throbber
7715068
`
`March 19, 2019
`
`THIS IS TO CERTIFY THAT ANNEXED IS A TRUE COPY FROM THE
`RECORDS OF THIS OFFICE OF THE FILE WRAPPER AND CONTENTS
`OF:
`
`APPLICATION NUMBER: 60/213,489
`FILING DATE: June 23, 2000
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0001
`
`

`

`Please type a plus sign (+) Inertia this box _.
`
`0561110133
`
`PROVISIONAL APPLICATION FOR PA TENT COVER SHEET (Small Entity)
`This is a request for filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53 to].
`
`'nIi'ILDI:
`outta/aniiilllillilillliiillilliiil
`
`
`
`
`Given Name (first and middle [if anyj)
`
`Residence (City and Either State or Foreign Country)
`
`Invemonisimnmcmns)
`
`'
`
`
`
`
`
`
`
`O E(- .2
`040‘ =, no =3
`mg E—B
`3-,... =3
`mag:
`«a 2“,
`tom E5
`0 E
`
` -
`
`Scott A.
`MDSKOWITZ
`Miami, Florida USA
`
`
`
`
`BERRY
`Albuquerque, New Mexico USA
`Michael
`
`
`
`
`
`I Additional inventors are being named on page 2 attached hereto
`TITLE OF THE iNVEN'nON (280 characters max]
`
`SECURE PERSONAL CONTENT SERVER
`
`
`
`
`State
`
`Telephone
`
`
`
`
`
`
`CORRESPONDENCE ADDRESS
`
`Direct all correspondence to:
`___..
`lilliiililllIllllliilliliill
`
`
`0”
`24735
`Firm or
`PATENT IRADEMARK OFFICE
`
`individual Name
`
`Address
`
`
`Address
`
`
`
`City
`
`
`ENCLOSED APPLICATION PARTS (check 3" fhafapplfl
`
`
`
` E Drawingts)
`E Specification
`NumberofPages I
`I] a
`D Small Entity Statement
`a :
`NumberofSheets
`
`
`METHOD OF PAYMENT OF FILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT {check one)
`
`FiLlNG FEE
`
`AMOUNT (3)
`D A check or money order is enclosed to cover the filing fees
`
`
`I
`The commissioner is hereby authorized to charge filing fees or I:,
`
`
`575.00
`.
`credit any overpayment to Deposit Account Number:
`-
`
`
`The invention was made by an agency oi the United states Govemmenl or under a contract with an agency of the United States GovernmenL
`No.
`
`D Yes, the name oithe U3. Gmremmenl agency and the Government contract number are:
`
`
`mitts
`Respectfully sub
`SIGNATURE
`' 63%“,
`Date
`June 23, 2000
`
`
`
`TYPED or
`
`TELEPHONE
`
`PRINTED NAME
`
`d B. Ch
`
`n
`
`1
`apma
`F oy
`
`202I639fl700
`
`
`
`REGISTRATION NO.
`(if appropriate)
`
`40,555
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PA TENT
`
`SEND TO: Box Provision of Application, Assistant Comicsinnerfor Patents, Washington, DC 20233
`
`[Pagelof
`
`I
`
`]
`
`‘1QSMALUREV04
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0002
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0002
`
`

`

`"ii?it!!!till‘iEEil
`
`
`
`
`L5;
`
`Iif}!"Eiiil{if}!"‘
`
`
`
`
`[EllHilli533
`
`Iune 23, 2000
`
`0661120138
`
`Inventors:
`
`Scott Moskowitz. 8: Michael Berry
`
`A Secure Personal Content Server
`
`Field of Invention
`
`The present invention relates to the secure distributiou of digitized value-
`added information, or media content, while preserving the ability of publishers
`to make available unsecure versions of the same value—added information, or
`
`media content, without adverse effect to the systems security.
`Authentication, verification and authorization are all handled with a
`
`combination of cryptographic and steganographic protocols to achieve efficient,
`trusted, secure exchange of digital information.
`
`Cross-Reference To Related Application
`
`This application is based on and claims the benefit of pending U.S. Patent
`Application Serial No. 60/ 147,134, filed 08/04/99, entitled, "A Secure Personal
`Content Server." MUST FOLLOW THIS SENTENCE WITH ONE OF THE TWO
`PARAGRAPHS BELOW
`
`This application also claims the benefit of the following applications:
`pending U.S. Patent Application Serial No. 09/046,627, filed 3/ 24/ 98, entitled
`"Method for Combining Transfer Function with Predetermined Key Creation";
`pending U.S. Patent Application Serial No. 09/ 053,628, filed 04/ 02/ 98, entitled
`"Multiple Transform Utilization
`and Application
`for
`Secure Digital
`Watermarking"; pending U.S. Patent Application Serial No. 60/169,274, filed
`12/7/99,
`entitled
`"Utilizing Data Reduction
`in Steganographic
`and
`Cryptographic Systems"; and U.S. Patent Application Serial No.
`, filed June 16, 2000, entitled ”Utilizing Data Reduction in Steganographic and
`Cryptographic Systems" (which is a continuation—in—part of PCT application No.
`PCT/USOO/ 06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999) All of the
`patent applications previously identified in this paragraph are hereby
`incorporated by reference, in their entireties.
`
`This application also claims the benefit of pending pending U.S. Patent
`Application Serial No. 08/999,766,
`filed 7/23/97, entitled ”Steganographic
`Method and Device”; pending U.S. Patent Application Serial No. 08/ 772,222,
`filed 12/20/96, entitled ”Z-Transform Implementation of Digital Watermarks”;
`pending U.S. Patent Application Serial No. 09/456,319, filed 12/08/99, entitled
`265112
`
`-1-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0003
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0003
`
`

`

`"Transform Implementation of Digital Watermarks"; pending US. Patent
`Application Serial No. 08/674,726, filed 7/2/96, entitled ”Exchange Mechanisms
`for Digital Information Packages with Bandwidth Securitization, Multichannel
`Digital Watermarks, and Key Management”; pending U.S. Patent Application
`Serial No. 09/545,589, filed 04/07/2000, entitled ”Method and System for Digital
`Watermarking”; pending US. Patent Application Serial No. 09/046,627, filed
`3/ 24/ 98, entitled ”Method for Combining Transfer Function with I’redetermined
`Key Creation”; pending U.S. Patent Application Serial No. 09/ 053,628, filed
`04/ 02/98, entitled ”Multiple Transform Utilization and Application for Secure
`Digital Watermarking”; pending US. Patent Application Serial No. 09/ 281,279,
`filed 3/ 30/ 99, entitled "Optimization Methods for the Insertion, Protection, and
`Detection...”,- US. Patent Application Serial No.
`, filed June 16,
`2000, entitled "Utilizing Data Reduction in Steganographic and Cryptographic
`Systems”
`(which
`is
`a
`continuation-in—part
`of PCT application No.
`PCT/ USOO/ 06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999); and
`pending US. Application No 60/ 169,274,
`filed 12/7/99, entitled “Systems,
`Methods And Devices For Trusted Transactions.” All of the patent applications
`previously identified in this paragraph are hereby incorporated by reference, in
`their entireties.
`
`Summagg of the Invention
`Digital
`technology offers economies of scale to value—added data not
`possible with physical or tangible media distribution. The ability to digitize
`information both reduces the cost of copying and enables perfect copies. This is
`an advantage and a disadvantage to commercial publishers who must weigh the
`cost reduction against the real threat of unauthorized duplication of their value-
`added data content.
`Because cost
`reduction is an important business
`consideration, securing payment and authenticating individual copies of digital
`information (such as media content) presents unique opportunities
`to
`information service and media content providers. The present invention seeks to
`leverage the benefits of digital distribution to consumers and publishers alike,
`while ensuring the development and persistence of trust between all parties, as
`well as with any third parties involved, directly or indirectly,
`in a given
`transaction.
`
`In another approach that is related to this goal, there are instances where
`transactions must be allowed to happen after perceptually-based digital
`information can be authenticated.
`(Perceptually based information is
`information whose value is in large part, based upon its ability to be perceived
`by a human, and includes for example, acoustic, psychoacoustic, visual and
`psychovisual information.) The process of authenticating before distributing will
`become increasingly important for areas where the distributed material is related
`265112
`
`-2-
`
` ;
`
`=3
`
`
`
`,4
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0004
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0004
`
`

`

`
`
`
`
`"113'Ellitill'Eiilil
`
`..,
`ml»5:-
`
`
`
`
`illlltiltiii:
`
`to a trust-requiring transaction event. A number of examples exist. These
`include virtual retailers (for example, an on—line music store selling CD5 and
`electronic versions of songs); service providers (for example, an on-line bank or
`broker who performs transactions on behalf of a consumer); and transaction
`providers (for example, wholesalers or auction houses). These parties have
`different authentication interests and requirements. By using the teachings of
`this application, these interests and requirements may be separated and then
`independently quantified by market participants in shorter periods of time.
`is
`All parties in a transaction must authenticate information that
`In
`perceptually observable before trust between the parties can be established.
`today's world, information (including perceptually rich information) is typically
`digitized, and as a result. can easily be copied and redistributed, negatively
`impacting buyers,
`sellers and other market participants.
`Unauthorized
`redistribution confuses authenticity, non-repudiation, limit of ability and other
`important "transaction events." In a networked environment, transactions and
`interactions occur over a transmission line or a network, with buyer and seller at
`different points on the line or network. While such electronic transactions have
`the potential to add value to the underlying information being bought and sold
`(and the potential to reduce the cost of the transaction), instantaneous piracy can
`significantly reduce the value of the underlying data, if not wholly destroy it.
`Even the threat of piracy tends to undermine the value of the data that might
`otherwise exist for such an electronic transaction.
`
`Related situations range from the ability to provably establish the
`”existence" of a virtual financial institution to determining the reliability of an
`”electronic stamp." The present invention seeks to improve on the prior art by
`describing optimal combinations of cryptographic and steganographic protocols
`for ”trusted” verification,
`confidence
`and non-repudiation of digitized
`representations of perceptually rich information of the actual seller, vendor or
`other associated institutions which may not be commercial in nature (confidence
`building with logo’s such as the SEC, FDIC, Federal Reserve, FBI, etc. apply). To
`the extent that an entity plays a role in purchase decisions made by a consumer
`of goods and services relating to data, the present invention has a wide range of
`beneficia] applications. One is enabling independent trust based on real world
`representations that are not physically available to a consumer or user. A second
`is the ability to match informational needs between buyers and sellers that may
`not be universally appealing or cost effective in given market situations. These
`include auction models based on recognition of the interests or demand of
`consumers and market participants—which make trading profitable by focusing
`specialized buyers and sellers. Another use for the information matching is to
`establish limits on the liability of such institutions and profit—seeking entities,
`such as
`insurance providers or credit companies.
`These vendors
`lack
`appropriate tools for determining intangible asset risk or even the value of the
`information being exchanged. By encouraging separate and distinct ”trust”
`265112
`
`-3-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0005
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0005
`
`

`

`
`
`"ii?iii?lililEEEEli
`
`
`
`
`
`
`
`
`
`tilliii}!EEEECE35355!liiilllillil'“tilt:{till“ll"il{EEC
`
`
`
`
`
`
`
`
`
`arrangements over an electronic network, profitable market-based relationships
`can result
`
`The present invention can make possible efficient and openly accessible
`markets for tradable information. Existing transaction security (including on—line
`credit cards, electronic cash or its equivalents, electronic wallets, electronic
`tokens, etc.) which primarily use cryptographic techniques
`to secure a
`transmission channel——but are not directly associated or dependent on the
`information being sold--fails to meet this valuable need. The present invention
`proposes a departure from the prior art by separating transactions from
`authentication in the sale of digitized data. Such data may include videos, songs,
`images, electronic stamps, electronic trademarks, and electronic logos used to
`ensure membership in some institutional body whose purpose is to assist in a
`dispute, limit liability and provide indirect guidance to consumers and market
`participants, alike.
`the present invention
`With an increasingly anonymous marketplace,
`offers invaluable embodiments to accomplish ”trusted” transactions in a more
`flexible, transparent manner while enabling market participants to negotiate
`terms and conditions. Negotiation may be driven by predetermined usage rules
`or parameters, especially as the information economy offers potentially many
`competitive marketplaces in which to transact,
`trade or exchange among
`businesses and consumers. As information grows exponentially,
`flexibility
`becomes an advantage to market participants, in that they need to screen, filter
`and verify information before making a transaction decision. Moreover, the
`accuracy and speed at which decisions can be made reliably enables confidence
`to grow with an aggregate of "trusted transactions”.
`"Trusted transactions"
`beget further ”trusted transactions" through experience. The present invention
`also provides for improvements over the prior art in the ability to utilize
`different independently important ”modules” to enable a “trusted transaction”
`using competitive cryptographic and steganographic elements, as well as being
`able to support a wide variety of perceptually—based media and information
`formats. The envisioned system is not bound by a proprietary means of creating
`recognition for a good or service, such as that embodied in existing closed
`system. Instead, the flexibility of the present invention will enable a greater and
`more diverse information marketplace.
`The present invention is not a “trusted system”, per se, but “trusted
`transactions” are enabled, since the same value-added information that is sought
`may still be in the clear, not in a protected storage area or closed, rule-based
`"inaccessible virtual environment”.
`
`A related additional set of embodiments regards the further separation of
`the transaction and the consumer's identification versus the identification of the
`
`transaction only. This is accomplished through separated “trusted transactions”
`bound by authentication, verification and authorization in a transparent manner.
`With these embodiments, consumer and vendor privacy could be incorporated.
`265112
`
`-4-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0006
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0006
`
`

`

`"NT2535!!lllliilEEEli
`
`
`
`
`iiiffh1153?!"iiiiii:
`
`.355‘iii
`
`
`
`
`it}!it‘ll
`
`More sophisticated relationships are anticipated between parties, who can mix
`information about their physical goods and services with a transparent means for
`consumers, who may not be known to the seller, who choose not to confide in an
`inherently closed ”trusted system” or provide additional personal information or
`purchasing information (in the form of a credit card or other electronic payment
`system), in advance of an actual purchase decision or ability to observe (audibly
`or visibly) the content in the clear. This dynamic is inconsistent with the prior
`art’s emphasis on access control, not
`transparent access to value-added
`information (in the form or goods or services), that can be transacted on an
`electronic or otherwise anonymous exchange.
`These embodiments may include decisions about availability of a
`particular good or service through electronic means, such as the Internet, or
`means
`that
`can be modularized to conduct
`a
`transaction based
`on
`interconnection of various users (such as WebTV, a Nintendo or Sony game
`console with network abilities, cellular phone, PalmPilot, etc.).
`These
`embodiments may additionally be implemented in traditional auction types
`(including Dutch auctions). Consumers may view their anonymous marketplace
`transactions very differently because of a lack of physical human interactions,
`but
`the present
`invention can enable realistic transactions to occur by
`maintaining open access and offering strict authentication and verification of the
`information being traded. This has the effect of allowing legacy relationships,
`legacy information, and legacy business models to be offered in a manner which
`more closely reflects many observable transactions in the physical world. The
`tremendous benefits to sellers and consumers is obvious; existing transactions
`need not reduce their expectations of security. As well, the ability to isolate and
`quantify aspects of a transaction by module potentially allows for better price
`determinations of intangible asset insurance, transaction costs, advertising costs,
`liability, etc. which have physical world precedent.
`It is contemplated that the publisher and/ or owner of the copyrights will
`want to dictate restrictions on the ability of the purchaser to use the data being
`sold. Such restrictions can be implemented through the present invention, which
`presents a significant advantage over the prior art (which attempts to effect
`security through access control and attempted fight reigns over distribution).
`See US Pat. No. 5,428,606 for a discussion on democratizing digital information
`exchange between publishers and subscribers of said information.
`A goal for providers of value-added content is to maximize profits for the
`sale of their content Marketing and promotion of the informatiOnal content
`cannot be eliminated, considering the ever increasing amount of information
`vying for consumers and other market participant’s attention. Nonetheless, in a
`market where the goods are speculatively valued, marketing budgets are
`inherently constrained, as you are trying to create demand for a product with
`little inherent value. Where such markets have participants, both buyers and
`sellers and their respective agents, with access to the same information in real
`265112
`
`-5-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0007
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0007
`
`

`

`
`
`time, market mechanisms efficiently price the market goods or services. These
`markets are characterized by ”price commoditization” so buyers and sellers are
`limited to differentiating their offerings by selection and service.
`If the markets
`are about information itself, it has proven more difficult to accurately forecast the
`target price where sellers can maximize their profits. Quality and quantity
`provide different evaluation criteria of selection and service relating to the
`information being traded. The present invention regards a particular set of
`implementations of value-added content security in markets which may include
`unsecure and secure versions of the same value—added data (such as songs,
`video, research, pictures, electronic logos, electronic trademarks, value-added
`information, etc).
`Transactions for value-added information can occur without any physical
`location. So, there is a need for a secure personal content server for which the
`value added information can be offered for transactions in a manner similar to
`real world transactions. One feature is to offer seemingly similar value added
`information in differing quality settings.
`These settings have logical
`relationships with fidelity and discreteness and are determined by market
`participants. Another issue is that because purchasers may be anonymous to
`sellers, it is more important to have a particular value~added information object
`available so that market participants can fulfil there role are consumers.
`One fundamental weakness of current information markets is the tack of
`mechanisms to ensure that buyers and sellers can reach pricing equilibrium.
`This deficit is related to the ”speculative” , ”fashion”, and ”vanity" aspects of
`perceptual content (such as music, video, and art or some future recognition to
`purchasers). For other goods and services being marketed to an anonymous
`marketplace, market participants may never see (and indeed, may choose to
`never see, an actual location where the transaction may physically occur. A
`physical location may simply not exist. There are a number of such virtual
`Operations in business today, which would benefit from the improvements
`offered under the present system.
`The present invention also seeks to provide improvements to the art in
`enabling a realistic model for building trust between parties (or their agents) not
`in a ”system”, per se. Because prior art systems lack any inherent ability to allow
`for information to flow freely to enable buyers and sellers to react to changing
`market conditions. The present invention can co-exist with these ”trusted
`systems” to the extent that all market participants in a given industry have
`relatively similar information with which to price value-added data.
`The
`improvement over such systems, however, addresses a core features in most
`data—added value markets: predictions, forecasts, and speculation over the value
`of information is largely a unsuccessful activity for buyers and sellers alike. The
`additional improvement is the ability to maintain security even with unsecure or
`legacy versions of value-added information available to those who seek choices
`that fit less quantitative criteria—“aesthetic quality” of the information versus
`265112
`
`-6-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0008
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0008
`
`

`

`
`
`"it?'[Liiilililiiii
`
`
`
`2::re‘EiiiiJJIIZiiis.is:itii}:
`
`
`
`
`
`iii]!till'ilii
`
`”commercial price”. Purchase or transaction decisions can be made first by
`authenticating an electronic version of a song, image, video, trademark, stamp,
`currency, etc.
`Additional anticipated improvements include the ability to support
`varying pricing models such as auctions that are difficult or impossible to
`accomplish under existing prior art that leaves all access and pricing control with
`the seller alone, and the separation of the transaction from the exchange of the
`value-added information, which gives more control
`to buyers over
`their
`identities and purchasing habits, (both sensitive and separately distinct forms of
`”unrelated” value—added information). Essentially, no system known in the art
`allows for realistic protocols to establish trust between buyers and sellers in a
`manner more closely reflecting actual purchasing behavior of consumers and
`changing selling behavior of sellers. The goal in such transactions is the creation
`of trust between parties as well as ”trusted relationships” with those parties. The
`present invention is an example of one such system for media content where the
`”aesthetic” or ”gestalt” of the underlying content and its characteristics is a
`component of buying habits. Without an ability to open distribution systems to
`varying buyers and sellers, media content may be priced at less than maximum
`economic value and buyers may be deprived of a competitive, vigorous
`marketplace
`for
`exciting media
`content
`from many different creative
`participants.
`To the extent that recognition plays such a key role in an information
`economy, value—added data should be as accessible as possible to the highest
`number of market participants in the interests of furthering creativity and
`building a competitive marketplace for related goods and services. This is to the
`benefit of both buyers and sellers as well as the other participants in such an
`economic ecosystem, The Internet and other transmission-based transactions
`with unknown parties presents a number of chailenges to information vendors
`who wish to deveIOp customer relations,
`trust and profitable sales.
`The
`information economy is largely an anonymous marketplace,
`thus, making it
`much more difficult to identify consumers and sellers. The present invention
`provides remedies to help overcome these weaknesses.
`The present invention is concerned with methods and systems which
`enable secure, paid exchange of value-added information, while separating
`transaction protocols. The present invention improves on existing means for
`distribution control by relying on authentication, verification and authorization
`that may be flexibly determined by both buyers and sellers.
`These
`determinations may not need to be predetermined, although pricing matrix and
`variable access to the information opens additional advantages over the prior art.
`The present invention offers methods and protocols for ensuring value-added
`information distribution can be used to facilitate trust in a large or relatively
`anonymous marketplace (such as the Internet’5 World Wide Web).
`
`26.5112
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0009
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0009
`
`

`

`
`
`We now define components of the preferred embodiments for methods,
`systems, and devices.
`
`Definitions:
`
`Local Content Server (LCS): A device or software application which can
`securely store a collection of value-added digital content. The LCS has a unique
`ID.
`
`Secure Electronic Content Distributor (SECD): An entity, device or
`software application which can validate a transaction with a LCS, process a
`payment, and deliver digital content securely to a LCS.
`In cryptographic terms,
`the SECD acts as a “certification authority” or its equivalent. SECDs may have
`differing arrangements with consumers
`and providers of value—added
`information.
`
`Satellite Unit (SU): A portable medium or device which can accept secure
`digital content from a LCS through a physical, local connection and which can
`either play or make playable the digital content. The SU may have other
`functionality as it relates to manipulating the content, such as recording. The SU
`has a unique ID.
`LCS Domain: A secure medium or area where digital content can be
`stored, with an accompanying rule system for transfer of digital content in and
`out of the LCS Domain.
`
`SecureChannelm: A secure channel to pass individualized content to
`differentiate authentic content from legacy or unauthorized, pirated content.
`SecureChannel may carry a value—adding component (VAC).
`Standard Quality: A transfer path into the LCS Domain which maintains
`the digital content at a predetermined reference level or degrades the content if it
`is at a higher quality level. In an audio implementation, this might be defined as
`Red Book CD Quality (44100 Hz., 16 bits, 2 channels).
`Low Quality: A transfer path into the LCS Domain which degrades the
`digital content to a sub—reference level.
`In an audio implementation, this might
`be defined as below CD Quality (for instance, 32000 Hz., 16 bits, 2 channels).
`High Quality: A transfer path into the LCS Domain which allows digital
`content of any quality level to pass unaltered.
`Rewritable Media: An mass storage device which can be rewritten (e.g.
`hard drive, CD—RW, Zip cartridge, M-O drive, etc. . .).
`Read-Only Media: A mass storage device which can only be written once
`(e.g. CID-ROM, CD—R, DVD, DVD-R, etc...) Note: pre-recorded music, video,
`software, or images, etc. are all ”read only” media.
`Unique ID: A Unique ID is created for a particular transaction and is
`unique to that transaction (roughly analogous to a human fingerprint). One
`way to generate a Unique ID is with a one-way hash function. Another way is
`by incorporating the hash result with a message into a signing algorithm will
`create a signature scheme. For example, the hash result may be concatenated
`265112
`
`-3”
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0010
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0010
`
`

`

`
`
`to the digitized, value added information which is the subject of a transaction.
`Additional uniqueness may be observed in a hardware device so as to
`differentiate that device, which may be used in a plurality of transactions,
`from other similar devices.
`
`Value-added: Value-added information is differentiated from non-
`commoditized information in terms of its marketability or demand, which can
`vary, obviously, from each market that is created for the information. By way
`of example, information in the abstract has no value until a market is created
`for the information (i.e., the information becomes a commodity). The same
`information can be packaged in many different forms, each of which may have
`different values. Because information is easily digitized, one way to package
`the "same” information differently is by different levels of fidelity and
`discreteness. Value is typically bounded by context and consideration.
`Authentication: A receiver of a ”message” (embedded or otherwise
`within the value-added information) should be able to ascertain the original of
`the message (or by effects, the origin of the carrier within which the message is
`stored). An intruder should not be able to successfully represent someone else.
`Additional functionality such as Message Authentication Codes (MAC) could be
`incorporated (a one-way hash function with a secret key) to ensure limited
`verification or subsequent processing of value-added data.
`Verification:
`In cryptographic terms, ”verification” serves the “integrity”
`function to prevent an intruder from substituting false messages for legitimate
`ones. In this sense, the receiver of the message (embedded or otherwise present
`within the value-added information) should be assured that the message was not
`modified or altered in transit.
`
`One way hash function: One-way hash functions are known in the art.
`The way in which the hash is generated is defined in such a way that does not
`depend on the characteristics of the input, though certainly the hash function
`can operates on in an input signal. The output is a hash value which is not
`secret, but it is computationally unfeasible to determine the pre-image that
`hashes to the hash value.
`
`Authorization: A term which is used broadly to cover the acts of
`conveying official sanction, permitting access or granting legal power to an
`entity.
`
`For non digitally-sampled data, encryption is data
`Encryption:
`scrambling using keys. For value-added or information rich data with content
`characteristics, encryption is typically slow or inefficient because content file
`sizes tend to be generally large. Encrypted data is called ”ciphertext”.
`to
`refers
`Scrambling:
`For
`digitally~sampled
`data,
`scrambling
`manipulations of the value-added or information rich data at the inherent
`granularity of the file format. The manipulations are associated with a key,
`which may be made cryptographically secure or broken into key pairs.
`Scrambling is efficient for larger media files and can be used to provide content
`in less than commercially viable or referenced quality levels. Scrambling is not
`265112
`
`-9-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0011
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0011
`
`

`

`
`
`these applications, but provide more fitting
`as secure as encryption for
`manipulation of media rich content in the context of secured distribution.
`Scrambled data is also called ”ciphertext” for the purposes of this invention.
`Encryption generally acts on the data as a whole, whereas scrambling is
`applied often to a particular subset of the data concerned with the granularity
`of the data, for instance the file formatting. The result is that a smaller amount
`of data is “encoded” or "processed” versus strict encryption, where all of the
`data is “encoded" or ”processed.” By way of example, a cable TV signal can he
`scrambled by altering the signal which provides for horizontal and vertical
`tracking, which would alter only a subset of the data, but not all of the data—
`which is why the audio signal is often untouched. Encryption, however,
`would generally so alter the data that no recognizable signal would be
`perceptually appreciated. Further, the scrambled data can be compared with
`the unscrambled data to yield the scrambling key. The difference with
`encryption is that the ciphertext is not completely random,
`that is,
`the
`scrambled data is still perceptible albeit in a lessened quality. Unlike
`watermarking, which maps a change to the data set, scrambling is a transfer
`function which does not alter or modify the data set.
`
`Detailed Discussion of Invention
`The LCS Domain is a logical area inside which a set of rules governing
`content use can be strictly enforced.
`The exact rules can vary between
`implementations, but in general, unrestricted access to the content inside the LCS
`Domain is disallowed. The LCS Domain has a set of paths which allow content
`to enter the domain under different circumstances. The LCS Domain also has
`paths which allow the content to exit the domain.
`The act of entering the LCS Domain includes a verification of the content
`(an authentication check). Depending upon the source of the content, such
`verification may be easier or harder. Unvalidateable content will be

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket