throbber
WO 00/57643
`
`PCT/US00/06522
`
`22
`
`13.
`
`A method of securing a data signal comprising:
`applying a data reduction technique to reduce the data signal into a reduced data
`signal;
`
`subtracting said reduced data signal from the data signal to produce a remainder
`
`signal;
`
`using a first cryptographic technique to encrypt the reduced data signal to
`produce an encrypted, reduced data signal;
`using a second cryptographic technique to encrypt the remainder signal to
`produce an encrypted remainder signal; and
`adding said encrypted, reduced data signal to said encrypted remainder signal
`to produce an output signal.
`The method of claim 13 wherein said first and second cryptographic techniques
`14.
`are identical.
`The method of claim 13 wherein at least one of said first and second
`cryptographic techniques is a watermarking technique.
`The method of claim 15, wherein at least one of the watermarks is embedded
`using at least one key.
`The method of claim 15, wherein at least one of the watermarks is embedded
`using a key pair.
`The method of claim 13 wherein at least one of said first and second
`cryptographic techniques is a scrambling technique.
`The method of claim 13 wherein one of said first and second cryptographic
`techniques is a watermarking technique and the other is a scrambling technique.
`The method of claim 13 wherein said first and second cryptographic techniques
`are identical.
`A system for securing a data signal comprising:
`means to apply a data reduction technique to reduce the data signal into a
`reduced data signal;
`
`15.
`
`16.
`
`17.
`
`18.
`
`19.
`
`20.
`
`21.
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1604
`
`

`

`WO 00/57643
`
`PCT/E/S00/06522
`
`23
`
`means to subtract said reduced data signal from the data signal to produce a
`remainder signal;
`means to apply a first cryptographic technique to encrypt the reduced data signal
`to produce an encrypted, reduced data signal;
`means to apply a second cryptographic technique to encrypt the remainder
`signal to produce an encrypted remainder signal; and
`means to add said encrypted, reduced data signal to said encrypted remainder
`signal to produce an output signal.
`The system of claim 21 wherein said first and second cryptographic techniques
`22.
`are identical.
`The system of claim 21 wherein at least one of said means to apply a first and
`second cryptographic technique utilizes a watermarking technique.
`The system of claim 21 wherein at least one of said means to apply a first and
`second cryptographic technique utilizes a scrambling technique.
`The system of claim 13 wherein said means to apply a first cryptographic
`technique is a means to apply a watermarking technique and said means to
`apply a second cryptographic technique is a means to apply a scrambling
`technique.
`
`25.
`
`23.
`
`24.
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1605
`
`

`

`WO 00/57643
`
`PCT/US00/06522
`
`ORIGINAL
`SIGNAL
`
`10
`
`1/5
`
`
`
` SUBTRACTION)
`-O
`20
`1ST DATA REDUCTION Fil°°
`
`20
`
`1ST DATA REDUCED
`SIGNAL
`
`30
`r
`
`01ST REMAINDER
`
`31
`/(1 is 2ND REMAINDER
`
`20 8 ( SUBTRACTION)
`*0
`21
`REDUCTIONhe101
`2ND DATA
`
`20
`
`21
`2ND DATA REDUCED
`SIGNAL
`
`28
`
`(n-1) DATA REDUCED SIGNAL
`a
` SUBTRACTION
`28
`0
`
`29
`
`—2-•8- nTH DATA REDUCTION F-111°9
`
`39
`led w nTH REMAINDER
`
`291
`nTH DATA REDUCED SIGNAL
`
`FIG. 1
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1606
`
`

`

`WO 00/57643
`
`PCMS00/06522
`
`2/5
`
`200
`
`DATA REDUCTION
`40
`(-)
`
`(4 )
`1.. UBTRACTION)
`11
`
`40
`
`60
`
`300
`1"
`WATER
`MARKING
`(301
`
`WATER
`MARKING
`
`FIG. 2
`
`50
`(+)
`(ADDITION) 80►
`OUTPUT
`70
`SIGNAL
`
`(+)
`
`200
`
`300
`
`ORIGINAL 11
`SIGNAL
`
`ORIGINAL 11
`SIGNAL
`
`40
`
`WATER
`MARKING
`
`60
`
`(4)
`
`
`
`DATA REDUCTION
`40
`(-)
`(4)
`@IBTRACTION)
`11
`
`
`FIG. 3
`
`5
`
`(*)
`
`90
`OUTPUT
`SIGNAL
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1607
`
`

`

`WO 00/57643
`
`PCT/US00/06522
`
`3/5
`
`80
`f l
`
`
`
`SIGNAL
`TO BE
`ANALYZED
`
`200
`
`DATA REDUCTION
`41
`
`.1.113TRACTION)
`
`41
`
`61
`
`FIG. 4
`
`DECODE PROCESS FOR
`DATA REDUCED SIGNAL
`
`DECODE PROCESS FOR
`REMAINDER
`
`90
`f'
`
`SIGNAL
`TO BE
`ANALYZED
`
`200
`
`DATA REDUCTION
`
`41
`(
`
`DECODE PROCESS FOR
`DATA REDUCED SIGNAL
`
`FIG. 5
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1608
`
`

`

`WO 00/57643
`
`PCT/US00/06522
`
`4/5
`
`ORIGINAL 12
`SIGNAL
`
`400
`f i
`DATA REDUCTION
`45
`. (7)
`12 (4)
`1.- UBTRACT101\)
`
`-
`
`500
`(
`4-4,- SCRAMBLING
`
`(501
`
`65
`
`SCRAMBLING
`
`55
`
`(+)
`(ADDITION
`(+)
`75
`
`85
`OUTPUT
`SIGNAL
`
`FIG. 6
`
`ORIGINAL 12
`SIGNAL
`
`•
`
`12 (4)
`
`500
`400
`1?
`7(
`5
`DATA REDUCTION 'SCRAMBLING
`45
`(+)
`., (-)
`
`@IBTRACTIO1‘)-61---4<ADDITION)--1 0-
`OUTPUT
`(4)
`
`SIGNAL
`
`5
`
`FIG. 7
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1609
`
`

`

`WO 00/57643
`
`PCT/US00/06522
`
`5/5
`
`SIGNAL e
`
`85
`
`TO BE
`ANALYZED
`
`200
`(
`DATA REDUCTION
`
`
`
`550
`
`46
`
`C
`
`
` DESCRAMBLING
`
`56
`C
`
`66
`
`( 551
`
`76 (ADDITION
`
`• @BTRACTIO-N)
`
`DESCRAMBLING
`
`-
`
`98
`
`OUTPUT
`
`FIG. 8
`
`95
`SIGNAL "I
`TO BE
`ANALYZED
`
`200
`
`46
`
`550
`
`56
`
`DATA REDUCTION
`
`DESCRAMBLING
`
`66
`
` 14BTRACTIS
`
`FIG. 9
`
`(ADDITION
`
`99
`
`OUTPUT
`
`SUBSTITUTE SHEET (RULE 26)
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1610
`
`

`

`INTERNATIONAL SEARCH REPORT
`
`International application No.
`
`PCT/US00/06522
`
`CLASSIFICATION OF SUBJECT MATTER
`A.
`: HO4N 7/167
`IPC(7)
`: 713/176
`US CL
`According to International Patent Classification (IPC) or to both national classification and lPC
`
`FIELDS SEARCHED
`B.
`Minimum documentation searched (classification system followed by classification symbols)
`380/200.206.207,237.238; 705/54; 704/216-218, 226-228, 500, 501, 503,504; 713/176; 360/49; 348/461, 462
`
`U.S. :
`
`Documentation searched other than minimum documentation to the extent that such documents arc included in the fields searched
`Watermark Digest: Art Unit 2767
`
`Electronic data base consulted during the international search (name of data base and, where practicable, search terms used)
`
`IEEE, EAST. Internet, Dialog
`
`C. DOCUMENTS CONSIDERED TO BE RELEVANT
`
`Category•
`
`Citation of document, with indication, where appropriate, of the relevant passages
`
`Relevant to claim No.
`
`X,E
`
`US 6,061,793 A [TEWFIK et al.] 09 MAY 2000, Entire Document
`
`1-25
`
`US 5,809,139 A [GIROD et al.] 15 SEPTMBER 1998, Entire
`Document
`
`1-25
`
`US 5,848,155 A [COX] 08 DECEMBER 1998, Entire Document
`
`1-25
`
`US 5,889,868 A [MOSKOWITZ et al.] 30 MARCH 1999, Entire
`Document
`
`US 5,915,027 A [COX et al.] 22 JUNE 1999, Entire Document
`
`US 5,940,134 A [WIRTZ] 17 AUGUST 1999, Entire Document
`
`1-25
`
`1-25
`
`1-25
`
`X
`
`A,P
`
`A,P
`
`A,P
`
`El
`
`Further documents are listed in the continuation of Box C. E Sec patent family annex.
`
`Special categories of cued documenul
`
`document defining the general state of the art which ts not considered
`to be of particular relevance
`
`earlier document published on or after the international filing date
`
`-L•
`
`document which may throw doubu on priority claimisi or which is
`cited to establish the publication date of another citation or other
`special reason ins specIfiedi
`
`document referring to an oral disclosure. use. exhibition or other
`means
`
`*P"
`
`document published prior to the international filing date but later than
`the pnority dote claimed
`Date of the actual completion of the international search
`
`later document published after the international filing dare or pnority
`date and not in conflict with the application but cited to understand
`the principle or theory underlying the Invention
`
`document of particular relevance. die claimed invention cannot be
`considered novel or cannot be considered to Involve an inventive step
`when the document is taken alone
`
`document of particular relevance, the claimed invention cannot be
`constdered to involve an inventive step when the document is
`combined with one or more other such documenu. such combination
`being obvious to a person skilled in the an
`
`document member of die same patent family
`
`Date of mailing of the international search report
`
`30 JUNE 2000
`
`Name and mailing address of the ISA:IJS
`Commissioner of Patents and Trademarks
`Box PCT
`Washington. D.C. 20231
`(703) 305-3230
`Facsimile No.
`
`form PCT'ISA:210 (second sheet) (July 1998)*
`
`18 AUG 2000
`
`Authorized officer
`
`PAUL E. CALLS .1
`
`Telephone No.
`
`(70
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1611
`
`

`

`INTERNATIONAL SEARCH REPORT
`
`International application No.
`PCT/US00/0-6522
`
`C (Continuation). DOCUMENTS CONSIDERED TO BE RELEVANT
`
`Category'
`
`Citation of document, with indication. where appropriate. of the relevant passages
`
`Relevant to claim No.
`
`A,P
`
`A,E
`
`A,P
`
`US 5,991,426 A [COX et al.] 23 NOVEMBER 1999, Entire
`Document
`
`US 6,069,914 A [COX] 30 MAY 2000, Entire Document
`
`US 5,943,422 A [VAN WIE et al.] 24 AUGUST 1999, Entire
`Document
`
`1-25
`
`1-25
`
`1-25
`
`Form PCT'ISAl210 (continuation of second sheet) (July 1998)*
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1612
`
`

`

`49)
`
`European Patent
`Office
`
`SUPPLEMENTARY
`EUROPEAN SEARCH REPORT
`
`AppncationNumber
`EP 00 91 9398
`
`DOCUMENTS CONSIDERED TO BE RELEVANT
`Citation of document with indication, where appropriate,
`of retevantpassages
`
`Category
`
`Relevant
`to claim
`
`Ct A q-SIF1CATION OF THE
`APPLICATION (tnt.CL7)
`
`WO 98 37513 A (TELSTRA R & D MAN PTY LTD
`;BIGGAR MICHAEL (AU); JOHNSON ANDREW (AU)
`27 August 1998 (1998-08-27)
`* page 6, line 25 - page 7, line 10 *
`---
`US 4 969 204 A (MELNYCHUCK PAUL W ET AL)
`6 November 1990 (1990-11-06)
`* column 2, line 9 - column 2, line 48 *
`---
`EP 0 651.554 A (EASTMAN KODAK CO)
`3 May 1995 (1995-05-03)
`* column 6,. line 43 - column 9, line 19;
`figure 2 *
`
`H04N7/167
`H04N7/26.
`HO4N1/32
`GO6F17/30
`
`6
`
`1-10
`
`1-10
`
`---
`JOHNSON A ET AL: "TRANSFORM PERMUTED
`WATERMARKING FOR COPYRIGHT PROTECTION OF
`.
`DIGITAL VIDEO"
`IEEE GLOBECOM 1998. GLOBECOM '98. THE
`BRIDGE TO GLOBAL INTEGRATION. SYDNEY, NOV.
`8 - 12, 1998, IEEE GLOBAL
`TELECOMMUNICATIONS CONFERENCE, NEW YORK,
`NY: IEEE, US,
`vol. 2, 1998, pages 684-589, XP000825846
`ISBN: 0-7803-4985-7
`* page 685, left-hand column, paragraph 2
`- page 685, left-hand column, paragraph 3
`*
`
`X
`
`Y
`
`Y
`
`A
`
`P,X
`
`1-10
`
`'
`
`TECHNICAL FIELDS
`SEARCHED
`(tnLC1.7)
`HO4N
`GO6F
`
`---
`WO 99 62044 A (HANDEL THEODORE G ;UNIV
`CALIFORNIA .(US); SANDFORD MAXELL T II
`(US)) 2 December 1999 (1999-12-02)
`* abstract *
`* page 4, line 17 - page 5, line 5 *
`
`6
`
`•
`
`The supplementary search report has been based on the last
`sel of claims valid and available at the start of the search.
`Ptace of seairh
`MUNICH
`
`fn
`
`0
`
`0
`0
`
`CATEGORY OF CITED DOCUMENTS
`
`X : particularly relevant if taken atone
`Y : particularly relevant It combined with another
`document of the same category
`A : technological background
`0 : non written disclosure
`P : Intermediate document
`
`Date of completoh et the scare)
`grarroner
`27 June 2002
`Schoeyer, M
`I": theory or principle uroderlying the invention
`E :earlier patent docurnont, but publshed on, or
`after the filing date
`D: document cited in the application
`L : document cited for other reasons
`
`8 : member of the same patent famay. corresponding
`document
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1613
`
`

`

`(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(19) World Intellectual Property Organization
`International Bureau
`
`1111111111111111111111111111111
`11111111110111111111111111
`
`(43) International Publication Date
`10 January 2002 (10.01.2002)
`
`• PCT
`
`(10) International Publication Number
`WO 02/03385 Al
`
`(51) International Patent Classification':
`GO6F 1/00
`
`GI1B 20/00,
`
`(21) International Application Number: PCI7US00/18411
`
`(22) International Filing Date:'
`
`5 July 2000 (05.07.2000)
`
`(25) Filing Language:
`
`(26) Publication Language:
`
`English
`
`English
`
`(71) Applicant and
`(72) Inventor: MOSKOWITZ, Scott, A. [US/US]; 16711
`Collins Avenue #2505, Miami, FL 33160 (US).
`
`(74) Agents: CHAPMAN, Floyd, B. et al.; Wiley Rein &
`Fielding, Intellectual Property Department, 1776 K Street,
`N.W., Washington, DC 20006 (US).
`
`(81) Designated States (national): AE, AL, AM, AT, AU, AZ,
`BA, BB, BG, BR, BY, CA, CH, CN, CR, CU, CZ, DE, DK,
`
`DM, EE, ES, FI, GB, GD, GE, GH, GM, HR, HU, ID, IL,
`IN, IS, JP, KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU,
`LV, MA, MD, MG, MK, MN, MW, MX, NO, Ni PL, PT,
`RO, RU, SD, SE, SG, SL SK, SL, TJ, TM, TR, TT, TZ, UA,
`UG, UZ, VN, YU, ZA, ZW.
`
`(84) Designated States (regional): ARIPO patent (GH, GM,
`KE., LS, MW, MZ, SD, SL, SZ, TZ, UG, ZW), Eurasian
`patent (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM), European
`patent (AT, BE, CH, CY, DE, DK, ES, FI, FR, GB, GR, 1E,
`IT, LU, MC, NL, PT, SE), OAPI patent (BF, BJ, CF, CG,
`CI, CM, GA, GN, GW, ML, MR, NE, SN, TD, TG).
`
`Published:
`— with international search report
`
`For two-letter codes and other abbreviations, refer to the "Guid-
`ance Notes on Codes and Abbreviations" appearing at the begin-
`ning of each regular issue of the PCT Gazette.
`
`(54) Title: COPY PROTECTION OF DIGITAL DATA COMBINING STEGANOGRAPHIC AND CRYPTOGRAPHIC TECH-
`NIQUES
`
`(57) Abstract: A method for combining transfer functions with predeter-
`mined key creation. In one embodiment, digital information, including a
`digital sample and format information, is protected by identifying and en-
`coding a portion of the format information. Encoded digital information,
`including the digital sample and the encoded format information generated
`to protect the original digital information. In another embodiment, a digital
`granu-
`signal, including digital samples in a file format having an inherent
`larity, is protected by creating a predetermined key. The predetermined key
`is comprised of a transfer function-based mask set to manipulate data at the
`inherent granularity of the file format of the underlying digitized samples.
`
`START
`
` 1)10
`
`120
`
`ID Portion of Format
`Information to be
`Encoded
`4,
`Generate
`Encoded
`Format
`Information
`
` 1)30
`
`Generate
`Encoded Digital
`Information
`
` 1)40
`
`Decode With
`Predetermined Key
`4,
`Play Digital
`Information
`
` 1)50
`
`• w
`END
`
`(
`
`ENCODE
`DIGITAL
`INFORMATION
`
`DECODE
`DIGITAL
`INFORMATION
`
`WO 02/03385 Al
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1614
`
`

`

`WO 02/03385
`
`PCT/US00/18411
`
`COPY PROTECTION OF DIGITAL DATA COMBINING STEGANOGRAPHIC AND CRYPTOGRAPHIC TECH
`NIQUES
`
`BACKGROUND OF I'LL INVENTION
`
`5
`
`Increasingly, commercially valuable information is being created and
`
`stored in "digital" form. For example, music, photographs and video can all be
`stored and transmitted as a series of numbers, such as l's and 0's. Digital techniques
`
`let the original information be recreated in a very accurate manner Unfortunately,
`digital techniques also let the information be easily copied without the information
`
`10
`
`owner's permission.
`
`15
`
`Because unauthorized copying is clearly a disincentive to the digital
`distribution of valuable information, it is important to establish responsibility for
`copies and derivative copies of such works. For example, if each authorized digital
`copy of a popular song is identified with a unique number, any unauthorized copy of
`the song would also contain the number. This would allow the owner of the
`
`information, such as a song publisher, to investigate who made the unauthorized
`
`copy. Unfortunately, it is possible that the unique number could be erased or altered
`if it is simply tacked on at the beginning or end of the digital information.
`As will be described, known digital "watermark" techniques give
`
`20
`
`creators and publishers of digitized multimedia content localized, secured
`
`identification and authentication of that content. In considering the various forms of
`
`multimedia content, such as "master," stereo, National Television Standards
`Committee (NTSC) video, audio tape or compact disc, tolerance of quality will vary
`with individuals and affect the underlying commercial and aesthetic value of the
`content. For example, if a digital version of a popular song sounds distorted, it will
`be less valuable to users. It is therefore desirable to embed copyright, ownership or
`purchaser information, or some combination of these and related data, into the
`content in a way that will damage the content if the watermark is removed without
`authorization.
`
`To achieve these goals, digital watermark systems insert ownership
`information in a way that causes little or no noticeable effects, or "artifacts," in the
`underlying content signal. For example, if a digital watermark is inserted into a
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1615
`
`

`

`WO 02/03385
`
`PCT/US00/18411
`
`2
`
`digital version of a song, it is important that a listener not be bothered by the slight
`changes introduced by the watermark.
`It is also important for the watermark
`technique to maximize the encoding level and "location sensitivity" in the signal to
`force damage to the content signal when removal is attempted. Digital watermarks
`address many of these concerns, and research in the field has provided extremely
`robust and secure implementations.
`What has been overlooked in many applications described in the art,
`however, are systems which closely mimic distribution of content as it occurs in the
`real world. For instance, many watermarking systems require the original un-
`watermarked content signal to enable detection or decode operations. These include
`highly publicized efforts by NEC, Digimarc and others. Such techniques are
`problematic because, in the real world, original master copies reside in a rights
`holders vaults and are not readily available to the public.
`With much activity overly focused on watermark survivability, the
`security of a digital watermark is suspect. Any simple linear operation for encoding
`information into a signal may be used to erase the embedded signal by inverting the
`process. This is not a difficult task, especially when detection software is a plug-in
`freely available to the public, such as with Digimarc. In general,: these systems seek
`to embed cryptographic information, not cryptographically embed information into
`target media content.
`
`Other methods embed ownership information that is plainly visible in
`the media signal, such as the method described in US Patent No. 5,530,739 to
`Braudaway et al. The system described in Braudaway protects a digitized image by
`encoding a visible watermark to deter piracy. Such an implementation creates an
`immediate weakness in securing the embedded information because the watermark
`is plainly visible. Thus, no search for the embedded signal is necessary and the
`watermark can be more easily removed or altered. For example, while certainly
`useful to some rights owners, simply placing the symbol "0" in the digital
`information would only provide limited protection. Removal by adjusting the
`brightness of the pixels forming the "0" would not be difficult with respect to the
`computational resources required.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1616
`
`

`

`WO 02/03385
`
`PCT/US00/18411
`
`3
`
`Other relevant prior art includes US Patents No. 4,979,210 and
`5,073,925 to Nagata et al., which encodes information by modulating an audio
`signal in the amplitude/time domain. The modulations introduced in the Nagata
`process carry a "copy/don't copy" message, which is easily found and circumvented
`by one skilled in the art. The granularity of encoding is fixed by the amplitude and
`frequency modulation limits required to maintain inaudibility. These limits are
`relatively low, making it impractical to encode more information using the Nagata
`process.
`
`5
`
`Although US Patent No. 5,664,018 to Leighton describes a means to
`prevent collusion attacks in digital watermarks, the disclosed method may not
`
`10
`
`actually provide the security described.
`watermarking technique is linear, the "insertion envelope" or "watermarking space"
`is well-defined and thus susceptible to attacks less sophisticated than collusion by
`unauthorized parties. Over-encoding at the watermarking encoding level is but one
`
`For-example, in cases where the
`
`15
`
`simple attack in such linear implementations. Another consideration not made by
`
`Leighton is that commercially-valuable content may already exist in a un-
`
`watermarked form somewhere, easily accessible to potential pirates, gutting the need
`
`for any type of collusive activity. Digitally signing the embedded signal with
`
`preprocessing of watermark data is more likely to prevent successful collusion.
`
`20
`
`Furthermore, a "baseline" watermark as disclosed is quite subjective. It is simply
`described elsewhere in the art as the "perceptually significant" regions of a signal.
`
`Making a watermarking function less linear or inverting the insertion of watermarks
`would seem to provide the same benefit without the additional work required to
`create a "baseline" watermark. Indeed, watermarking algorithms should already be
`capable of defining a target insertion envelope or region without additional steps.
`
`What is evident is the Leighton patent does not allow for initial prevention of attacks
`on an embedded watermark as the content is visibly or audibly unchanged.
`
`It is also important that any method for providing security also
`
`function with broadcasting media over networks such as the Internet, which is also
`referred to as "streaming " Commercial "plug-in" products such as RealAudio and
`RealVideo, as well as applications by vendors VDONet and Xtreme, are common in
`such network environments. Most digital watermark implementations focus on
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1617
`
`

`

`WO 02/03385
`
`PCT/US00/18411
`
`4
`
`common file base signals and fail to anticipate the security of streamed signals. It is
`desirable that any protection scheme be able to function with a plug-in player
`without advanced knowledge of the encoded media stream.
`
`Other technologies focus solely on file-based security. These
`technologies illustrate the varying applications for security that must be evaluated
`for different media and distribution environments. Use of cryptolopes or
`cryptographic containers, as proposed by IBM in its Cryptolope product, and
`InterTrust, as described in U.S. Patents No. 4,827,508, 4,977,594, 5,050,213 and
`5,410,598, may discourage certain forms of piracy. Cryptographic containers,
`however, require a user to subscribe to particular decryption software to decrypt
`data
`IBM's InfoMarket and InterTrust's DigiBox, among other implementations,
`provide a generalized model and need proprietary architecture to function. Every
`user must have a subscription or registration with the party which encrypts the data.
`Again, as a form of general encryption, the data is scrambled or encrypted without
`regard to the media and its formatting. Finally, control over copyrights or other
`neighboring rights is left with the implementing party, in this case, IBM, InterTrust
`or a similar provider. Methods similar to these "trusted systems" exist, and
`Cerberus Central Limited and Liquid Audio, among a number of companies, offer
`systems which may functionally be thought of as subsets of IBM and InterTrust's
`more generalized security offerings. Both Cerberus and Liquid Audio propose
`proprietary player software which is registered to the user and "locked" in a manner
`parallel to the locking of content that is distributed via a cryptographic container.
`The economic trade-off in this model is that users are required to use each respective
`companies' proprietary player to play or otherwise manipulate content that is
`downloaded. If, as is the case presently, most music or other media is not available
`via these proprietary players and more companies propose non-compatible player
`formats, the proliferation of players will continue. Cerberus and Liquid Audio also
`by way of extension of their architectures provide for "near-CD quality" but
`proprietary compression. This requirement stems from the necessity not to allow'
`content that has near-identical data make-up to an existing consumer electronic
`standard, in Cerberus and Liquid Audio's case the so-called Red Book audio CD
`standard of 16 bit 44.1 kHz, so that comparisons with the proprietary file may not
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1618
`
`

`

`WO 02/03385
`
`PCT/US00/18411
`
`5
`
`5
`
`yield how the player is secured. Knowledge of the player's file format renders its
`security ineffective as a file may be replicated and played on any common player,
`not the intended proprietary player of the provider of previously secured and
`uniquely formatted content. This is the parallel weakness to public key crypto-
`systems which have gutted security if enough plain text and cipher text comparisons
`enable a pirate to determine the user's private key.
`Many approaches to digital watermarking leave detection and
`decoding control with the implementing party of the digital watermark, not the
`creator of the work to be protected. A set of secure
`
`watermark
`
`digital
`
`10
`
`implementations address this fundamental control issue forming the basis of key-
`
`based approaches. These are covered by the following patents and pending
`applications, the entire disclosures of which are hereby incorporated by reference:
`US Patent No. 5,613, 004 entitled "Steganographic Method and Device" and its
`derivative US patent application Serial No. 08/775,216, US patent application Serial
`No. 08/587,944 entitled "Human Assisted Random Key Generation and Application
`for Digital Watermark System," US Patent Application Serial No. 08/587,943
`entitled "Method for Stega-Cipher Protection of Computer Code," US patent
`application Serial No. 08/677,435 entitled "Optimization Methods for the Insertion,
`Protection, and Detection of Digital Watermarks in Digitized Data," and US Patent
`Application Serial No. 08/772,222 entitled "Z-Transform Implementation of Digital
`Watermarks." Public key crypto-systems are described in US Patents No.
`4,200,770, 4,218,582, 4,405,829 and 4,424,414, the entire disclosures of which are
`also hereby incorporated by reference.
`In particular, an improved protection scheme is described in "Method
`for Stega-Cipher Protection of Computer Code," US patent application Serial No.
`08/587,943. This technique uses the key-based insertion of binary executable
`computer code within a content signal that is subsequently, and necessarily, used to
`play or otherwise manipulate the signal in which it is encoded. With this system,
`however, certain computational requirements, such as one digital player per digital
`copy of content, may be necessitated. For instance, a consumer may download
`many copies of watermarked content. With this technique, the user would also be
`downloading as many copies of the digital player program. While this form of
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1619
`
`

`

`WO 02/03385
`
`PCT/US00/18411
`
`6
`
`5
`
`10
`
`15
`
`20
`
`security may be desirable for some applications, it is not appropriate in many
`circumstances. Finally, even when digital information is distributed in encoded
`form, it may be desirable to allow unauthorized users to play the information with a
`digital player, perhaps with a reduced level of quality. For example, a popular song
`may be encoded and freely distributed in encoded form to the public. The public,
`perhaps using commonly available plug-in digital players, could play the encoded
`content and hear the music in some degraded form. The music may sound choppy,
`or fuzzy or be degraded in some other way. This lets the public decide, based on the
`available lower quality version of the song, if they want to purchase a key from the
`publisher to decode, or "clean-up," the content. Similar approaches could be used to
`distribute blurry pictures or low quality video. Or even "degraded" text, in the sense
`that only authenticated portions of the text can be determined with the
`predetermined key or a validated digital signature for the intended message.
`
`In view of the foregoing, it can be appreciated that a substantial need
`exists for a method allowing encoded content to be played, with degraded quality, by
`a plug-in digital player, and solving the other problems discussed above.
`
`SUMMARY OF THE INVENTION
`The disadvantages of the art are alleviated to a great extent by a
`method for combining transfer functions with predetermined key creation. In one
`embodiment, digital information, including a digital sample and format information,
`
`is protected by identifying and encoding a portion of the format information.
`
`Encoded digital information, including the digital sample and the encoded format
`information, is generated to protect the original digital information.
`In another embodiment, a digital signal, including digital samples in a
`
`25
`
`file format having an inherent granularity, is protected by creating a predetermined
`
`key. The predetermined key is comprised of a transfer function-based mask set to
`manipulate data at the inherent granularity of the file format of the underlying
`
`digitized samples.
`With these and other advantages and features of the invention that
`will become hereinafter apparent, the nature of the invention may be more clearly
`understood by reference to the following detailed description of the invention, the
`appended claims and to the several drawings attached herein.
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1620
`
`

`

`WO 02/03385
`
`PCMJS00/18411
`
`7
`
`BRIEF DESCRIPTION OF 1HE DRAWINGS
`
`FIG. 1 is a block flow diagram of a method for copy protection or
`authentication of digital information according to an embodiment of the present
`
`invention.
`
`5
`
`DETAILED DESCRIPTION
`
`In accordance with an embodiment of the present invention, a method
`combines transfer functions with predetermined key creation. Increased security is
`
`achieved in the method by combining elements of "public-key steganography" with
`
`cryptographic protocols, which keep in-transit data secure by scrambling the data
`
`10
`
`with "keys" in a manner that is not apparent to those with access to the content to be
`distributed. Because different forms of randomness are combined to offer robust,
`
`distributed security, the present invention addresses an architectural "gray space"
`
`between two important areas of security: digital watermarks, a subset of the more
`
`general art of steganography, and cryptography. One form of randomness exists in
`
`15
`
`the mask sets that are randomly created to map watermark data into an otherwise
`
`The second form of-randomness is the random
`unrelated digital signal.
`permutations of data formats used with digital players to manipulate the content with
`
`the predetermined keys. These forms can be thought of as the transfer function
`
`versus the mapping function inherent to digital watermarking processes.
`
`20
`
`According
`
`to an embodiment of
`
`the present
`
`invention, a
`
`predetermined, or randomly generated, key is used to scramble digital information in
`
`a way that is unlike known "digital watermark" techniques and public key crypto-
`systems. As used herein, a key is also referred to as a "mask set" which includes
`
`one or more random or pseudo-random series of bits. Prior to encoding, a mask can
`
`25
`
`be generated by any cryptographically secure random generation process. A block
`
`cipher, such as a Data Encryption Standard (DES) algorithm, in combination with a
`
`sufficiently random seed value, such as one created using a Message Digest 5
`(MD5) algorithm, emulates a cryptographically secure random bit generator. The
`keys are saved in a database, along with information matching them to the digital
`signal, for use in descrambling and subsequent viewing or playback. Additional file
`format or transfer property information is prepared and made available to the
`encoder, in a bit addressable manner As well, any authenticating function can be
`
`30
`
`DISH-Blue Spike- 246
`Exhibit 1010, Page 1621
`
`

`

`WO 02/03385
`
`PCT/US00/18411
`
`8
`
`combined, such as Digital Signature Standard (DSS) or Secure Hash Algorithm
`(SHA).
`
`Using the predetermined key comprised of a transfer function-based
`mask set, the data representing the original content is manipulated at the inherent
`granularity of the file format of the underlying digitized samples.
`Instead of
`providing or otherwise distributing, watermarked content that is not noticeably
`altered, a partially "scrambled" copy of the content is distributed. The key is
`necessary both to register the sought-after content and to descramble the content into
`its original form.
`
`The present invention uses methods disclosed in

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket