`1111111111111101111011111111q1101111111111110111111111111111
`
`11111111111111101111111111!!!!11111111 J11111111111111111110111111
`USOO6668246B1
`(10) Patent No.:
`US 6,668,246 B1
`US 6,668,246 B1
`US 6,668,246 B1
`(10) Patent No.:
`(to) Patent No.:
`(45) Date of Patent:
`Dec. 23, 2003
`(45) Date of Patent:
`Dec. 23, 2003
`(45) Date of Patent:
`Dec. 23, 2003
`
`(12) United States Patent
`(12) United States Patent
`(12) United States Patent
`Yeung et al.
`Yeung et al.
`Yeung et al.
`
`(54) MULTIMEDIA DATA DELIVERY AND
`(54)
`MULTIMEDIA DATA DELIVERY AND
`(54) MULTIMEDIA DATA DELIVERY AND
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`
`(75) Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`(75)
`Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`(75)
`CA (US); Matthew J. Holliman,
`CA (US); Matthew J. Holliman,
`CA (US); Matthew J. Holliman,
`Libertyville, IL (US); Robert G. Liu,
`Libertyville, IL (US); Robert G. Liu,
`Libertyville, IL (US); Robert G. Liu,
`Sunnyvale, CA (US); William W.
`Sunnyvale, CA (US); William W.
`Sunnyvale, CA (US); William W.
`Macy, Palo Alto, CA (US); Boon-Lock
`Macy, Palo Alto, CA (US); Boon-Lock
`Macy, Palo Alto, CA (US); Boon-Lock
`Yeo, Sunnyvale, CA (US)
`Yeo, Sunnyvale, CA (US)
`Yeo, Sunnyvale, CA (US)
`
`(*) Notice:
`Notice:
`( * ) Notice:
`* )
`
`(73) Assignee: Intel Corporation, Santa Clara, CA
`(73)
`Assignee: Intel Corporation, Santa Clara, CA
`(73) Assignee: Intel Corporation, Santa Clara, CA
`(US)
`(US)
`(US)
`Subject to any disclaimer, the term of this
`Subject to any disclaimer, the term of this
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`U.S.C. 154(b) by 0 days.
`U.S.C. 154(b) by 0 days.
`(21) Appl. No.: 09/275,905
`(21)
`Appl. No.: 09/275,905
`(21) Appl. No.: 09/275,905
`(22) Filed:
`Mar. 24, 1999
`(22)
`Filed:
`Mar. 24, 1999
`(22) Filed:
`Mar. 24, 1999
`(51) Int. Cl. ................................................ G06F 17/60
` GO6F 17/60
`(51)
`Int. C1.7
` GO6F 17/60
`(51) Int. C1.7
`(52) U.S. Cl. ............................. 705/57; 380/211: 705/1:
` 705/57; 380/211; 705/1;
`(52)
`U.S. Cl.
` 705/57; 380/211; 705/1;
`(52) U.S. Cl.
`705/51; 713/150
`705/51; 713/150
`705/51; 713/150
`380/200, 201
`(58) Field of Search
` 380/200, 201,
`(58)
`Field of Search
` 380/200, 201,
`(58) Field of Search
`380/211; 705/ 50.51.52 s 4, 57. 71.7150
`380/211; 705/1, 50, 51, 52, 54, 57; 713/150
`380/211; 705/1, 50, 51, 52, 54, 57; 713/150
`s
`s a Yu’s a u-s a as a
`s a
`s
`References Cited
`References Cited
`References Cited
`
`(56)
`(56)
`(56)
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`
` 380/44
`4,933,971 A * 6/1990 Bestock et al.
`380/44
`4,933,971 A * 6/1990 Bestock et al.
`4,933,971. A * 6/1990 Bestock et al. ............... 380/44
`5,638,448 A * 6/1997 Nguyen
` 380/29
`5,638,448 A * 6/1997 Nguyen ....................... 380/29
`5,638,448 A * 6/1997 Nguyen ...
`380/29
`
`JP
`JP
`JP
`
`5,689,566 A * 11/1997 Nguyen ...................... 713/155
`713/155
`5,689,566 A * 11/1997 Nguyen
`713/155
`5,689,566 A * 11/1997 Nguyen
`6,275,939 B1 * 8/2001 Garrison
`713/200
`6,275,939 B1 * 8/2001 Garrison
`713/200
`6,275,939 B1
`8/2001 Garrison ..................... 713/200
`6,298,446 B1 * 10/2001 Schreiber et al.
`713/201
`6,298,446 B1 * 10/2001 Schreiber et al.
`713/201
`6,298.446 B1 * 10/2001 Schreiber et al. ........... 713/201
`6,304,969 B1 * 10/2001 Wasserman et al.
`713/172
`6,304,969 B1 * 10/2001 Wasserman et al. ........ 713/172
`6,304,969 B1 * 10/2001 Wasserman et al.
`713/172
`6,353,892 B2 * 3/2002 Schreiber et al.
`713/201
`6,353,892 B2 * 3/2002 Schreiber et al.
`713/201
`6,353,892 B2 * 3/2002 Schreiber et al. ........... 713/201
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`2000-148689 A * 5/2000
`2000-148689 A * 5/2000
`2000-148689 A * 5/2000
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`Bobrowski: "Database in a client/server world-Under
`Bobrowski: "Database in a client/server world—Under-
`Bobrowski: "Database in a client/server world—Under-
`Standing the unique challenges of keeping your client/server
`standing the unique challenges of keeping your client/server
`standing the unique challenges of keeping your client/server
`database environment secure'; DBMS, Sep. 1, 1994, vol. 7,
`database environment secure"; DBMS, Sep. 1, 1994, vol. 7,
`database environment secure"; DBMS, Sep. 1, 1994, vol. 7,
`No. 10, pp. 48–48, (Abstract Onlv).
`No. 10, pp. 48-48, (Abstract Only).*
`No. 10, pp. 48-48, (Abstract Only).*
`O. IU, pp
`, (Abstract Only)
`* cited by examiner
`* cited by examiner
`* cited by examiner
`Primary Examiner Edward R. Cosimano
`Primary Examiner—Edward R. Cosimano
`Primary Examiner—Edward R. Cosimano
`(74) Attorney, Agent, or Firm-Blakely, Sokoloff, Taylor &
`(74) Attorney, Agent, or Firm—Makely, Sokoloff, Taylor &
`(74) Attorney, Agent, or Firm—Blakely, Sokoloff, Taylor &
`Zafman LLP
`Zafman LLP
`Zafman LLP
`ABSTRACT
`(57)
`ABSTRACT
`(57)
`ABSTRACT
`(57)
`A content distribution System comprising a server platform
`A content distribution system comprising a server platform
`A content distribution system comprising a server platform
`and a client platform. The Server platform includes a
`and a client platform. The server platform includes a
`and a client platform. The server platform includes a
`memory unit to Store digital content and access control logic
`memory unit to store digital content and access control logic
`memory unit to store digital content and access control logic
`to activate content protection mechanisms that provide mul
`to activate content protection mechanisms that provide mul-
`to activate content protection mechanisms that provide mul-
`tiple levels of access protection to the digital content. In
`tiple levels of access protection to the digital content. In
`tiple levels of access protection to the digital content. In
`communication with the Server platform, the client platform
`communication with the server platform, the client platform
`communication with the server platform, the client platform
`plays back Segments of the digital content at one of a
`plays back segments of the digital content at one of a
`plays back segments of the digital content at one of a
`plurality of quality levels.
`plurality of quality levels.
`plurality of quality levels.
`
`24 Claims, 9 Drawing Sheets
`24 Claims, 9 Drawing Sheets
`24 Claims, 9 Drawing Sheets
`
`Data
`Data
`
`22
`220
`220
`
`( Content )--er.
`t
`EN2
`EN0
`EN2-0.
`
`225
`2
`225
`
`236
`( -230
`( -230
`Edecompression
`Decompression
`Decompression
`Unit
`Unit
`Unit
`
`f
`
`Process ControlLogic
`Process COMM! Logic
`Process Control Logic
`210
`2.
`210
`4 4 4 4 4 4
`ENEN2EN3EN4 ENS EN3
`EN1 EN2 EN3 EN4 ENS EN6
`EN! EN2 EN3 EN4 ENS EN6
`
`-------------------
`s
`15
`( -215
`1"
`
`Robust
`Robust
`Robust
`Watermark HEN
`Wateimaik
`Watermark 1-ENI
`insertion
`Insertion
`Insertion
`
`FROM
`FROM
`FROM
`120
`120
`12
`Request80
`Request 180
`Request 180
`Client
`Client
`Client
`identifier
`Identifier
`Identifier
`(CPUID)
`(CPU ID)
`(CPU JD)
`Order Info
`Order info
`Order Info
`
`5
`185
`185
`
`y
`Jit
`235
`235
`235
`EN3
`EN3
`EN3- R
`r c Content
`
`REC_ID
`REC_ID
`Compression w
`Compression
`Compress].
`Unit
`Unit
`
`:
`
`/
`
`Content
`k
`
`240
`
`)
`)
`
`---------------------wou
`
`r 200 Unit
`Memory EN4-0.
`200 Unit
`
`ENS-4.
`ENS
`
`KEY] 4.
`KEY
`251 -
`250 22551; KEY1
`250 -
`2501 2255/2-.--- KEYS'- /
`252
`KEY
`EN6
`EN6-1.
`
`Fast Waternark
`ao
`Fasth,serdSSter
`
`Fast Watermark
`Insertion
`280
`280
`280
`Insertion
`Insertion
`Visual. Perceptual
`Isual/Percmptal
`Visual/Perceptual
`Scrambiing
`Scrambling
`Scrambling
`260
`260
`260
`Data Scrambling
`Data Scrambling
`Data Scrambling
`(Encrypt
`(Encrypt)
`(Encrypt)
`270
`270
`270
`
`:
`:
`
`)
`R.
`TV
`Delivered'.
`Delivered'.
`iDelivered
` Content
`Content
`Content
`290
`290
`29t
`
`
`
`CEient-Based
`Client-Based
`Client-Based
`Information
`Information
`information
`
`185
`185
`35
`
`Authentication
`Authentication
`Authentication
`Check
`Check
`Check
`(CPUIDs, REC IDs,
`(CPU_1Ds, REC_IDs,
`(CPU_lDs, REC_IDs,
`etc.)
`etc.)
`
`Key
`Key
`Key
`Generation
`Generation
`Generation
`1940.s
`(Mapping
`(Mapping
`bmnion
`Function)
`Function)
`255
`255
`255
`
`
`
`WER
`SERVER
`SERVER
`p
`PLATFORM
`PLATFORM
`f
`110
`110
`
`YS 250
`YS 250
`Y1 5
`RI
`KEY!
`252
`252
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0001
`
`
`
`U.S. Patent
`luaiud 'S'fl
`Waled *S11
`
`Dec. 23, 2003
`
`Sheet 1 of 9
`6 JO 1 lamIS
`6 JO I lamiS
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`is 917e899`9 Sf1
`
`
`
`140
`140
`Th
`-Th
`
`az
`
`-<
`
`145
`145
`
`135
`135
`Th
`
`
`I:
`
`zS'N
`.z.e•
`SIG
`SIG
`
`155
`155
`
`CHIPSET
`CHIPSET
`
`150
`150
`
`120
`120
`
`PLATFORM
`PLATFORM
`
`CLIENT
`CLIENT
`
`185
`185
`
`<_TENT-BASED INFO
`CLTFNT-BASED INFO
`
`DEVICE
`DEVICE
`
`NOILVOINOWNWOO
`
`COMMUNICATION
`COMMUNICATION
`
`' 180
`18
`REQUEST
`REQUEST
`10
`0
`
`m130
`Th130
`
` k
`
` i
`
`Th
`Th
`
`CPU ID
`CPU ID
`
`RHOSSHOONHA
`
`PROCESSOR
`PROCESSOR
`
`CONTENT
`CONTENT
`
`,-160
`
`110
`110
`
`PLATFORM
`PLATFORM
`
`
`
`WRIO HILVTd?
`
`(HGHARIGHS
`
`SERVER
`SERVER
`
`100
`100
`
`FIG. 1
`
`
`
`
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0002
`
`
`
`U.S. Patent
`U.S. Patent
`U.S. Patent
`
`Dec. 23, 2003
`Dec. 23, 2003
`Dec. 23, 2003
`
`Sheet 2 of 9
`Sheet 2 of 9
`Sheet 2 of 9
`
`US 6,668,246 B1
`US 6,668,246 B1
`US 6,668,246 B1
`
`FIG. 2
`FIG, 2
`
`Data
`Data
`Data
`
`220
`2201/4
`221
`
` ►
`Content
`Content
`EN2
`EN2
`EN2—*
`
`225
`225
`225 '1
`
`r230
`( -230
`230
`Decompression
`Decompression
`Decompression
`Unit
`Unit
`Unit
`
`-
`
`r215
`25
`r215
`
`
`
`
`
`
`
`►
`
`Robust
`Robust
`Robust
`Watermark
`-EN1;
`Watermark 4--EN]
`Watermark 4-EN1
`Insertion
`Insertion
`Insertion
`
`
`
`
`
`
`
`
`
`FROM
`FROM
`FROM
`120
`120
`120
`Request 180
`Request 180
`Request 180
`Client
`Client
`Client
`Identifier
`Identifier
`Identifier
`(CPUID)
`(CPU_ID)
`(CPU_ID)
`Order Info
`Order Info
`
`
`
`
`
`85
`}185
`}185
`
`•
`•
`
`REC_ID
`REC_ID
`
`Process Control Logic
`Process Control Logic
`210
`210
`
`EN1 EN2 EN3 EN4 ENS EN6
`EN1 EN2 EN3 EN4 EN5 EN6
`
`(
`
`235
`235
`EN3-10
`EN3
`
`Compression
`Compression
`Unit
`Unit
`
`rC Content
`240
`240
`
`K Content
`CD
`r Memory EN4
`r Memory
`t
`200
`200 Unit
`Unit
`
`_01
`EN4
`
`ENS
`EN5
`EN5-0.
`
`
`
`
`
`Client-Based
`Client-Based
`Client-Based
`Information
`Information
`Information
`
`250'
`250
`
`251
`251
`252
`252
`
`185
`85
`
`KEY
`KEY]
`KEY1
`
`
`
`
`
`KEY1 F-0:1
`KEY1
`EN6
`EN6-10.
`EN6
`
`
`
`/
`
`280
`
`Fast Watermark
`Fast Watermark
`Fast Watermark
`280
`280
`Insertion
`Insertion
`Visual/Perceptual
`Visual/Perceptu
`Visual/Perceptual
`Scrambling
`Scrambling
`Scrambling
`260
`260
`260
`
`Disting
`Data Scrambling
`Data Scrambling
`(Encrypt)
`(Encrypt)
`C
`Er
`270
`270
`
`V
`
`SERVER
`SERVER
`SERVER
`PLATFORM
`PLATFORM
`PLATFORM
`
`110
`110
`10
`
`Delivered
`Delivere
`Delivered
`Content
`Content
`Content
`290
`290
`290
`
`185 /
`
`
`
`Authentication
`Authentication
`Authentication
`Check
`Check
`Check
`(CPUIDs, REC IDs,
`(CPU_TDs, REC_1Ds,
`(CPUJ:Ds, REC_1D
`etc.)
`
`etc.)
`etc.)
`
`
`
`Key
`Key
`Key
`Generation
`Generation
`Generation
`(Mapping
`(Mapping
`(Mapping
`Function)
`Function)
`Function)
`255
`255
`255
`
`KEYS 250
`KEYS 250
`KEYS 250
`KEY
`KEY 1
`KEYI
`
`251
`251
`25
`
`KEY
`KEY1
`KEY
`
`252
`252
`252
`
`
`
`
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0003
`
`
`
`U.S. Patent
`U.S. Patent
`U.S. Patent
`
`Dec. 23, 2003
`Dec. 23, 2003
`Dec. 23, 2003
`
`Sheet 3 of 9
`Sheet 3 of 9
`Sheet 3 of 9
`
`US 6,668,246 B1
`US 6,668,246 B1
`US 6,668,246 B1
`
`
`
`0 MPEG Video Content Delivery System
`C MPEG Video Content Delivery System
`
`Fr4
`
`370
`370
`
`11 0 oOr,
`
`0, 0
`
`I0
`
`/ 0
`/ 0
`
`310
`310
`510
`311
`311
`3.11
`
`312
`312
`312
`
`300
`300
`
`380
`
`► I II
`
`382
`382
`
`I
`381
`381
`v. DataScrambling
`gi
`Key
`Data Scrambling
`Key I--
`Data Scrambling
`Visual Scrambling
`330-
`330
`Y
`Visual Scrambling is...N-
`-
`Visual Scrambling
`gi
`Source
`Source
`340
`340
`ostern
`go
`Fingerprinting
`340
`Fingerprinting
`Fingerprinting
`DestinationL_
`Destination r
`360
`360
`
`320—
`320 —
`
`
`
`
`
`Encode
`Encode
`
`Fingerprint I
`Fingerprint'
`
`Watermarking Message
`Watermarking Message
`Watermarking Message'
`
`350
`350
`
`FIG, 3
`FIG 3
`FIG, 3
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0004
`
`
`
`luaiud 'S'fl
`Waled *S11
`
`6 JO 17 lamIS
`6 JO I lamiS
`
`HI 917Z`899`9 Sfl
`is 917e899`9 Sf1
`
`FIG, 4
`FIG, 4
`
`11. CONTROL
`. CONTROL
`
` 0
` 1
`
`120
`120
`
`PLATFORM
`PLATFORM
`CLIENT
`CLIENT
`
`EXTRACTION 440
`EXTRACTION 440
`
`WATERMARK
`WATERMARK
`
`4
`
`450
`450
`
`DESCRAMBLING 430
`DESCRAMBLING 430
`" VISUAL/PERCEPTUAL
`VISUAL/PERCEPTUAL
`
`10
`
`
`
`C.)
`r 490
`( 490
`
`-•1
`
`PLAYER
`PLAYER
`CONTENT
`CONTENT
`
`4,
`
`420
`420
`
`DATA DESCRAMBLING
`DATA DESCRAMBLING
`
`410
`410
`UNIT
`UNIT
`
`
`
`•
`
`•
`
`MEMORY
`MEMORY
`
`(CONTENT
`(CONTENT
`
`r 290
`290
`
`1470
`1470
`
`471
`471
`
`KEY
`KEY
`
`KEY
`KEY
`
`471
`471
`
`472
`472
`
`460
`460
`
`11(MS
`11(114S
`(470
`(470
`
`AUX. INFO
`AUX. INFO
`
`FUNCTION
`FUNCTION
`MAPPING
`MAPPING
`
`CPU ID
`CPU JD
`
`150
`150
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0005
`
`
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`is 917e899`9 Sf1
`
`6 JO S lamIS
`6 JO i lamiS
`Sheet 5 of 9
`
`Dec. 23, 2003
`
`Co.)
`O
`O
`
`luaiud 'S'fl
`U.S. Patent
`Waled *S11
`
` IGC4,11GB15
` I GC4,11GB15
`
`0:43
`0.0
`
` 1
`1
`
` IMPEG-2
` I MPE3.2
`
` IType: P
`1 i lype: P
`
` !Frame: rams (Time: 1134)
`!Frame: iff131.5 (lime' 1
`)
`
` !FPS: 30.71/1927
` 'FPS: 303111927
`
`iRead1
`Re
`
`1
`
`FIG. 5
`FIG. 5
`
`Stream Navigation
`Stream Navigation
`
`500
`500
`
`??? TET
`
`OK
`OK
`
`la
`
`pi
`
`aInvalid MPEG stream or incorrect key
`® Invalid MPEG stream or incorrect key
`
`MPL error
`MPL error
`
`LO 2
`
`
`
`Y U V 1701.11 4,'"310IP
`-0101P
`Y U V F.:7-02.i4,
`
`E
`
`e 0-0+1 I P B
`I P B
`if
`File View Help
`File View Help
`t: synergy_out_sc_key1234.mpg - Player
`synergy_outfic_key1234.mpg - Player
`
`t> El +1
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0006
`
`
`
`wawa 'S'fl
`Poled *S11
`U.S. Patent
`
`6 Jo 9 lamiS
`6 JO 9 loolIS
`
`iti 917e899`9 Sa US 6,668,246 B1
`is 917e899`9 Sf1
`
`r
`
`qt
`
`CD 21
`1-jc3 2i
`
`
`
`A
`
`
`
`II G0I,RG015
`li WI AGEP 5
`
`Oxi)
`NO
`
`I
` i
`
` IIREG.2
`3 MPEG-2
`
`I ITYPe: P
`I Tre, P
`
`.•...'"°"<#)
`
`....1
`
`'''''
`
`_--.''
`
`\
`
`--N
`-,..
`
`."......'
`
`......
`
`.4.' \
`
`........
`
`-?..../
`
`6
`
`7 )
`
`ii
`, t
`
`dor
`
`-----,
`
`co
`2C0
`CO
`
`,#),/
`
`ocoo 05
`
`orzikete, -
`NII,14/11186,1
`-aim -Oft, -
`frilaNaaVil
`
`..„,,
`
`lilt,
`1411
`
`. ,r...........
`
`
`
`1
`
`a
`
`i
`
`l
`
`1:
`
`i
`
`laill
`
`1....
`
`11111111,4
`
`44P. ate
`
`440
`
`, ..
`
`45"'AM P
`V, -0101
`
`
`
`Iliad ar
`
`,,
`
`111111
`
`111141
`
`117
`
`Vage.14,4.,
`4111111*
`111;
`isilitit
`II
`
`..4F.."-1••—zilitii
`at if r Ir. ,
`c:.......ia"
`e=arriii
`aa ill
`,,,„
`re;;;.,-;Xiiiiiii
`a .
`frii;;A:morgivitig
`-- --;,,g-r-g•--.0 :7-_,,:„If
`,•.-nr
`_........, _ ,.. if
`e, ID CI +1
`.111 i> El +1 I P B YIU V Li j
`Y U V 1:1
`
`ili lobrab SIB
`kit IBM MIMI i
`iiiiitallainlirt,
`Ili iiiiiii1010111
`
`Ile°
`
`ill
`
`It
`
`ii
`
`li
`
`110,11
`
`0.
`
`Et 11/Z0=
`
`File View Help
`File View Help
`Z„ synergy_out_sckey1234.mpg - Player
`.v":',G synergy_aut_sc_key1 234.mpg - Player
`
`
`
`
`
`
`
`
`
`
`
` 'Frame' 000035 P.m 1.134)
`'Frame: ono (rtrne:
`1.134)
`
`
`
`I PS. 30 71/1027
`[FPS: 30.71/19.27
`
` (
`
`1F041
`
`Ifs
`
`FIG. 6
`FIG. 6
`
`Stream Navigation
`Stream Navigation
`
`((4
`
`r
`
`',..
`
`MI
`Mk
`*11/4
`
`lik
`
`mos
`
`Mil
`
`
`
`,
`
`I
`
`10111
`
`01,
`
`liariiiii1
`
`I
`
`ip
`.4.1P-
`
`il
`
`74
`
`f
`
`-
`
`,r,.
`
`I P B
`
`al
`
`k
`
`I la
`
`ilk
`
`1!7777-
`
`"17
`
`1.1;"""W
`
`lt.:11
`
`4;
`
`k#
`
`gli
`
`gigli
`
`0,
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0007
`
`
`
`Juaied 'S11
`luaiud 'S'fl
`U.S. Patent
`
`6 JO L lamIS
`6 JO L lamIS
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`is 917e899`9 Sf1
`
`.'
`-,
`s,
`...
`,
`
`ilii
`
`...,,, ii
`
`1
`
`Cancel
`Cancel
`
`
`
`OK
`OK
`
`700
`700
`KeY: 1
`Key:
`
`El
`LA
`\\,..
`\\•,N,.
`
`—ICA Z
`—ICI Z
`
`
`
`4zZ,------,.. /./
`./Albg----'-..-. //
`
`Descrambling key
`Descrantling key
`
`-
`
`-....
`et*--..
`
`N.
`N.
`
`.,..---/--, 7%
`
`,...
`
`.. _
`
`11
`
`C°
`
`)D°
`
`iltamals
`1101:30,561.5
`
`3676
`3676
`
` I
`1
`
` I 14PEG-2
` I 1REG-2
`
`ITyPel
` I TYPe: P
`
` 1 Rama: 030335 (Tre: 1.134)
`'Frame: 506035 (Time: 1.134)
`
`1IPS.30.7111927
`I IPS: 30.71/1927
`
`I
`
`•
`
`•
`
`i
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`!
`
`1
`
`11
`
`1.
`
`.
`
`t
`
`l
`
`I
`
`„
`
`!Rea.*
`
`(Ready
`
`,
`
`n
`
`FIG. 7
`FIG. 7
`
`,---
`
`.....--
`
`*"..
`
`Stream Navigation
`Stream Navigation
`
`CA
`a?
`
`ii
`
`.....
`,411
`.
`
`1.
`
`jj 14
`
`-7.1
`
`C
`
`,------- -
`/A
`
`4
`
`49
`
`"
`
`j
`„.......
`
`7
`
`y
`
`aluger,
`
`elarMalU ali non*
`ili. ill: "mar Jr
`i Iiiimrsersirom4
`I I iiMile MOW
`ill
`1
`illOirailimiti
`iiii :ill anises,
`pia
`tiii-aimiriagi
`iii ism kalif /
`6:::::F. :Was/
`L.:I:F.:ilia i
`ri,-;;;;;;;;Hrom
`air it
`ri,v,-;e7imiesim
`IS:VX....ZIL'a al fif
`0;
`11.41r::."i
`__ , „„......,,
`--.---'
`1...•----
`-----... ,
`,
`. .-
`. ,-,e•
`B y u vFiti_til To
`I
`I P 8 YUI/F101 d 2,1-Acip
`
`, , ...........,-,----
`
`fa or 1.e.o...'"-
`
`Voi)
`""".ell 41/4
`00"
`
`ii
` Meant
`
`...,
`
`-
`
`Mk
`
`IN
`
`litt
`iiirk
`
`00.111111.
`Worn
`
`...0
`
`'
`ir 11:- .
`
`I , P
`
`_.--
`la L
`HSI
`471,"•=r--Siiiiii
`..4?!..1-"P-----zillti
`- - . . .1 4 ;0 4 ,i 1_ "
`I I till'
`iaaiiii
`Aiiiiiiii.P5
`lijirrear.91!
`lEmosiiii ft."
`''..
`i.-
` AO a. il r 9 lir
`* i0.
`.......t__ _
`.....1r.
`eI>II:11+1
`+1
`EJI>111
`
`file _View Help
`F ile View Help
`Wm
`U synergy_out_vscfp_nods_key1234.mpg - Player
`r„, synergy_out_vscfp_nods_key12343-npg - Player
`
`4'
`1.
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0008
`
`
`
`U.S. Patent
`Waled °S'Il
`luaiud 'S'fl
`
`Dec. 23, 2003
`
`6 JO 8 laNS
`6 JO 8 lamiS
`Sheet 8 of 9
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`is 917e899`9 Sf1
`
`/4
`Asf
`
`I
`
`
`
`3I6x6 11CW6516
`316x6
` I GDI,RGB15
`
`I
`J
`
` I MPEG-2
`II MPEG-2
`
`I [Type: B
`itype: 13
`
`3.
`
`1 Me'
`IfFrame: WOO (T
` rMei
`
`l
`
` IFPS: 17
`I n
`Fps:17,60022
`
` !
`
`iReadY
`I Reach,
`
`)
`)
`
`FIG. 8
`FIG. 8
`
`Stream Navigation
`Stream Navigation
`
`s•.. „
`
`0 0 r\
`
`r---__7-----
`i ______
`-_-:.:-.---- --•\
`____,
`
`,c
`
`\
`
`,,
`
`Y
`
`/
`
`(
`
`) e) )
`
`--?
`
`\:-..,....\_,,,_\
`
`1
`
`I
`
`/I 11
`!
`, , 1
`I I
`I I 1
`
`I
`
`El
`
`WO (4
`Z
`
`
`
`800
`800
`
`Cool!
`Cool!
`
`..i
`
`Created on Katmai A
`Created on Katmai A
`Copyright information: watermark not found
`Copyright information: Watermark not found
`
`Recipient information:
`Recipient intonation:
`
`Extracted watermarks
`Extracted watermarks
`
`ci ^ rs
`1/1„10°°
`) / 1 0el
`,„.., —
`r, Li
`
`,..
`._,,,,..
`
`/
`
`;, -%''`-•
`
`,,,,i ._,:i.%,
`
`<->)
`
`—
`
`e'----
`
`(
`
`....
`
`-1 1
`
`0
`
`1
`
`i.c..•
`
`l'
`
`---T-L.
`72"L
`
`.(
`
`Lj
`
`/
`
`------
`__rir.____\
`_-----
`
`i
`
`—
`
`--"---::-------"-----
`—.
`
`-
`
`Y U V 1: ELLI 14, ^01©l P
`YUV1:101 ? v -A(01 p
`
`I P B
`I P B
`
`t>01+1I
`I> 0 +1
`
`6
`
`File View Help
`File View Help
`mi'G synergy_out_vecip_nods_nokey.mpg - Player
`7:, synergy_out_vscip_nods_nokey.mpg - Player
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0009
`
`
`
`US 6,668,246 B1
`HI 917Z`899`9 Sfl
`is 917e899`9 Sf1
`
`6 JO 6 lamIS
`6 JO 6 lamIS
`
`IN)
`
`U.S. Patent
`luaiud 'S'fl
`Waled *S11
`
`FIG, 9
`FIG, 9
`
`6 91-7
`
`PLAYER
`PLAYER
`CONTENT
`CONTENT
`TO>
`
`270
`270
`
`SCRAMBLING
`SCRAMBLING
`
`DATA
`DATA
`
`260
`260
`
`SCRAMBLING
`SCRAMBLING
`PERCEPTUAL
`PERCEPTUAL
`
`VISUAL/
`VISUAL/
`
`DESCRAMBLING
`DESCRAMBLING
`
`DATA
`DATA
`
`SCRAMBLING
`SCRAMBLING
`
`DATA
`DATA
`
`280
`280
`
`
`
`CONTENT
`CONTENT
`
`INSERTION
`INSERTION
`
`WATERMARK
`WATERMARK
`
`FAST
`FAST
`
`CONTENT
`CONTENT>
`
`900 -)
`900 -\
`
`KEY 2
`KEY 2
`
`KEY I
`KEY 1
`
`410
`410
`UNIT
`UNIT
`
`MEMORY
`MEMORY
`
`120
`120
`
`JQ
`
`PLATFORM
`PLATFORM
`CLIENT
`CLIENT
`
`PLATFORM
`PLATFORM
`SERVER
`SERVER
`
`KEY
`KEY
`
`INSERTION
`INSERTION
`
`WATERMARK
`WATERMARK
`
`026
`
`920
`920
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0010
`
`
`
`US 6,668,246 B1
`US 6,668,246 B1
`US 6,668,246 B1
`
`1
`1
`1
`MULTIMEDIA DATA DELIVERY AND
`MULTIMEDIA DATA DELIVERY AND
`MULTIMEDIA DATA DELIVERY AND
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`
`BACKGROUND
`BACKGROUND
`BACKGROUND
`
`2
`2
`2
`FIG. 3 is an embodiment of a screen menu produced at the
`FIG. 3 is an embodiment of a screen menu produced at the
`FIG. 3 is an embodiment of a screen menu produced at the
`Server platform for Selecting the origin of the content and the
`server platform for selecting the origin of the content and the
`server platform for selecting the origin of the content and the
`level of access control based on the Selected content pro
`level of access control based on the selected content pro-
`level of access control based on the selected content pro-
`tection mechanisms.
`tection mechanisms.
`tection mechanisms.
`FIG. 4 is an illustrative block diagram of an embodiment
`FIG. 4 is an illustrative block diagram of an embodiment
`FIG. 4 is an illustrative block diagram of an embodiment
`of a client platform of the content distribution system of
`of a client platform of the content distribution system of
`of a client platform of the content distribution system of
`FIG. 1.
`FIG. 1.
`FIG. 1.
`1. Field
`1. Field
`1. Field
`FIG. 5 is an embodiment of a screen display produced by
`FIG. 5 is an embodiment of a screen display produced by
`FIG. 5 is an embodiment of a screen display produced by
`The present invention relates to the field of data security.
`The present invention relates to the field of data security.
`The present invention relates to the field of data security.
`the client platform of FIG. 4 when the content client
`More particularly, this invention relates to a platform and
`the client platform of FIG. 4 when the content client
`the client platform of FIG. 4 when the content client
`More particularly, this invention relates to a platform and
`More particularly, this invention relates to a platform and
`10 platform is unable to pass a first level of access control.
`10
`platform is unable to pass a first level of acceSS control.
`corresponding method for protecting content through mul
`platform is unable to pass a first level of access control.
`corresponding method for protecting content through mul-
`corresponding method for protecting content through mul-
`tiple content control.
`FIG. 6 is an embodiment of a Screen display featuring
`tiple content control.
`tiple content control.
`FIG. 6 is an embodiment of a screen display featuring
`FIG. 6 is an embodiment of a screen display featuring
`degraded digital content produced by the client platform of
`2. General Background
`degraded digital content produced by the client platform of
`degraded digital content produced by the client platform of
`2. General Background
`2. General Background
`FIG. 4 when the client platform is unable to pass a second
`FIG. 4 when the client platform is unable to pass a second
`FIG. 4 when the client platform is unable to pass a second
`For over fifty years, the entertainment industry has pro
`For over fifty years, the entertainment industry has pro-
`For over fifty years, the entertainment industry has pro-
`level of acceSS control.
`level of access control.
`level of access control.
`Vided audio-visual information to the general populous in
`vided audio-visual information to the general populous in
`vided audio-visual information to the general populous in
`FIG. 7 is an embodiment of a screen display featuring a
`FIG. 7 is an embodiment of a screen display featuring a
`the form of television programming. When transmitted in an
`FIG. 7 is an embodiment of a screen display featuring a
`the form of television programming. When transmitted in an
`the form of television programming. When transmitted in an
`user identification window that prompting input of user
`user identification window that prompting input of user
`analog format Such as National Television Systems Com
`user identification window that prompting input of user
`analog format such as National Television Systems Com-
`analog format such as National Television Systems Com-
`information before removing visual degradation from the
`mittee (NTSC) or Phase Alternating Line (PAL), this pro
`information before removing visual degradation from the
`information before removing visual degradation from the
`mittee (NTSC) or Phase Alternating Line (PAL), this pro-
`mittee (NTSC) or Phase Alternating Line (PAL), this pro-
`digital content.
`gramming is Somewhat protected due to the inherent nature
`digital content.
`digital content.
`gramming is somewhat protected due to the inherent nature
`gramming is somewhat protected due to the inherent nature
`of analog signaling. For example, analog Signals are trouble
`FIG. 8 is an embodiment of a screen display featuring a
`of analog signaling. For example, analog signals are trouble-
`of analog signaling. For example, analog signals are trouble-
`FIG. 8 is an embodiment of a screen display featuring a
`FIG. 8 is an embodiment of a screen display featuring a
`fingerprinting menu to provide ownership information con
`Some to illicitly copy and redistribute. Also, the recorded
`some to illicitly copy and redistribute. Also, the recorded
`some to illicitly copy and redistribute. Also, the recorded
`fingerprinting menu to provide ownership information con-
`fingerprinting menu to provide ownership information con-
`copies have poorer image quality than the original program
`cerning the digital content prior to playback on the content
`copies have poorer image quality than the original program-
`copies have poorer image quality than the original program-
`cerning the digital content prior to playback on the content
`cerning the digital content prior to playback on the content
`ming.
`client platform.
`ming.
`ming.
`client platform.
`client platform.
`Due to advances in digital processing technology and
`FIG. 9 is an illustrative block diagram of a second
`Due to advances in digital processing technology and
`Due to advances in digital processing technology and
`FIG. 9 is an illustrative block diagram of a second
`FIG. 9 is an illustrative block diagram of a second
`acceptance of the Internet, digital content distribution is now
`embodiment of the content distribution system of FIG. 1.
`25
`acceptance of the Internet, digital content distribution is now
`acceptance of the Internet, digital content distribution is now
`25 embodiment of the content distribution system of FIG. 1.
`25 embodiment of the content distribution system of FIG. 1.
`growing in popularity. Presently, original equipment manu
`growing in popularity. Presently, original equipment manu-
`growing in popularity. Presently, original equipment manu-
`facturers (OEMs) are providing personal computers with
`DETAILED DESCRIPTION
`DETAILED DESCRIPTION
`DETAILED DESCRIPTION
`facturers (OEMs) are providing personal computers with
`facturers (OEMs) are providing personal computers with
`open, programmable architectures that are capable of receiv
`open, programmable architectures that are capable of receiv-
`open, programmable architectures that are capable of receiv-
`The present invention relates to a platform and corre
`The present invention relates to a platform and corre-
`The present invention relates to a platform and corre-
`ing and/or transmitting audio-Visual information in a digital
`ing and/or transmitting audio-visual information in a digital
`ing and/or transmitting audio-visual information in a digital
`sponding method to protect content from unauthorized
`sponding method to protect content from unauthorized
`sponding method to protect content from unauthorized
`format. In many instances, the digitized audio-visual infor
`format. In many instances, the digitized audio-visual infor-
`format. In many instances, the digitized audio-visual infor-
`observation and/or manipulation through hardware-based
`observation and/or manipulation through hardware-based
`observation and/or manipulation through hardware-based
`mation is encrypted before transmission and decryption
`mation is encrypted before transmission and decryption
`mation is encrypted before transmission and decryption
`identification and a variety of content protection mecha
`identification and a variety of content protection mecha-
`identification and a variety of content protection mecha-
`upon receipt. Thus, most conventional personal computers
`upon receipt. Thus, most conventional personal computers
`upon receipt. Thus, most conventional personal computers
`nisms. Selected combinations of content protection mecha
`nisms. Selected combinations of content protection mecha-
`nisms. Selected combinations of content protection mecha-
`only rely on a single content protection mechanism (e.g.,
`only rely on a single content protection mechanism (e.g.,
`only rely on a single content protection mechanism (e.g.,
`nisms combined with hardware-based identification can
`nisms combined with hardware-based identification can
`nisms combined with hardware-based identification can
`encryption and decryption) that either provides program
`encryption and decryption) that either provides program-
`encryption and decryption) that either provides program-
`provide different levels of access control. Each level of
`provide different levels of access control. Each level of
`provide different levels of access control. Each level of
`ming in full quality or prevents the programming from being
`ming in full quality or prevents the programming from being
`ming in full quality or prevents the programming from being
`acceSS control is associated with a unique degree of protec
`access control is associated with a unique degree of protec-
`access control is associated with a unique degree of protec-
`displayed. Due to a lack of multiple content protection
`displayed. Due to a lack of multiple content protection
`displayed. Due to a lack of multiple content protection
`tion against unauthorized observation and/or manipulation
`tion against unauthorized observation and/or manipulation
`tion against unauthorized observation and/or manipulation
`mechanisms, conventional computers are unable to protect
`mechanisms, conventional computers are unable to protect
`mechanisms, conventional computers are unable to protect
`of content. Hence, each level of acceSS control comprises:
`of content. Hence, each level of access control comprises:
`of content. Hence, each level of access control comprises:
`the decrypted, digitized Video from being observed by an
`the decrypted, digitized video from being observed by an
`the decrypted, digitized video from being observed by an
`one or more authentication checks of a client identifier
`one or more authentication checks of a client identifier
`one or more authentication checks of a client identifier
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`and/or auxiliary information associated with the content
`and/or auxiliary information associated with the content
`and/or auxiliary information associated with the content
`by a malicious program during playback. This has greatly
`by a malicious program during playback. This has greatly
`by a malicious program during playback. This has greatly
`purchaser, content transformation and distortion; and pos
`purchaser; content transformation and distortion; and pos-
`purchaser; content transformation and distortion; and pos-
`impeded the expansion of digital content distribution.
`impeded the expansion of digital content distribution.
`impeded the expansion of digital content distribution.
`sibly extraction of meta-data from delivered content.
`sibly extraction of meta-data from delivered content.
`sibly extraction of meta-data from delivered content.
`Therefore, it would be desirable to create a platform and
`Therefore, it would be desirable to create a platform and
`Therefore, it would be desirable to create a platform and
`It should be apparent that certain embodiments are
`It should be apparent that certain embodiments are
`It should be apparent that certain embodiments are
`method for protecting digital content through hardware
`method for protecting digital content through hardware-
`method for protecting digital content through hardware-
`described in order to provide a thorough understanding of
`described in order to provide a thorough understanding of
`described in order to provide a thorough understanding of
`based identification and a variety of content protection
`based identification and a variety of content protection
`based identification and a variety of content protection
`the invention; however, these embodiments should