throbber
7715068
`
`March 19, 2019
`
`THIS IS TO CERTIFY THAT ANNEXED IS A TRUE COPY FROM THE
`RECORDS OF THIS OFFICE OF THE FILE WRAPPER AND CONTENTS
`OF:
`
`APPLICATION NUMBER: 60/147,134
`FILING DATE: August 04, 1999
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0001
`
`

`

`.
`
`.
`
`,
`
`Docket Number:
`
`0661123133
`
`This is a request for filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53 (c}.
`
`INVENTOR(S)1APPLICANT{S)
`
`
`tullllllll
`'it'si1°
`
`it"s.limit
`
`ii
`3133
`
`sis/tiller
`
`:
`
`II
`
`1'1
`
`on
`
`Please type a plus sign (+) inside this box —n E
`i
`iii
`9199PROVISIONAL APPLICATION FOR PATENT COVER SHEET (Small Entity)
`iiliiii
`
`
`MOSKOWITZ
`Miami. Florida USA
`
`
`BERRY
`Alhuquerque,New Mexico USA
`
`
`
`
`I Additional inventors are being named on page 2 attached hereto
`TITLE OF THE INVENTION (290 characters max}
`
`A SECURE PERSONAL CONTENT SERVER
`
`
` CORRESPONDENCE ADDRESS
`
`Direct ail correspondence to:
`
`Piece Customer Number
`E] CustomerNumber
`'_" i
`BarCodeLabelhere
`
`
`
`
`
`
`
`Firm 0!
`
`
`
`
`K4
`Floyd B. Chapman, Esq.
`lndlvidual Name
`
`
`
`Baker 8: 30115. L.L.P.
`
`
`1299 Pennsylvania Avenue. N.W.
`
`ZIP
`20004-2400
`
`Washington
`
`mamas-7390
`Telephone
`2021'639-7700
`
`
`
`
`ENCLOSED APPLICATION PARTS {check an that apply}
`
`
`
`
`
`
`M Specification
`NumberofPages
`D Small Entity Statement
`
`
`V
`>
`.
`Dram-19(9)
`NumberofShaets
`El Other (spactfy)
`
`
`
`
`
`
`
`METHOD OF PAYMENT OF FILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT (check one)
`v
`FILING FEE
`AMOUNT (5)
`A check or money order is enclosed to cover the filing fees
`The Commissioner is hereby authorized to charge filing fees or
`$75.00
`‘
`i
`credit any overpayment to Deposit Account Number:
`
`
`The invention was made by an agency of the United Slates Government or under a contrac1wlth an agency of H16 United States Government.
`No.
`
`1
`
`
`
`
`
`
`
`D Yes. the name of the U5 Government agency and the Government contract number are:
`
`
`Respectfuib/ submitted,
`
`
`
`
`
`August 4, 1999
`SIGNATURE QM 6M Date
`
`TYPED or PRINTED NAME Floyd 3. Chapman
`REG'STRAT'ON “0'
`49,555
`(If appropriate)
`
`TELEPHONE
`
`20215393709
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`SEND TO: Bax Provisionai Application, Assistant Comissionerfor Patents, Washington, DC 20231
`[Page 1 of
`|
`mesmwnavm
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0002
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0002
`
`

`

`August 4, 1999
`
`0661110133
`
`Inventors:
`
`Scott Moskowitz 6: Michael Berry
`
`A Secure Personal Content Server
`
`Field of Invention
`The present invention relates to the secure distribution of digitized value-
`added information, or media content, while preserving the ability of publishers
`to make available unsecure versions of the same value-added information, or
`media content, without adverse effect to the systems security.
`Authentication, verification and authorization are all handled with a
`combination of cryptographic and steganographic protocols to achieve efficient,
`trusted, secure exchange of digital information.
`
`Summary of the Invention
`Digital technology offers economies of scale to value—added data not
`possible with physical or tangible media distribution. The ability to digitize
`information both reduces the cost of copying and enables perfect copies: an
`advantage and a disadvantage to commercial publishers who face the real threat
`of unauthorized duplication of their value—added data content. Where cost
`reduction is an important business consideration, securing payment and
`authentication of an individual copy of digital
`information, such as media
`content, presents unique opportunities to information service and media content
`providers with the appropriate tools. The present invention seeks to leverage the
`benefits of digital distribution to consumers and publishers alike, while ensuring
`the development and persistence of trust between these parties, or third parties
`involved, directly or indirectly, in a given transaction.
`In another approach that is related to this goal, there are instances Where
`transactions must be allowed to happen after perceptuallyrbased [acoustic
`(hearingl/psychoacoustic (perceived hearing) or visual (viewing)/psychovisual
`(perceived viewing)] digital information can be authenticated. This type of
`verification will become increasingly important for areas where the distributed
`material relates more to a provided, trust—requiring transaction event. A number
`of examples exist. These include virtual retailers (for example, an on—line music
`store selling CDs and electronic versions of songs); service providers (for
`example, an on-line bank or broker who performs transactions on behalf of a
`consumer),- tranSaction providers (for example, wholesalers or auction houses).
`These parties rely on different authentication issues which can be separated and
`independently quantified or qualified by market participants in shorter periods
`of time under what is described by the present invention.
`is
`Any party who must establish authentication of information that
`perceptually-observed, by nature of media content-richness, by users or market
`
`DCOI :229 l 39
`
`"w-Mm:iillllI]fill.J:..
`37.75...
`
`
`ii:
`
`in
`
` Wu11'"):u-“n
`
`"n.rii?!.u5l'.lll..“-.-:§l'11.:
`
`.n31
`117‘liar
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0003
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0003
`
`

`

`participants. This information is typically digitized, and may be perceptually
`based in nature, can easily be copied and redistributed, negatively impacting
`buyers and sellers or other market participants, in confusing authenticity, non-
`repudiation, limit of liability and other important ”transaction events”.
`In a
`networked environment, transactions and interactions occur over a transmission
`line between a buyer and seller, or networked groups of users (Internet
`communities, closed electronic trading environments, etc). While network
`effects may lead to increasing economic utility of the underlying value«added
`information: in the absolute instantaneous piracy can render the economic value
`of the good and services being offered to zero, or less than optimal profit
`positions.
`Related situations extend to instances ranging from the ability to provably
`establish the ”existence” of a virtual financial institution to determining the
`reliability of an ”electronic stamp”. The present invention seeks to improve on
`the existing prior art by describing optimal combinations of cryptographic and
`steganographic protocols
`for ”trusted” verification, confidence and non“
`repudiation of perceptually-based, digitized representations of the actual seller,
`vendor or another associated institution which may not be commercial in nature
`(confidence building with logo’s such as the SEC, FDIC, Federal Reserve, FBI, etc.
`apply). To the extent that an entity plays a role in purchase decisions made by a
`consumer of goods and services that are not physically present for the actual
`transaction, the present invention has a wide range of beneficial applications.
`One is enabling independent trust based on real world representations that are
`not physically available to a consumer or user. The ability to match information
`needs between buyers and sellers that may not be universally appealing or cost
`effective in given market situations. These include auction models based on
`recognition of the interests or demand of consumers and market participants——
`and serves to assist in narrowing and focusing profitable trade between parties.
`Another is to establish limits on the liability of such institutions and profit-
`seeking entities, such as insurance providers or credit companies. These vendors
`lack appropriate tools for determining intangible asset risk and exposure, value-
`added information is such an aSSet. By encouraging separate and distinct “trust”
`arrangements over an electronic network, profitable, market-based relationships
`can result.
`Utilizing the present invention in one of its many embodiments, efficient,
`openly accessible markets for trade-based information can be made possible.
`Existing transaction security, including on—line credit card purchasing, electronic
`cash or its equivalents, wallets, electronic tokens, etc. which primarily use
`cryptographic techniques to secure a transmission channel but are not directly
`associated or dependent on the value—added information being transacted or
`purchased fails to meet this valuable need. The present invention proposes a
`departure from the prior art by separating transactions from authentication of
`digitized data. These data may include videos, songs, images, electronic stamps,
`electronic trademarks, electronic logos used to ensure membership in some
`
`DCUI :229 l 39
`
`-2-
`
`Lilitlr-l
`
`.rl"“""1r"‘JI'
`"if”..lil-‘Sx...it:'15.:
`
`
`
`re):n“liii;liiii'ii‘it3-1:!itsnet....
`
`n ma
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0004
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0004
`
`

`

`3;;
`:3:
`tef
`'
`;
`
`
`
`institutional body whose purpose is to assist in a dispute, limit liability and
`provide indirect guidance to consumers and market participants, alike.
`Buyers' should still beware: but with an increasingly anonymous
`marketplace, the present invention offers invaluable embodiments to accomplish
`"trusted” transactions in a more flexible, transparent manner while enabling
`market participants to negotiate terms and conditions. Negotiation should not
`only be seller driven through predetermined usage rules or parameters,
`especially as the information economy offers potentially many competitive
`marketplaces in which to transact, trade or exchange among businesses and
`consumers.
`As
`information grows exponentially,
`flexibility becomes an
`advantage to market participants, in that they need to screen, filter and verify
`information in making a transaction decision. Moreover, the accuracy and speed
`at which decisions can be made reliably enables confidence to grow with an
`aggregate of ”trusted transactions”.
`“Trusted transactions” beget
`further
`”trusted transactions" through experience. The present invention also provides
`for
`improvements over
`the prior art
`in the ability to utilize different
`independently important "modules” to enable a “trusted transaction” using
`competitive cryptographic and steganographic elements, as well as being able to
`support a wide variety of perceptually~based media and information formats.
`The envisioned system is not bound by a proprietary means of creating
`recognition for a good or service, such as that envisioned in existing closed
`system.
`Instead, the flexibility of the present invention’s architecture is sure to
`enable a greater and more diverse information marketplace.
`The present invention is not a "trusted system”, per say, but "trusted
`transactions" are enabled, since the same value—added information that is sought
`may still be in the clear, not in a protected storage area or closed, rule-based
`"inaccessible virtual environment”.
`A related additional set of embodiments regards the further separation of
`the transaction and the consumer’s identification versus the identification of the
`transaction only. This is accomplished through separated ”trusted transactions”
`bound by authentication, verification and authorization in a transparent manner.
`With these embodiments, consumer and vendor privacy could be incorporated.
`More sophisticated relationships are anticipated between parties, who can mix
`information about their physical goods and services with a transparent means for
`consumers, who may not be known to the seller, who choose not to confide in an
`inherently closed ”trusted system” or provide additional personal information or
`purchasing information (in the form of a credit card or other electronic payment
`system), in advance of an actual purchase decision or ability to observe (audibly
`or visibly) the content in the clear. This dynamic is inconsistent with existing
`systems’ emphasis on access control, not transparent access to value-added
`information (in the form or goods or services), that can be transacted on an
`electronic or otherwise anonymous exchange.
`These embodiments may include decisions about availability of a
`particular good or service through electronic means (recognition, search engine
`
`DOG] :229I39
`
`-3-
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0005
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0005
`
`

`

`function or find, so-called push, functions), such as the Internet, or means that
`can be modularized to conduct a transaction based on the present invention
`(such as WebTV, a Nintendo or Sony game console which can be networked,
`cellular phone, PalmPiiot, etc.) that may have the capability of interconnections
`with a network of users (including sellers and consumers). Additionally,
`modularity of price and service desired by the consumer and available by the
`seller (fixed price, Dutch auction where the consumer fixes a price, auction where
`a market of buyers and sellers can ”decide” a price). Consumers may View their
`anonymous marketplace transactions very differently because of a lack of
`physical human interactions, but the present
`invention can enable realistic
`transactions
`to occur by maintaining open access
`and offering strict
`authentication and verification of value-added information. This has the effect of
`allowing legacy relationships, legacy information, and legacy business models to
`be offered in a manner which more closely reflects many observable transactions
`in the physical world. The tremendous benefits to sellers and consumers is
`obvious but the ability to isolate and quantify aspects of an over transaction by
`module potentially allows for better price determinations of intangible asset
`insurance, transaction costs, advertising costs, liability, etc. which have physical
`world precedent. In some embodiments, standardization or government support
`are surely anticipated, as the physical world will undoubtedly continue to make
`legal determinations in transactions under dispute.
`An important area of the prior art is discussed under the heading of
`"trusted systems” which architecturally enable users, almost always
`the
`publisher or rights owner, to set rules which bind digitized information copies to
`an inflexible and ”containerized” architecture. System security is typically based
`on persistence of access control over the content in a variety of implementations,
`with access and subsequent usage being tightly tied into the distribution system.
`The prior art has many disclosures which fail to mimic the real world and, in
`effect, eliminate impulse buying, sampling, re-creation of existing works, making
`a transaction more transparent to consumers, providing for support of both
`controlled and uncontrolled value-added information within the same system,
`and other important aspects of information distribution that cannot be predicted
`in advance of more open consumer access or recognition of the information in
`question. See US Pat. No. 5,428,606 for a discussion on democratizing digital
`information exchange between publishers and subscribers of said information.
`A goal for providers of value-added content is to maximize profits for the
`sale of their content. Marketing and promotion of this content still requires
`costly advertising that will not be eliminated with an ever—increasing amount of
`information vying for consumers and other market participants attention.
`Pricing, when inflexible, and expense limitations in creating recognition of a
`particular piece of value-added content are inherent to the nature of a market for
`speculativeiy valued goods. Where such markets have participants, both buyers
`and sellers and their respective agents, with access to the same information in
`real time, market mechanisms efficiently price the market goods or services.
`
`DCGJ 2229 l 39
`
`-4-
`
`
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0006
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0006
`
`

`

`These markets are characterized by ”price commoditization” so buyers and
`sellers are limited to differentiating their offerings by selection and service. if the
`markets are about information itself, it has proven more difficult to accurately
`forecast the market price where sellers maximize their profits. Quality and
`quantity provide different evaluation criteria of selection and service relating to
`the value—added information to be traded. The present invention regards a
`particular set of implementations of value-added content security in markets
`which may include unsecure and secure versions of the same value~added data
`(such as songs, video, research, pictures, electronic logos, electronic trademarks,
`value-added information, etc).
`One fundamental weakness with systems known to those skilled in the art
`is the lack of mechanisms to ensure that buyers and sellers can reach pricing
`equilibrium. This deficit is related to the “speculative”, “fashion”, ”vanity”
`aspect of perceptual content (such as music, video, and art or some future
`recognition to purchasers). For other goods and services being marketed to an
`anonymous marketplace, market participants may never or choose never to see
`an actual
`location with which the transaction is being sought. A physical
`location may simply not exist. There are number of such virtual operations in
`business today who would benefit from the improvements offered under the
`present system.
`The present invention also seeks to provide improvements to the art in
`enabling a realistic model for building trust between parties (or their agents) not
`in a ”system", per se. Because prior art systems lack any inherent ability to allow
`for information to flow freely to enable buyers and sellers to react to changing
`market conditions, as a matter of maintaining ”security”. The present invention
`can co-exist with these "trusted systems” to the extent
`that all market
`participants in a given industry have relatively similar information in which to
`price value—added data.
`The improvement over such systems, however,
`addresses a core features in most data-added value markets: predictions,
`forecasts, and speculation over the value of information is largely a unsuccessful
`activity for buyers and sellers alike. The additional improvement is the ability to
`maintain security even with unsecure or
`legacy versions of value-added
`information available to those who seek choices that
`fit
`less quantitative
`criteria—”aesthetic quality” of
`the information versus "commercial price”.
`Purchase or transaction decisions can be made first by authenticating an
`electronic version of a song, image, video, trademark, stamp, currency, etc.
`Additional anticipated improvements are the ability to support varying
`pricing models such as auctions that are difficult or impossible to accomplish
`under existing prior art that leaves all access and pricing control with the seller
`alone. As well, the separation of the transaction from the exchange of the value-
`added information, giving more control
`to buyers over their identities and
`purchasing habits, both sensitive and separately distinct forms of ”unrelated”
`value—added information. Essentially, no system known in the art allows for
`realistic protocols to establish trust between buyers and sellers in a manner more
`
`DCOI :229l39
`
`-5-
`
`5:
`is;
`:2
`:~
`,
`EZ.“
`:
`
` law-ua“
`
`_.‘JJI'Tfl:l.|__”all
`
`
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0007
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0007
`
`

`

`closely reflecting actual purchasing behavior of consumers and changing selling
`behavior of sellers. The goal in such transactions is the creation of trust between
`parties as well as ”trusted relationships” with those parties. The present
`invention is an example of one such system for media content where the
`”aesthetic" or ”gestalt” of the underlying content and its characteristics is a
`component of buying habits. Without an ability to open distribution systems to
`varying buyers and sellers, media content may be priced at less than maximum
`economic value and buyers may be deprived of a competitive, vigorous
`marketplace
`for
`exciting media
`content
`from many different
`creative
`participants.
`To the extent that recognition ("recognition, recognition, recognition”)
`plays such a key role in an information economy, value-added data should be as
`accessible as possible to the highest number of market participants in the
`interests of further creativity, competitive marketplace for goods and services.
`This is to the benefit of both buyers and sellers as well as the other participants in
`such an economic ecosystem.
`The Internet and other
`transmission-based
`transactions with unknown parties presents a number of challenges
`to
`information age vendors—continuing to develop customer relations, trust and
`profitable sales of their products and services. While the information economy, if
`largely an anonymous marketplace,
`is making it much harder to identify
`consumers ”and” sellers alike: a fundamental problem for an information
`economy. The present invention provides remedies to these weaknesses versus
`other related systems described in the prior art.
`relies on
`One approach US. Pat. No. 5, 892, 900 to Ginter et al.,
`"universal" adoption of a ”virtual distribution environment” (VDE) leaving all
`control over distribution to the publisher, without any flexibility provided to the
`consumer. The limited flexibility that exists is predetermined by the seller.
`While in theory this approach appears to offer important advantages in markets
`where price and product information may be readily available and known to
`market participants (such as commodities), often the sale and exchange of
`”value-added information”, itself, is speculative. Absent open access to said data
`by consumers or other market participants
`(aggregators, distributors,
`wholesalers,
`financial
`interests, etc.)
`leaves a condition of
`indeterminable
`valuation, or even underexploitation of the intangible information asset.
`While Ginter et a1. discusses ”persistence” of the separation between
`rights applications and the foundation of the VDE, what results is a strict set of
`control which unnecessarily limits potentially useful and economically beneficial
`access by those potential purchasers who do not choose to rigidly make decision
`solely on price. The pricing structure has no relationship with the underlying
`value-added data, only the predetermined rules governing the use of the content
`is anticipated. Additionally, the architecture replaces one set of controlled
`distribution with another in the form of a proprietary VDE distribution channel
`or channels; preservation of a ”virtual black box" limits the free flow of content,
`
`DCO l :229139
`
`
`
`-...til".it:lie-i!"-‘ééil,
`____...rr-wnun
`
`.r.n“n -J.'.‘..
`
`
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0008
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0008
`
`

`

`and information about that content, that actually exists to the commercial benefit
`of media content owners.
`The present invention concerns itself with higher economic efficiencies by
`preserving an open architecture that is focused primarily on authentication,
`verification and authorization of value-added information: access restriction is
`not a primary goal. Thus, failure of authentication or verification do not
`constitute a security failure within the context of the present invention as it
`would with Ginter el al. Moreover, legacy media which may exist as physical
`media such as CDs, LaserDiscs, MiniDiscs, photographs, PhotoCD, VHS, Digital
`Video, etc., prerecorded or otherwise, or other unsecure tangible recorded
`media is not excluded by fiat. Consumers are given flexibility in their choice of
`recording media, content characteristics such as quality, time of delivery, etc:
`publishers are still assured payment and also benefit from better information
`flow to and from the marketplace. This is not possible with Ginter et a1. because
`information is used and accessed in only ”authorized ways”.
`Another series of related systems, are US Pat. No. 5,715,403, US Patent No.
`5,634,012, US Pat. No. 5,629,980 all to Stefik, propose associations between
`”usage rights” and a digital work. While these system offer arguably more
`flexibility in enabling different
`rule sets
`for different proposed digital
`distribution channels, all digital works have permanently attached rights. And
`all transactions must be coupled to a repository. It is not clear that affixing rights
`to content necessarily aides sellers or owners of content, especially if the
`consumers or other participants in the market find use in the information not
`known by the seller at the time rights were affixed. Unlike, physical media sold
`and exchanged, limited only by the ”format” (CD, MiniDisc, cassette, LP, for
`examples in music) or ”player” (respectively, CD player, MiniDisc player,
`cassette player, LP player, for examples in music, more generally a reader which
`connects to a transducer) chosen by consumers, the digital works must always
`pass through a repository. While this favors owners of digitized media, the
`proposed technologies cannot handle any legacy media or media which will
`undoubtedly remain unsecure even with an increasing number of digitized
`works being made available to consumers. Not all publishers choose to restrict
`their data, but the format must be readily acceptable for consumers to make
`purchase decisions. Additionally such transactions create situations where the
`information in the digital work has the appearance of being obscured by the
`rights and usage rules attached and coupled to a repository. The present
`invention alleviates the main concern of publishers, that they get paid for their
`value-added data while seeking to maximize their profits, because the security is .
`obscured through steganography (digital watermarking in particular), and only
`authentication protocols are necessary to effect a transaction.
`This leaves
`consumers less suspect of the system or seller and enables the development of
`relationships based on trust between parties, not between a consumer and- a
`closed system.
`
`DCOl :229139
`
`"n'"«W.-n-v-nLil1:1!
`
`
`itrtti'u,:1»-
`
`
`II"““"M".n‘I:ll:-a?%
`
`g
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0009
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0009
`
`

`

`is not
`it wants to be free,
`that
`the nature of information,
`Simply,
`equivalent to the desire of creators of intellectual property (such as a copyrights,
`design, value-added datum) to maximize the commercial value of his work by
`economic incentives. But legal concepts such as ”fair use”, ”first sale doctrine”,
`and "copyright” are necessarily gray areas that should remain open so as to
`increase the potential growth in an information marketplace that is both robust
`and competitive; e.g., both buyers and sellers are satisfied. The present invention
`de-couples the value-added information media from the underlying distribution
`mechanism by emphasizing authentication, verification and authorization
`independent of the transaction mechanisms which are persistently included in
`the prior art. Consumers benefit with the present
`invention, because the
`processes envisioned more closely resemble real world exchange of content and
`other value-added data. The prior art is limiting in that consumers are not
`trusted, trust
`is "held” or “escrowed” in an inflexible system.
`Instead of
`relationships with consumers,
`these systems mandate relationships with
`protocols.
`US Pat. No. 5,638,443 and US Pat. No. 5,530,235 both to Stefik et a1. seek to
`alleviate problems in determining the contents of value-added data and enabling
`a system of repository—stored ”composite digital works”. The deficiencies of
`these two applications lie in the restriction of access by consumers to media or
`other value-added data, and prevent legacy media or unsecure, non—content
`revealing storage media to be inaccessible without any increased benefit to any
`given publisher. For recognizable digital works, these complementary systems
`may offer some limited benefits in access control, but they do not allow for
`interactions with unsecured or existing legacy media files, as they exist in the real
`world, or as contemplated under the present invention. Further, the system may
`give the appearance to consumers that they cannot be trusted. The present
`invention seeks to ”keep honest people honest".
`Another approach which is arguably less stringent than the ”trusted
`systems" and ”secure containers" in the art is that disclosed in US Pat No.
`5,673,316 to Auerbach et a1. Auerbach et a1. disclose a means for restricting
`access to digital information by breaking information parts and associating
`encryption keys for these parts. The parts form a cryptographic envelope with
`related part encryption keys (PEKs) which predetermine access, control and
`distribution of the digital data, based on predetermined terms and conditions.
`In essence, Auerbach is using the “open nature” of public key cryptography and
`its ”scalable” infrastructure but based on pre-processing of data to enable
`secured access.
`The
`implicit assumption is
`that
`sellers benefit
`from
`”superdistribution“, meaning so long as a rights owner is paid no other factor in
`a transaction for media is valuable to the seller. The present invention seeks to
`bring buyers and sellers closer together for beneficial economic relationships, not
`distance them with predetermined rules for purchase and use. Because the PEKs
`must be permanently associated with the digital information, again, as with the
`above mentioned prior art, legacy media in pro—recorded format (CD, Laser Disc,
`
`D00] :229139
`
`-3-
`
` 3::
`
`in”
`‘i‘
`av-
`
`11-1-1-itita-‘1'.
`
`DISH-Blue Spike-246
`
`Exhibit 1013, Page 0010
`
`DISH-Blue Spike-246
`Exhibit 1013, Page 0010
`
`

`

`PhotoCD, Nintendo, etc.) cannot be effectively leveraged, nor can unsecure
`media in the future coexist in a consistent manner to the benefit of both the
`publisher and consumer.
`It would not be possible to successfully authenticate
`the content unless all content passed through Auerbach et al.’s contemplated
`embodiments. While publishers may certainly choose to limit access to their
`value-added data, the present invention offers a unique means to leverage the
`overall commercial value of such works by incorporating open authentication,
`verification and authorization protocols and allowing co-existence of legacy
`media. Moreover, the present invention does not change the file’s format as does
`Auerback et al. The present invention accomplishes this with cryptographic (for
`confidence,
`authentication and data
`integrity)
`and steganographic
`(for
`tamperproofing,
`authentication
`and
`content-based
`embedding security)
`protocols seeking to isolate a transaction from exchange of value-added data at
`various content characteristic-based quality levels.
`Some further
`related prior art
`includes US Pat. No. 5,412,718 to
`Narasimhalu et
`a1.
`disclose
`a means
`for utilizing
`storage medium
`“nonuniformities” which are processed as a signature for any particular storage
`medium and its subsequently generated cryptographic signature. Although this
`represents a form of copy protection security, more robust techniques in the art,
`including those by the present
`inventor, are better able
`at
`securing,
`authenticating and maintaining content quality—namely digital watermarks.
`The present invention is not storage medium-based, but portable and scalable in
`authentication and distribution of value-added media. Bright el al. disclose, in
`US Pat. No. 4,262,329, means for maintaining all cryptographic processes in a
`secure "vault”. This example of prior art is more restrictive than many ”trusted
`systems” disclosures, and thus suffers from the same weaknesses described
`above. US Pat. No. 5,287,407 to Holmes suggests a means for software copy
`protection.
`To the extent
`that
`tools are now available to rid any non-
`cryptographically embedded data in a file without adverse repercussions is a
`weakness that
`is overcome with digital watermarking techniques for both
`content (digital sampled content) and functional software (zero error tolerance).
`The present
`invention relies on content quality degradation as well as
`verification of authentic value—added information as important
`facets
`in
`increasing the benefits of both buyers and sellers of value-added data. US Pat.
`No. 5,191,573 and US Patent No. 5,675,734 both to Hair, describe a means for
`distributing audio or video signals.
`The present
`invention offers
`the
`improvement on this art, and related systems, in separating the transaction
`function from the delivery functions.
`The present
`invention also has
`mechanisms for ensuring payment, authentication of the content signal, and the
`ability to handle secure and unsecure information in a consistent, secure manner.
`The present invention is concerned with methods and systems which
`enable secure, paid exchange of value—added information, while separating
`transaction protocols. The present invention improves on existing means for
`distribution control by relying on authenticati

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket