encrypted remainder
`signal to produce an output signal.
`The system of claim 21 wherein said first and second cryptographic techniques
`22.
`are identical.
`The system of claim 21 wherein at least one of said means to apply a first and
`second cryptographic technique utilizes a watermarking technique.
`The system of claim 21 wherein at least one of said means to apply a first and
`second cryptographic technique utilizes a scrambling technique.
`The system of claim 13 wherein said means to apply a first cryptographic
`technique is a means to apply a watermarking technique and said means to
`apply a second cryptographic technique is a means to apply a scrambling
`technique.
`
`25.
`
`23.
`
`24.
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1605
`
`
`
`WO 00/57643
`
`PCT/US00/06522
`
`ORIGINAL
`SIGNAL
`
`10
`
`1/5
`
`
`
` SUBTRACTION)
`-O
`20
`1ST DATA REDUCTION Fil°°
`
`20
`
`1ST DATA REDUCED
`SIGNAL
`
`30
`r
`
`01ST REMAINDER
`
`31
`/(1 is 2ND REMAINDER
`
`20 8 ( SUBTRACTION)
`*0
`21
`REDUCTIONhe101
`2ND DATA
`
`20
`
`21
`2ND DATA REDUCED
`SIGNAL
`
`28
`
`(n-1) DATA REDUCED SIGNAL
`a
` SUBTRACTION
`28
`0
`
`29
`
`—2-•8- nTH DATA REDUCTION F-111°9
`
`39
`led w nTH REMAINDER
`
`291
`nTH DATA REDUCED SIGNAL
`
`FIG. 1
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1606
`
`
`
`WO 00/57643
`
`PCMS00/06522
`
`2/5
`
`200
`
`DATA REDUCTION
`40
`(-)
`
`(4 )
`1.. UBTRACTION)
`11
`
`40
`
`60
`
`300
`1"
`WATER
`MARKING
`(301
`
`WATER
`MARKING
`
`FIG. 2
`
`50
`(+)
`(ADDITION) 80►
`OUTPUT
`70
`SIGNAL
`
`(+)
`
`200
`
`300
`
`ORIGINAL 11
`SIGNAL
`
`ORIGINAL 11
`SIGNAL
`
`40
`
`WATER
`MARKING
`
`60
`
`(4)
`
`
`
`DATA REDUCTION
`40
`(-)
`(4)
`@IBTRACTION)
`11
`
`
`FIG. 3
`
`5
`
`(*)
`
`90
`OUTPUT
`SIGNAL
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1607
`
`
`
`WO 00/57643
`
`PCT/US00/06522
`
`3/5
`
`80
`f l
`
`
`
`SIGNAL
`TO BE
`ANALYZED
`
`200
`
`DATA REDUCTION
`41
`
`.1.113TRACTION)
`
`41
`
`61
`
`FIG. 4
`
`DECODE PROCESS FOR
`DATA REDUCED SIGNAL
`
`DECODE PROCESS FOR
`REMAINDER
`
`90
`f'
`
`SIGNAL
`TO BE
`ANALYZED
`
`200
`
`DATA REDUCTION
`
`41
`(
`
`DECODE PROCESS FOR
`DATA REDUCED SIGNAL
`
`FIG. 5
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1608
`
`
`
`WO 00/57643
`
`PCT/US00/06522
`
`4/5
`
`ORIGINAL 12
`SIGNAL
`
`400
`f i
`DATA REDUCTION
`45
`. (7)
`12 (4)
`1.- UBTRACT101\)
`
`-
`
`500
`(
`4-4,- SCRAMBLING
`
`(501
`
`65
`
`SCRAMBLING
`
`55
`
`(+)
`(ADDITION
`(+)
`75
`
`85
`OUTPUT
`SIGNAL
`
`FIG. 6
`
`ORIGINAL 12
`SIGNAL
`
`•
`
`12 (4)
`
`500
`400
`1?
`7(
`5
`DATA REDUCTION 'SCRAMBLING
`45
`(+)
`., (-)
`
`@IBTRACTIO1‘)-61---4<ADDITION)--1 0-
`OUTPUT
`(4)
`
`SIGNAL
`
`5
`
`FIG. 7
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1609
`
`
`
`WO 00/57643
`
`PCT/US00/06522
`
`5/5
`
`SIGNAL e
`
`85
`
`TO BE
`ANALYZED
`
`200
`(
`DATA REDUCTION
`
`
`
`550
`
`46
`
`C
`
`
` DESCRAMBLING
`
`56
`C
`
`66
`
`( 551
`
`76 (ADDITION
`
`• @BTRACTIO-N)
`
`DESCRAMBLING
`
`-
`
`98
`
`OUTPUT
`
`FIG. 8
`
`95
`SIGNAL "I
`TO BE
`ANALYZED
`
`200
`
`46
`
`550
`
`56
`
`DATA REDUCTION
`
`DESCRAMBLING
`
`66
`
` 14BTRACTIS
`
`FIG. 9
`
`(ADDITION
`
`99
`
`OUTPUT
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1610
`
`
`
`INTERNATIONAL SEARCH REPORT
`
`International application No.
`
`PCT/US00/06522
`
`CLASSIFICATION OF SUBJECT MATTER
`A.
`: HO4N 7/167
`IPC(7)
`: 713/176
`US CL
`According to International Patent Classification (IPC) or to both national classification and lPC
`
`FIELDS SEARCHED
`B.
`Minimum documentation searched (classification system followed by classification symbols)
`380/200.206.207,237.238; 705/54; 704/216-218, 226-228, 500, 501, 503,504; 713/176; 360/49; 348/461, 462
`
`U.S. :
`
`Documentation searched other than minimum documentation to the extent that such documents arc included in the fields searched
`Watermark Digest: Art Unit 2767
`
`Electronic data base consulted during the international search (name of data base and, where practicable, search terms used)
`
`IEEE, EAST. Internet, Dialog
`
`C. DOCUMENTS CONSIDERED TO BE RELEVANT
`
`Category•
`
`Citation of document, with indication, where appropriate, of the relevant passages
`
`Relevant to claim No.
`
`X,E
`
`US 6,061,793 A [TEWFIK et al.] 09 MAY 2000, Entire Document
`
`1-25
`
`US 5,809,139 A [GIROD et al.] 15 SEPTMBER 1998, Entire
`Document
`
`1-25
`
`US 5,848,155 A [COX] 08 DECEMBER 1998, Entire Document
`
`1-25
`
`US 5,889,868 A [MOSKOWITZ et al.] 30 MARCH 1999, Entire
`Document
`
`US 5,915,027 A [COX et al.] 22 JUNE 1999, Entire Document
`
`US 5,940,134 A [WIRTZ] 17 AUGUST 1999, Entire Document
`
`1-25
`
`1-25
`
`1-25
`
`X
`
`A,P
`
`A,P
`
`A,P
`
`El
`
`Further documents are listed in the continuation of Box C. E Sec patent family annex.
`
`Special categories of cued documenul
`
`document defining the general state of the art which ts not considered
`to be of particular relevance
`
`earlier document published on or after the international filing date
`
`-L•
`
`document which may throw doubu on priority claimisi or which is
`cited to establish the publication date of another citation or other
`special reason ins specIfiedi
`
`document referring to an oral disclosure. use. exhibition or other
`means
`
`*P"
`
`document published prior to the international filing date but later than
`the pnority dote claimed
`Date of the actual completion of the international search
`
`later document published after the international filing dare or pnority
`date and not in conflict with the application but cited to understand
`the principle or theory underlying the Invention
`
`document of particular relevance. die claimed invention cannot be
`considered novel or cannot be considered to Involve an inventive step
`when the document is taken alone
`
`document of particular relevance, the claimed invention cannot be
`constdered to involve an inventive step when the document is
`combined with one or more other such documenu. such combination
`being obvious to a person skilled in the an
`
`document member of die same patent family
`
`Date of mailing of the international search report
`
`30 JUNE 2000
`
`Name and mailing address of the ISA:IJS
`Commissioner of Patents and Trademarks
`Box PCT
`Washington. D.C. 20231
`(703) 305-3230
`Facsimile No.
`
`form PCT'ISA:210 (second sheet) (July 1998)*
`
`18 AUG 2000
`
`Authorized officer
`
`PAUL E. CALLS .1
`
`Telephone No.
`
`(70
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1611
`
`
`
`INTERNATIONAL SEARCH REPORT
`
`International application No.
`PCT/US00/0-6522
`
`C (Continuation). DOCUMENTS CONSIDERED TO BE RELEVANT
`
`Category'
`
`Citation of document, with indication. where appropriate. of the relevant passages
`
`Relevant to claim No.
`
`A,P
`
`A,E
`
`A,P
`
`US 5,991,426 A [COX et al.] 23 NOVEMBER 1999, Entire
`Document
`
`US 6,069,914 A [COX] 30 MAY 2000, Entire Document
`
`US 5,943,422 A [VAN WIE et al.] 24 AUGUST 1999, Entire
`Document
`
`1-25
`
`1-25
`
`1-25
`
`Form PCT'ISAl210 (continuation of second sheet) (July 1998)*
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1612
`
`
`
`49)
`
`European Patent
`Office
`
`SUPPLEMENTARY
`EUROPEAN SEARCH REPORT
`
`AppncationNumber
`EP 00 91 9398
`
`DOCUMENTS CONSIDERED TO BE RELEVANT
`Citation of document with indication, where appropriate,
`of retevantpassages
`
`Category
`
`Relevant
`to claim
`
`Ct A q-SIF1CATION OF THE
`APPLICATION (tnt.CL7)
`
`WO 98 37513 A (TELSTRA R & D MAN PTY LTD
`;BIGGAR MICHAEL (AU); JOHNSON ANDREW (AU)
`27 August 1998 (1998-08-27)
`* page 6, line 25 - page 7, line 10 *
`---
`US 4 969 204 A (MELNYCHUCK PAUL W ET AL)
`6 November 1990 (1990-11-06)
`* column 2, line 9 - column 2, line 48 *
`---
`EP 0 651.554 A (EASTMAN KODAK CO)
`3 May 1995 (1995-05-03)
`* column 6,. line 43 - column 9, line 19;
`figure 2 *
`
`H04N7/167
`H04N7/26.
`HO4N1/32
`GO6F17/30
`
`6
`
`1-10
`
`1-10
`
`---
`JOHNSON A ET AL: "TRANSFORM PERMUTED
`WATERMARKING FOR COPYRIGHT PROTECTION OF
`.
`DIGITAL VIDEO"
`IEEE GLOBECOM 1998. GLOBECOM '98. THE
`BRIDGE TO GLOBAL INTEGRATION. SYDNEY, NOV.
`8 - 12, 1998, IEEE GLOBAL
`TELECOMMUNICATIONS CONFERENCE, NEW YORK,
`NY: IEEE, US,
`vol. 2, 1998, pages 684-589, XP000825846
`ISBN: 0-7803-4985-7
`* page 685, left-hand column, paragraph 2
`- page 685, left-hand column, paragraph 3
`*
`
`X
`
`Y
`
`Y
`
`A
`
`P,X
`
`1-10
`
`'
`
`TECHNICAL FIELDS
`SEARCHED
`(tnLC1.7)
`HO4N
`GO6F
`
`---
`WO 99 62044 A (HANDEL THEODORE G ;UNIV
`CALIFORNIA .(US); SANDFORD MAXELL T II
`(US)) 2 December 1999 (1999-12-02)
`* abstract *
`* page 4, line 17 - page 5, line 5 *
`
`6
`
`•
`
`The supplementary search report has been based on the last
`sel of claims valid and available at the start of the search.
`Ptace of seairh
`MUNICH
`
`fn
`
`0
`
`0
`0
`
`CATEGORY OF CITED DOCUMENTS
`
`X : particularly relevant if taken atone
`Y : particularly relevant It combined with another
`document of the same category
`A : technological background
`0 : non written disclosure
`P : Intermediate document
`
`Date of completoh et the scare)
`grarroner
`27 June 2002
`Schoeyer, M
`I": theory or principle uroderlying the invention
`E :earlier patent docurnont, but publshed on, or
`after the filing date
`D: document cited in the application
`L : document cited for other reasons
`
`8 : member of the same patent famay. corresponding
`document
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1613
`
`
`
`(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(19) World Intellectual Property Organization
`International Bureau
`
`1111111111111111111111111111111
`11111111110111111111111111
`
`(43) International Publication Date
`10 January 2002 (10.01.2002)
`
`• PCT
`
`(10) International Publication Number
`WO 02/03385 Al
`
`(51) International Patent Classification':
`GO6F 1/00
`
`GI1B 20/00,
`
`(21) International Application Number: PCI7US00/18411
`
`(22) International Filing Date:'
`
`5 July 2000 (05.07.2000)
`
`(25) Filing Language:
`
`(26) Publication Language:
`
`English
`
`English
`
`(71) Applicant and
`(72) Inventor: MOSKOWITZ, Scott, A. [US/US]; 16711
`Collins Avenue #2505, Miami, FL 33160 (US).
`
`(74) Agents: CHAPMAN, Floyd, B. et al.; Wiley Rein &
`Fielding, Intellectual Property Department, 1776 K Street,
`N.W., Washington, DC 20006 (US).
`
`(81) Designated States (national): AE, AL, AM, AT, AU, AZ,
`BA, BB, BG, BR, BY, CA, CH, CN, CR, CU, CZ, DE, DK,
`
`DM, EE, ES, FI, GB, GD, GE, GH, GM, HR, HU, ID, IL,
`IN, IS, JP, KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU,
`LV, MA, MD, MG, MK, MN, MW, MX, NO, Ni PL, PT,
`RO, RU, SD, SE, SG, SL SK, SL, TJ, TM, TR, TT, TZ, UA,
`UG, UZ, VN, YU, ZA, ZW.
`
`(84) Designated States (regional): ARIPO patent (GH, GM,
`KE., LS, MW, MZ, SD, SL, SZ, TZ, UG, ZW), Eurasian
`patent (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM), European
`patent (AT, BE, CH, CY, DE, DK, ES, FI, FR, GB, GR, 1E,
`IT, LU, MC, NL, PT, SE), OAPI patent (BF, BJ, CF, CG,
`CI, CM, GA, GN, GW, ML, MR, NE, SN, TD, TG).
`
`Published:
`— with international search report
`
`For two-letter codes and other abbreviations, refer to the "Guid-
`ance Notes on Codes and Abbreviations" appearing at the begin-
`ning of each regular issue of the PCT Gazette.
`
`(54) Title: COPY PROTECTION OF DIGITAL DATA COMBINING STEGANOGRAPHIC AND CRYPTOGRAPHIC TECH-
`NIQUES
`
`(57) Abstract: A method for combining transfer functions with predeter-
`mined key creation. In one embodiment, digital information, including a
`digital sample and format information, is protected by identifying and en-
`coding a portion of the format information. Encoded digital information,
`including the digital sample and the encoded format information generated
`to protect the original digital information. In another embodiment, a digital
`granu-
`signal, including digital samples in a file format having an inherent
`larity, is protected by creating a predetermined key. The predetermined key
`is comprised of a transfer function-based mask set to manipulate data at the
`inherent granularity of the file format of the underlying digitized samples.
`
`START
`
` 1)10
`
`120
`
`ID Portion of Format
`Information to be
`Encoded
`4,
`Generate
`Encoded
`Format
`Information
`
` 1)30
`
`Generate
`Encoded Digital
`Information
`
` 1)40
`
`Decode With
`Predetermined Key
`4,
`Play Digital
`Information
`
` 1)50
`
`• w
`END
`
`(
`
`ENCODE
`DIGITAL
`INFORMATION
`
`DECODE
`DIGITAL
`INFORMATION
`
`WO 02/03385 Al
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1614
`
`
`
`WO 02/03385
`
`PCT/US00/18411
`
`COPY PROTECTION OF DIGITAL DATA COMBINING STEGANOGRAPHIC AND CRYPTOGRAPHIC TECH
`NIQUES
`
`BACKGROUND OF I'LL INVENTION
`
`5
`
`Increasingly, commercially valuable information is being created and
`
`stored in "digital" form. For example, music, photographs and video can all be
`stored and transmitted as a series of numbers, such as l's and 0's. Digital techniques
`
`let the original information be recreated in a very accurate manner Unfortunately,
`digital techniques also let the information be easily copied without the information
`
`10
`
`owner's permission.
`
`15
`
`Because unauthorized copying is clearly a disincentive to the digital
`distribution of valuable information, it is important to establish responsibility for
`copies and derivative copies of such works. For example, if each authorized digital
`copy of a popular song is identified with a unique number, any unauthorized copy of
`the song would also contain the number. This would allow the owner of the
`
`information, such as a song publisher, to investigate who made the unauthorized
`
`copy. Unfortunately, it is possible that the unique number could be erased or altered
`if it is simply tacked on at the beginning or end of the digital information.
`As will be described, known digital "watermark" techniques give
`
`20
`
`creators and publishers of digitized multimedia content localized, secured
`
`identification and authentication of that content. In considering the various forms of
`
`multimedia content, such as "master," stereo, National Television Standards
`Committee (NTSC) video, audio tape or compact disc, tolerance of quality will vary
`with individuals and affect the underlying commercial and aesthetic value of the
`content. For example, if a digital version of a popular song sounds distorted, it will
`be less valuable to users. It is therefore desirable to embed copyright, ownership or
`purchaser information, or some combination of these and related data, into the
`content in a way that will damage the content if the watermark is removed without
`authorization.
`
`To achieve these goals, digital watermark systems insert ownership
`information in a way that causes little or no noticeable effects, or "artifacts," in the
`underlying content signal. For example, if a digital watermark is inserted into a
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1615
`
`
`
`WO 02/03385
`
`PCT/US00/18411
`
`2
`
`digital version of a song, it is important that a listener not be bothered by the slight
`changes introduced by the watermark.
`It is also important for the watermark
`technique to maximize the encoding level and "location sensitivity" in the signal to
`force damage to the content signal when removal is attempted. Digital watermarks
`address many of these concerns, and research in the field has provided extremely
`robust and secure implementations.
`What has been overlooked in many applications described in the art,
`however, are systems which closely mimic distribution of content as it occurs in the
`real world. For instance, many watermarking systems require the original un-
`watermarked content signal to enable detection or decode operations. These include
`highly publicized efforts by NEC, Digimarc and others. Such techniques are
`problematic because, in the real world, original master copies reside in a rights
`holders vaults and are not readily available to the public.
`With much activity overly focused on watermark survivability, the
`security of a digital watermark is suspect. Any simple linear operation for encoding
`information into a signal may be used to erase the embedded signal by inverting the
`process. This is not a difficult task, especially when detection software is a plug-in
`freely available to the public, such as with Digimarc. In general,: these systems seek
`to embed cryptographic information, not cryptographically embed information into
`target media content.
`
`Other methods embed ownership information that is plainly visible in
`the media signal, such as the method described in US Patent No. 5,530,739 to
`Braudaway et al. The system described in Braudaway protects a digitized image by
`encoding a visible watermark to deter piracy. Such an implementation creates an
`immediate weakness in securing the embedded information because the watermark
`is plainly visible. Thus, no search for the embedded signal is necessary and the
`watermark can be more easily removed or altered. For example, while certainly
`useful to some rights owners, simply placing the symbol "0" in the digital
`information would only provide limited protection. Removal by adjusting the
`brightness of the pixels forming the "0" would not be difficult with respect to the
`computational resources required.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1616
`
`
`
`WO 02/03385
`
`PCT/US00/18411
`
`3
`
`Other relevant prior art includes US Patents No. 4,979,210 and
`5,073,925 to Nagata et al., which encodes information by modulating an audio
`signal in the amplitude/time domain. The modulations introduced in the Nagata
`process carry a "copy/don't copy" message, which is easily found and circumvented
`by one skilled in the art. The granularity of encoding is fixed by the amplitude and
`frequency modulation limits required to maintain inaudibility. These limits are
`relatively low, making it impractical to encode more information using the Nagata
`process.
`
`5
`
`Although US Patent No. 5,664,018 to Leighton describes a means to
`prevent collusion attacks in digital watermarks, the disclosed method may not
`
`10
`
`actually provide the security described.
`watermarking technique is linear, the "insertion envelope" or "watermarking space"
`is well-defined and thus susceptible to attacks less sophisticated than collusion by
`unauthorized parties. Over-encoding at the watermarking encoding level is but one
`
`For-example, in cases where the
`
`15
`
`simple attack in such linear implementations. Another consideration not made by
`
`Leighton is that commercially-valuable content may already exist in a un-
`
`watermarked form somewhere, easily accessible to potential pirates, gutting the need
`
`for any type of collusive activity. Digitally signing the embedded signal with
`
`preprocessing of watermark data is more likely to prevent successful collusion.
`
`20
`
`Furthermore, a "baseline" watermark as disclosed is quite subjective. It is simply
`described elsewhere in the art as the "perceptually significant" regions of a signal.
`
`Making a watermarking function less linear or inverting the insertion of watermarks
`would seem to provide the same benefit without the additional work required to
`create a "baseline" watermark. Indeed, watermarking algorithms should already be
`capable of defining a target insertion envelope or region without additional steps.
`
`What is evident is the Leighton patent does not allow for initial prevention of attacks
`on an embedded watermark as the content is visibly or audibly unchanged.
`
`It is also important that any method for providing security also
`
`function with broadcasting media over networks such as the Internet, which is also
`referred to as "streaming " Commercial "plug-in" products such as RealAudio and
`RealVideo, as well as applications by vendors VDONet and Xtreme, are common in
`such network environments. Most digital watermark implementations focus on
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1617
`
`
`
`WO 02/03385
`
`PCT/US00/18411
`
`4
`
`common file base signals and fail to anticipate the security of streamed signals. It is
`desirable that any protection scheme be able to function with a plug-in player
`without advanced knowledge of the encoded media stream.
`
`Other technologies focus solely on file-based security. These
`technologies illustrate the varying applications for security that must be evaluated
`for different media and distribution environments. Use of cryptolopes or
`cryptographic containers, as proposed by IBM in its Cryptolope product, and
`InterTrust, as described in U.S. Patents No. 4,827,508, 4,977,594, 5,050,213 and
`5,410,598, may discourage certain forms of piracy. Cryptographic containers,
`however, require a user to subscribe to particular decryption software to decrypt
`data
`IBM's InfoMarket and InterTrust's DigiBox, among other implementations,
`provide a generalized model and need proprietary architecture to function. Every
`user must have a subscription or registration with the party which encrypts the data.
`Again, as a form of general encryption, the data is scrambled or encrypted without
`regard to the media and its formatting. Finally, control over copyrights or other
`neighboring rights is left with the implementing party, in this case, IBM, InterTrust
`or a similar provider. Methods similar to these "trusted systems" exist, and
`Cerberus Central Limited and Liquid Audio, among a number of companies, offer
`systems which may functionally be thought of as subsets of IBM and InterTrust's
`more generalized security offerings. Both Cerberus and Liquid Audio propose
`proprietary player software which is registered to the user and "locked" in a manner
`parallel to the locking of content that is distributed via a cryptographic container.
`The economic trade-off in this model is that users are required to use each respective
`companies' proprietary player to play or otherwise manipulate content that is
`downloaded. If, as is the case presently, most music or other media is not available
`via these proprietary players and more companies propose non-compatible player
`formats, the proliferation of players will continue. Cerberus and Liquid Audio also
`by way of extension of their architectures provide for "near-CD quality" but
`proprietary compression. This requirement stems from the necessity not to allow'
`content that has near-identical data make-up to an existing consumer electronic
`standard, in Cerberus and Liquid Audio's case the so-called Red Book audio CD
`standard of 16 bit 44.1 kHz, so that comparisons with the proprietary file may not
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1618
`
`
`
`WO 02/03385
`
`PCT/US00/18411
`
`5
`
`5
`
`yield how the player is secured. Knowledge of the player's file format renders its
`security ineffective as a file may be replicated and played on any common player,
`not the intended proprietary player of the provider of previously secured and
`uniquely formatted content. This is the parallel weakness to public key crypto-
`systems which have gutted security if enough plain text and cipher text comparisons
`enable a pirate to determine the user's private key.
`Many approaches to digital watermarking leave detection and
`decoding control with the implementing party of the digital watermark, not the
`creator of the work to be protected. A set of secure
`
`watermark
`
`digital
`
`10
`
`implementations address this fundamental control issue forming the basis of key-
`
`based approaches. These are covered by the following patents and pending
`applications, the entire disclosures of which are hereby incorporated by reference:
`US Patent No. 5,613, 004 entitled "Steganographic Method and Device" and its
`derivative US patent application Serial No. 08/775,216, US patent application Serial
`No. 08/587,944 entitled "Human Assisted Random Key Generation and Application
`for Digital Watermark System," US Patent Application Serial No. 08/587,943
`entitled "Method for Stega-Cipher Protection of Computer Code," US patent
`application Serial No. 08/677,435 entitled "Optimization Methods for the Insertion,
`Protection, and Detection of Digital Watermarks in Digitized Data," and US Patent
`Application Serial No. 08/772,222 entitled "Z-Transform Implementation of Digital
`Watermarks." Public key crypto-systems are described in US Patents No.
`4,200,770, 4,218,582, 4,405,829 and 4,424,414, the entire disclosures of which are
`also hereby incorporated by reference.
`In particular, an improved protection scheme is described in "Method
`for Stega-Cipher Protection of Computer Code," US patent application Serial No.
`08/587,943. This technique uses the key-based insertion of binary executable
`computer code within a content signal that is subsequently, and necessarily, used to
`play or otherwise manipulate the signal in which it is encoded. With this system,
`however, certain computational requirements, such as one digital player per digital
`copy of content, may be necessitated. For instance, a consumer may download
`many copies of watermarked content. With this technique, the user would also be
`downloading as many copies of the digital player program. While this form of
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1619
`
`
`
`WO 02/03385
`
`PCT/US00/18411
`
`6
`
`5
`
`10
`
`15
`
`20
`
`security may be desirable for some applications, it is not appropriate in many
`circumstances. Finally, even when digital information is distributed in encoded
`form, it may be desirable to allow unauthorized users to play the information with a
`digital player, perhaps with a reduced level of quality. For example, a popular song
`may be encoded and freely distributed in encoded form to the public. The public,
`perhaps using commonly available plug-in digital players, could play the encoded
`content and hear the music in some degraded form. The music may sound choppy,
`or fuzzy or be degraded in some other way. This lets the public decide, based on the
`available lower quality version of the song, if they want to purchase a key from the
`publisher to decode, or "clean-up," the content. Similar approaches could be used to
`distribute blurry pictures or low quality video. Or even "degraded" text, in the sense
`that only authenticated portions of the text can be determined with the
`predetermined key or a validated digital signature for the intended message.
`
`In view of the foregoing, it can be appreciated that a substantial need
`exists for a method allowing encoded content to be played, with degraded quality, by
`a plug-in digital player, and solving the other problems discussed above.
`
`SUMMARY OF THE INVENTION
`The disadvantages of the art are alleviated to a great extent by a
`method for combining transfer functions with predetermined key creation. In one
`embodiment, digital information, including a digital sample and format information,
`
`is protected by identifying and encoding a portion of the format information.
`
`Encoded digital information, including the digital sample and the encoded format
`information, is generated to protect the original digital information.
`In another embodiment, a digital signal, including digital samples in a
`
`25
`
`file format having an inherent granularity, is protected by creating a predetermined
`
`key. The predetermined key is comprised of a transfer function-based mask set to
`manipulate data at the inherent granularity of the file format of the underlying
`
`digitized samples.
`With these and other advantages and features of the invention that
`will become hereinafter apparent, the nature of the invention may be more clearly
`understood by reference to the following detailed description of the invention, the
`appended claims and to the several drawings attached herein.
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1620
`
`
`
`WO 02/03385
`
`PCMJS00/18411
`
`7
`
`BRIEF DESCRIPTION OF 1HE DRAWINGS
`
`FIG. 1 is a block flow diagram of a method for copy protection or
`authentication of digital information according to an embodiment of the present
`
`invention.
`
`5
`
`DETAILED DESCRIPTION
`
`In accordance with an embodiment of the present invention, a method
`combines transfer functions with predetermined key creation. Increased security is
`
`achieved in the method by combining elements of "public-key steganography" with
`
`cryptographic protocols, which keep in-transit data secure by scrambling the data
`
`10
`
`with "keys" in a manner that is not apparent to those with access to the content to be
`distributed. Because different forms of randomness are combined to offer robust,
`
`distributed security, the present invention addresses an architectural "gray space"
`
`between two important areas of security: digital watermarks, a subset of the more
`
`general art of steganography, and cryptography. One form of randomness exists in
`
`15
`
`the mask sets that are randomly created to map watermark data into an otherwise
`
`The second form of-randomness is the random
`unrelated digital signal.
`permutations of data formats used with digital players to manipulate the content with
`
`the predetermined keys. These forms can be thought of as the transfer function
`
`versus the mapping function inherent to digital watermarking processes.
`
`20
`
`According
`
`to an embodiment of
`
`the present
`
`invention, a
`
`predetermined, or randomly generated, key is used to scramble digital information in
`
`a way that is unlike known "digital watermark" techniques and public key crypto-
`systems. As used herein, a key is also referred to as a "mask set" which includes
`
`one or more random or pseudo-random series of bits. Prior to encoding, a mask can
`
`25
`
`be generated by any cryptographically secure random generation process. A block
`
`cipher, such as a Data Encryption Standard (DES) algorithm, in combination with a
`
`sufficiently random seed value, such as one created using a Message Digest 5
`(MD5) algorithm, emulates a cryptographically secure random bit generator. The
`keys are saved in a database, along with information matching them to the digital
`signal, for use in descrambling and subsequent viewing or playback. Additional file
`format or transfer property information is prepared and made available to the
`encoder, in a bit addressable manner As well, any authenticating function can be
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1621
`
`
`
`WO 02/03385
`
`PCT/US00/18411
`
`8
`
`combined, such as Digital Signature Standard (DSS) or Secure Hash Algorithm
`(SHA).
`
`Using the predetermined key comprised of a transfer function-based
`mask set, the data representing the original content is manipulated at the inherent
`granularity of the file format of the underlying digitized samples.
`Instead of
`providing or otherwise distributing, watermarked content that is not noticeably
`altered, a partially "scrambled" copy of the content is distributed. The key is
`necessary both to register the sought-after content and to descramble the content into
`its original form.
`
`The present invention uses methods disclosed in