throbber

`1111111111111101111011111111q1101111111111110111111111111111
`
`11111111111111101111111111!!!!11111111 J11111111111111111110111111
`USOO6668246B1
`(10) Patent No.:
`US 6,668,246 B1
`US 6,668,246 B1
`US 6,668,246 B1
`(10) Patent No.:
`(to) Patent No.:
`(45) Date of Patent:
`Dec. 23, 2003
`(45) Date of Patent:
`Dec. 23, 2003
`(45) Date of Patent:
`Dec. 23, 2003
`
`(12) United States Patent
`(12) United States Patent
`(12) United States Patent
`Yeung et al.
`Yeung et al.
`Yeung et al.
`
`(54) MULTIMEDIA DATA DELIVERY AND
`(54)
`MULTIMEDIA DATA DELIVERY AND
`(54) MULTIMEDIA DATA DELIVERY AND
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`
`(75) Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`(75)
`Inventors: Minerva Ming-Yee Yeung, Sunnyvale,
`(75)
`CA (US); Matthew J. Holliman,
`CA (US); Matthew J. Holliman,
`CA (US); Matthew J. Holliman,
`Libertyville, IL (US); Robert G. Liu,
`Libertyville, IL (US); Robert G. Liu,
`Libertyville, IL (US); Robert G. Liu,
`Sunnyvale, CA (US); William W.
`Sunnyvale, CA (US); William W.
`Sunnyvale, CA (US); William W.
`Macy, Palo Alto, CA (US); Boon-Lock
`Macy, Palo Alto, CA (US); Boon-Lock
`Macy, Palo Alto, CA (US); Boon-Lock
`Yeo, Sunnyvale, CA (US)
`Yeo, Sunnyvale, CA (US)
`Yeo, Sunnyvale, CA (US)
`
`(*) Notice:
`Notice:
`( * ) Notice:
`* )
`
`(73) Assignee: Intel Corporation, Santa Clara, CA
`(73)
`Assignee: Intel Corporation, Santa Clara, CA
`(73) Assignee: Intel Corporation, Santa Clara, CA
`(US)
`(US)
`(US)
`Subject to any disclaimer, the term of this
`Subject to any disclaimer, the term of this
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`U.S.C. 154(b) by 0 days.
`U.S.C. 154(b) by 0 days.
`(21) Appl. No.: 09/275,905
`(21)
`Appl. No.: 09/275,905
`(21) Appl. No.: 09/275,905
`(22) Filed:
`Mar. 24, 1999
`(22)
`Filed:
`Mar. 24, 1999
`(22) Filed:
`Mar. 24, 1999
`(51) Int. Cl. ................................................ G06F 17/60
` GO6F 17/60
`(51)
`Int. C1.7
` GO6F 17/60
`(51) Int. C1.7
`(52) U.S. Cl. ............................. 705/57; 380/211: 705/1:
` 705/57; 380/211; 705/1;
`(52)
`U.S. Cl.
` 705/57; 380/211; 705/1;
`(52) U.S. Cl.
`705/51; 713/150
`705/51; 713/150
`705/51; 713/150
`380/200, 201
`(58) Field of Search
` 380/200, 201,
`(58)
`Field of Search
` 380/200, 201,
`(58) Field of Search
`380/211; 705/ 50.51.52 s 4, 57. 71.7150
`380/211; 705/1, 50, 51, 52, 54, 57; 713/150
`380/211; 705/1, 50, 51, 52, 54, 57; 713/150
`s
`s a Yu’s a u-s a as a
`s a
`s
`References Cited
`References Cited
`References Cited
`
`(56)
`(56)
`(56)
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`
` 380/44
`4,933,971 A * 6/1990 Bestock et al.
`380/44
`4,933,971 A * 6/1990 Bestock et al.
`4,933,971. A * 6/1990 Bestock et al. ............... 380/44
`5,638,448 A * 6/1997 Nguyen
` 380/29
`5,638,448 A * 6/1997 Nguyen ....................... 380/29
`5,638,448 A * 6/1997 Nguyen ...
`380/29
`
`JP
`JP
`JP
`
`5,689,566 A * 11/1997 Nguyen ...................... 713/155
`713/155
`5,689,566 A * 11/1997 Nguyen
`713/155
`5,689,566 A * 11/1997 Nguyen
`6,275,939 B1 * 8/2001 Garrison
`713/200
`6,275,939 B1 * 8/2001 Garrison
`713/200
`6,275,939 B1
`8/2001 Garrison ..................... 713/200
`6,298,446 B1 * 10/2001 Schreiber et al.
`713/201
`6,298,446 B1 * 10/2001 Schreiber et al.
`713/201
`6,298.446 B1 * 10/2001 Schreiber et al. ........... 713/201
`6,304,969 B1 * 10/2001 Wasserman et al.
`713/172
`6,304,969 B1 * 10/2001 Wasserman et al. ........ 713/172
`6,304,969 B1 * 10/2001 Wasserman et al.
`713/172
`6,353,892 B2 * 3/2002 Schreiber et al.
`713/201
`6,353,892 B2 * 3/2002 Schreiber et al.
`713/201
`6,353,892 B2 * 3/2002 Schreiber et al. ........... 713/201
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`2000-148689 A * 5/2000
`2000-148689 A * 5/2000
`2000-148689 A * 5/2000
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`Bobrowski: "Database in a client/server world-Under
`Bobrowski: "Database in a client/server world—Under-
`Bobrowski: "Database in a client/server world—Under-
`Standing the unique challenges of keeping your client/server
`standing the unique challenges of keeping your client/server
`standing the unique challenges of keeping your client/server
`database environment secure'; DBMS, Sep. 1, 1994, vol. 7,
`database environment secure"; DBMS, Sep. 1, 1994, vol. 7,
`database environment secure"; DBMS, Sep. 1, 1994, vol. 7,
`No. 10, pp. 48–48, (Abstract Onlv).
`No. 10, pp. 48-48, (Abstract Only).*
`No. 10, pp. 48-48, (Abstract Only).*
`O. IU, pp
`, (Abstract Only)
`* cited by examiner
`* cited by examiner
`* cited by examiner
`Primary Examiner Edward R. Cosimano
`Primary Examiner—Edward R. Cosimano
`Primary Examiner—Edward R. Cosimano
`(74) Attorney, Agent, or Firm-Blakely, Sokoloff, Taylor &
`(74) Attorney, Agent, or Firm—Makely, Sokoloff, Taylor &
`(74) Attorney, Agent, or Firm—Blakely, Sokoloff, Taylor &
`Zafman LLP
`Zafman LLP
`Zafman LLP
`ABSTRACT
`(57)
`ABSTRACT
`(57)
`ABSTRACT
`(57)
`A content distribution System comprising a server platform
`A content distribution system comprising a server platform
`A content distribution system comprising a server platform
`and a client platform. The Server platform includes a
`and a client platform. The server platform includes a
`and a client platform. The server platform includes a
`memory unit to Store digital content and access control logic
`memory unit to store digital content and access control logic
`memory unit to store digital content and access control logic
`to activate content protection mechanisms that provide mul
`to activate content protection mechanisms that provide mul-
`to activate content protection mechanisms that provide mul-
`tiple levels of access protection to the digital content. In
`tiple levels of access protection to the digital content. In
`tiple levels of access protection to the digital content. In
`communication with the Server platform, the client platform
`communication with the server platform, the client platform
`communication with the server platform, the client platform
`plays back Segments of the digital content at one of a
`plays back segments of the digital content at one of a
`plays back segments of the digital content at one of a
`plurality of quality levels.
`plurality of quality levels.
`plurality of quality levels.
`
`24 Claims, 9 Drawing Sheets
`24 Claims, 9 Drawing Sheets
`24 Claims, 9 Drawing Sheets
`
`Data
`Data
`
`22
`220
`220
`
`( Content )--er.
`t
`EN2
`EN0
`EN2-0.
`
`225
`2
`225
`
`236
`( -230
`( -230
`Edecompression
`Decompression
`Decompression
`Unit
`Unit
`Unit
`
`f
`
`Process ControlLogic
`Process COMM! Logic
`Process Control Logic
`210
`2.
`210
`4 4 4 4 4 4
`ENEN2EN3EN4 ENS EN3
`EN1 EN2 EN3 EN4 ENS EN6
`EN! EN2 EN3 EN4 ENS EN6
`
`-------------------
`s
`15
`( -215
`1"
`
`Robust
`Robust
`Robust
`Watermark HEN
`Wateimaik
`Watermark 1-ENI
`insertion
`Insertion
`Insertion
`
`FROM
`FROM
`FROM
`120
`120
`12
`Request80
`Request 180
`Request 180
`Client
`Client
`Client
`identifier
`Identifier
`Identifier
`(CPUID)
`(CPU ID)
`(CPU JD)
`Order Info
`Order info
`Order Info
`
`5
`185
`185
`
`y
`Jit
`235
`235
`235
`EN3
`EN3
`EN3- R
`r c Content
`
`REC_ID
`REC_ID
`Compression w
`Compression
`Compress].
`Unit
`Unit
`
`:
`
`/
`
`Content
`k
`
`240
`
`)
`)
`
`---------------------wou
`
`r 200 Unit
`Memory EN4-0.
`200 Unit
`
`ENS-4.
`ENS
`
`KEY] 4.
`KEY
`251 -
`250 22551; KEY1
`250 -
`2501 2255/2-.--- KEYS'- /
`252
`KEY
`EN6
`EN6-1.
`
`Fast Waternark
`ao
`Fasth,serdSSter
`
`Fast Watermark
`Insertion
`280
`280
`280
`Insertion
`Insertion
`Visual. Perceptual
`Isual/Percmptal
`Visual/Perceptual
`Scrambiing
`Scrambling
`Scrambling
`260
`260
`260
`Data Scrambling
`Data Scrambling
`Data Scrambling
`(Encrypt
`(Encrypt)
`(Encrypt)
`270
`270
`270
`
`:
`:
`
`)
`R.
`TV
`Delivered'.
`Delivered'.
`iDelivered
` Content
`Content
`Content
`290
`290
`29t
`
`
`
`CEient-Based
`Client-Based
`Client-Based
`Information
`Information
`information
`
`185
`185
`35
`
`Authentication
`Authentication
`Authentication
`Check
`Check
`Check
`(CPUIDs, REC IDs,
`(CPU_1Ds, REC_IDs,
`(CPU_lDs, REC_IDs,
`etc.)
`etc.)
`
`Key
`Key
`Key
`Generation
`Generation
`Generation
`1940.s
`(Mapping
`(Mapping
`bmnion
`Function)
`Function)
`255
`255
`255
`
`
`
`WER
`SERVER
`SERVER
`p
`PLATFORM
`PLATFORM
`f
`110
`110
`
`YS 250
`YS 250
`Y1 5
`RI
`KEY!
`252
`252
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0001
`
`

`

`U.S. Patent
`luaiud 'S'fl
`Waled *S11
`
`Dec. 23, 2003
`
`Sheet 1 of 9
`6 JO 1 lamIS
`6 JO I lamiS
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`is 917e899`9 Sf1
`
`
`
`140
`140
`Th
`-Th
`
`az
`
`-<
`
`145
`145
`
`135
`135
`Th
`
`
`I:
`
`zS'N
`.z.e•
`SIG
`SIG
`
`155
`155
`
`CHIPSET
`CHIPSET
`
`150
`150
`
`120
`120
`
`PLATFORM
`PLATFORM
`
`CLIENT
`CLIENT
`
`185
`185
`
`<_TENT-BASED INFO
`CLTFNT-BASED INFO
`
`DEVICE
`DEVICE
`
`NOILVOINOWNWOO
`
`COMMUNICATION
`COMMUNICATION
`
`' 180
`18
`REQUEST
`REQUEST
`10
`0
`
`m130
`Th130
`
` k
`
` i
`
`Th
`Th
`
`CPU ID
`CPU ID
`
`RHOSSHOONHA
`
`PROCESSOR
`PROCESSOR
`
`CONTENT
`CONTENT
`
`,-160
`
`110
`110
`
`PLATFORM
`PLATFORM
`
`
`
`WRIO HILVTd?
`
`(HGHARIGHS
`
`SERVER
`SERVER
`
`100
`100
`
`FIG. 1
`
`
`
`
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0002
`
`

`

`U.S. Patent
`U.S. Patent
`U.S. Patent
`
`Dec. 23, 2003
`Dec. 23, 2003
`Dec. 23, 2003
`
`Sheet 2 of 9
`Sheet 2 of 9
`Sheet 2 of 9
`
`US 6,668,246 B1
`US 6,668,246 B1
`US 6,668,246 B1
`
`FIG. 2
`FIG, 2
`
`Data
`Data
`Data
`
`220
`2201/4
`221
`
` ►
`Content
`Content
`EN2
`EN2
`EN2—*
`
`225
`225
`225 '1
`
`r230
`( -230
`230
`Decompression
`Decompression
`Decompression
`Unit
`Unit
`Unit
`
`-
`
`r215
`25
`r215
`
`
`
`
`
`
`
`►
`
`Robust
`Robust
`Robust
`Watermark
`-EN1;
`Watermark 4--EN]
`Watermark 4-EN1
`Insertion
`Insertion
`Insertion
`
`
`
`
`
`
`
`
`
`FROM
`FROM
`FROM
`120
`120
`120
`Request 180
`Request 180
`Request 180
`Client
`Client
`Client
`Identifier
`Identifier
`Identifier
`(CPUID)
`(CPU_ID)
`(CPU_ID)
`Order Info
`Order Info
`
`
`
`
`
`85
`}185
`}185
`
`•
`•
`
`REC_ID
`REC_ID
`
`Process Control Logic
`Process Control Logic
`210
`210
`
`EN1 EN2 EN3 EN4 ENS EN6
`EN1 EN2 EN3 EN4 EN5 EN6
`
`(
`
`235
`235
`EN3-10
`EN3
`
`Compression
`Compression
`Unit
`Unit
`
`rC Content
`240
`240
`
`K Content
`CD
`r Memory EN4
`r Memory
`t
`200
`200 Unit
`Unit
`
`_01
`EN4
`
`ENS
`EN5
`EN5-0.
`
`
`
`
`
`Client-Based
`Client-Based
`Client-Based
`Information
`Information
`Information
`
`250'
`250
`
`251
`251
`252
`252
`
`185
`85
`
`KEY
`KEY]
`KEY1
`
`
`
`
`
`KEY1 F-0:1
`KEY1
`EN6
`EN6-10.
`EN6
`
`
`
`/
`
`280
`
`Fast Watermark
`Fast Watermark
`Fast Watermark
`280
`280
`Insertion
`Insertion
`Visual/Perceptual
`Visual/Perceptu
`Visual/Perceptual
`Scrambling
`Scrambling
`Scrambling
`260
`260
`260
`
`Disting
`Data Scrambling
`Data Scrambling
`(Encrypt)
`(Encrypt)
`C
`Er
`270
`270
`
`V
`
`SERVER
`SERVER
`SERVER
`PLATFORM
`PLATFORM
`PLATFORM
`
`110
`110
`10
`
`Delivered
`Delivere
`Delivered
`Content
`Content
`Content
`290
`290
`290
`
`185 /
`
`
`
`Authentication
`Authentication
`Authentication
`Check
`Check
`Check
`(CPUIDs, REC IDs,
`(CPU_TDs, REC_1Ds,
`(CPUJ:Ds, REC_1D
`etc.)
`
`etc.)
`etc.)
`
`
`
`Key
`Key
`Key
`Generation
`Generation
`Generation
`(Mapping
`(Mapping
`(Mapping
`Function)
`Function)
`Function)
`255
`255
`255
`
`KEYS 250
`KEYS 250
`KEYS 250
`KEY
`KEY 1
`KEYI
`
`251
`251
`25
`
`KEY
`KEY1
`KEY
`
`252
`252
`252
`
`
`
`
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0003
`
`

`

`U.S. Patent
`U.S. Patent
`U.S. Patent
`
`Dec. 23, 2003
`Dec. 23, 2003
`Dec. 23, 2003
`
`Sheet 3 of 9
`Sheet 3 of 9
`Sheet 3 of 9
`
`US 6,668,246 B1
`US 6,668,246 B1
`US 6,668,246 B1
`
`
`
`0 MPEG Video Content Delivery System
`C MPEG Video Content Delivery System
`
`Fr4
`
`370
`370
`
`11 0 oOr,
`
`0, 0
`
`I0
`
`/ 0
`/ 0
`
`310
`310
`510
`311
`311
`3.11
`
`312
`312
`312
`
`300
`300
`
`380
`
`► I II
`
`382
`382
`
`I
`381
`381
`v. DataScrambling
`gi
`Key
`Data Scrambling
`Key I--
`Data Scrambling
`Visual Scrambling
`330-
`330
`Y
`Visual Scrambling is...N-
`-
`Visual Scrambling
`gi
`Source
`Source
`340
`340
`ostern
`go
`Fingerprinting
`340
`Fingerprinting
`Fingerprinting
`DestinationL_
`Destination r
`360
`360
`
`320—
`320 —
`
`
`
`
`
`Encode
`Encode
`
`Fingerprint I
`Fingerprint'
`
`Watermarking Message
`Watermarking Message
`Watermarking Message'
`
`350
`350
`
`FIG, 3
`FIG 3
`FIG, 3
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0004
`
`

`

`luaiud 'S'fl
`Waled *S11
`
`6 JO 17 lamIS
`6 JO I lamiS
`
`HI 917Z`899`9 Sfl
`is 917e899`9 Sf1
`
`FIG, 4
`FIG, 4
`
`11. CONTROL
`. CONTROL
`
` 0
` 1
`
`120
`120
`
`PLATFORM
`PLATFORM
`CLIENT
`CLIENT
`
`EXTRACTION 440
`EXTRACTION 440
`
`WATERMARK
`WATERMARK
`
`4
`
`450
`450
`
`DESCRAMBLING 430
`DESCRAMBLING 430
`" VISUAL/PERCEPTUAL
`VISUAL/PERCEPTUAL
`
`10
`
`
`
`C.)
`r 490
`( 490
`
`-•1
`
`PLAYER
`PLAYER
`CONTENT
`CONTENT
`
`4,
`
`420
`420
`
`DATA DESCRAMBLING
`DATA DESCRAMBLING
`
`410
`410
`UNIT
`UNIT
`
`
`
`•
`
`•
`
`MEMORY
`MEMORY
`
`(CONTENT
`(CONTENT
`
`r 290
`290
`
`1470
`1470
`
`471
`471
`
`KEY
`KEY
`
`KEY
`KEY
`
`471
`471
`
`472
`472
`
`460
`460
`
`11(MS
`11(114S
`(470
`(470
`
`AUX. INFO
`AUX. INFO
`
`FUNCTION
`FUNCTION
`MAPPING
`MAPPING
`
`CPU ID
`CPU JD
`
`150
`150
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0005
`
`

`

`HI 917Z`899`9 Sfl US 6,668,246 B1
`is 917e899`9 Sf1
`
`6 JO S lamIS
`6 JO i lamiS
`Sheet 5 of 9
`
`Dec. 23, 2003
`
`Co.)
`O
`O
`
`luaiud 'S'fl
`U.S. Patent
`Waled *S11
`
` IGC4,11GB15
` I GC4,11GB15
`
`0:43
`0.0
`
` 1
`1
`
` IMPEG-2
` I MPE3.2
`
` IType: P
`1 i lype: P
`
` !Frame: rams (Time: 1134)
`!Frame: iff131.5 (lime' 1
`)
`
` !FPS: 30.71/1927
` 'FPS: 303111927
`
`iRead1
`Re
`
`1
`
`FIG. 5
`FIG. 5
`
`Stream Navigation
`Stream Navigation
`
`500
`500
`
`??? TET
`
`OK
`OK
`
`la
`
`pi
`
`aInvalid MPEG stream or incorrect key
`® Invalid MPEG stream or incorrect key
`
`MPL error
`MPL error
`
`LO 2
`
`
`
`Y U V 1701.11 4,'"310IP
`-0101P
`Y U V F.:7-02.i4,
`
`E
`
`e 0-0+1 I P B
`I P B
`if
`File View Help
`File View Help
`t: synergy_out_sc_key1234.mpg - Player
`synergy_outfic_key1234.mpg - Player
`
`t> El +1
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0006
`
`

`

`wawa 'S'fl
`Poled *S11
`U.S. Patent
`
`6 Jo 9 lamiS
`6 JO 9 loolIS
`
`iti 917e899`9 Sa US 6,668,246 B1
`is 917e899`9 Sf1
`
`r
`
`qt
`
`CD 21
`1-jc3 2i
`
`
`
`A
`
`
`
`II G0I,RG015
`li WI AGEP 5
`
`Oxi)
`NO
`
`I
` i
`
` IIREG.2
`3 MPEG-2
`
`I ITYPe: P
`I Tre, P
`
`.•...'"°"<#)
`
`....1
`
`'''''
`
`_--.''
`
`\
`
`--N
`-,..
`
`."......'
`
`......
`
`.4.' \
`
`........
`
`-?..../
`
`6
`
`7 )
`
`ii
`, t
`
`dor
`
`-----,
`
`co
`2C0
`CO
`
`,#),/
`
`ocoo 05
`
`orzikete, -
`NII,14/11186,1
`-aim -Oft, -
`frilaNaaVil
`
`..„,,
`
`lilt,
`1411
`
`. ,r...........
`
`
`
`1
`
`a
`
`i
`
`l
`
`1:
`
`i
`
`laill
`
`1....
`
`11111111,4
`
`44P. ate
`
`440
`
`, ..
`
`45"'AM P
`V, -0101
`
`
`
`Iliad ar
`
`,,
`
`111111
`
`111141
`
`117
`
`Vage.14,4.,
`4111111*
`111;
`isilitit
`II
`
`..4F.."-1••—zilitii
`at if r Ir. ,
`c:.......ia"
`e=arriii
`aa ill
`,,,„
`re;;;.,-;Xiiiiiii
`a .
`frii;;A:morgivitig
`-- --;,,g-r-g•--.0 :7-_,,:„If
`,•.-nr
`_........, _ ,.. if
`e, ID CI +1
`.111 i> El +1 I P B YIU V Li j
`Y U V 1:1
`
`ili lobrab SIB
`kit IBM MIMI i
`iiiiitallainlirt,
`Ili iiiiiii1010111
`
`Ile°
`
`ill
`
`It
`
`ii
`
`li
`
`110,11
`
`0.
`
`Et 11/Z0=
`
`File View Help
`File View Help
`Z„ synergy_out_sckey1234.mpg - Player
`.v":',G synergy_aut_sc_key1 234.mpg - Player
`
`
`
`
`
`
`
`
`
`
`
` 'Frame' 000035 P.m 1.134)
`'Frame: ono (rtrne:
`1.134)
`
`
`
`I PS. 30 71/1027
`[FPS: 30.71/19.27
`
` (
`
`1F041
`
`Ifs
`
`FIG. 6
`FIG. 6
`
`Stream Navigation
`Stream Navigation
`
`((4
`
`r
`
`',..
`
`MI
`Mk
`*11/4
`
`lik
`
`mos
`
`Mil
`
`
`
`,
`
`I
`
`10111
`
`01,
`
`liariiiii1
`
`I
`
`ip
`.4.1P-
`
`il
`
`74
`
`f
`
`-
`
`,r,.
`
`I P B
`
`al
`
`k
`
`I la
`
`ilk
`
`1!7777-
`
`"17
`
`1.1;"""W
`
`lt.:11
`
`4;
`
`k#
`
`gli
`
`gigli
`
`0,
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0007
`
`

`

`Juaied 'S11
`luaiud 'S'fl
`U.S. Patent
`
`6 JO L lamIS
`6 JO L lamIS
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`is 917e899`9 Sf1
`
`.'
`-,
`s,
`...
`,
`
`ilii
`
`...,,, ii
`
`1
`
`Cancel
`Cancel
`
`
`
`OK
`OK
`
`700
`700
`KeY: 1
`Key:
`
`El
`LA
`\\,..
`\\•,N,.
`
`—ICA Z
`—ICI Z
`
`
`
`4zZ,------,.. /./
`./Albg----'-..-. //
`
`Descrambling key
`Descrantling key
`
`-
`
`-....
`et*--..
`
`N.
`N.
`
`.,..---/--, 7%
`
`,...
`
`.. _
`
`11
`
`C°
`
`)D°
`
`iltamals
`1101:30,561.5
`
`3676
`3676
`
` I
`1
`
` I 14PEG-2
` I 1REG-2
`
`ITyPel
` I TYPe: P
`
` 1 Rama: 030335 (Tre: 1.134)
`'Frame: 506035 (Time: 1.134)
`
`1IPS.30.7111927
`I IPS: 30.71/1927
`
`I
`
`•
`
`•
`
`i
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`,
`
`!
`
`1
`
`11
`
`1.
`
`.
`
`t
`
`l
`
`I
`
`„
`
`!Rea.*
`
`(Ready
`
`,
`
`n
`
`FIG. 7
`FIG. 7
`
`,---
`
`.....--
`
`*"..
`
`Stream Navigation
`Stream Navigation
`
`CA
`a?
`
`ii
`
`.....
`,411
`.
`
`1.
`
`jj 14
`
`-7.1
`
`C
`
`,------- -
`/A
`
`4
`
`49
`
`"
`
`j
`„.......
`
`7
`
`y
`
`aluger,
`
`elarMalU ali non*
`ili. ill: "mar Jr
`i Iiiimrsersirom4
`I I iiMile MOW
`ill
`1
`illOirailimiti
`iiii :ill anises,
`pia
`tiii-aimiriagi
`iii ism kalif /
`6:::::F. :Was/
`L.:I:F.:ilia i
`ri,-;;;;;;;;Hrom
`air it
`ri,v,-;e7imiesim
`IS:VX....ZIL'a al fif
`0;
`11.41r::."i
`__ , „„......,,
`--.---'
`1...•----
`-----... ,
`,
`. .-
`. ,-,e•
`B y u vFiti_til To
`I
`I P 8 YUI/F101 d 2,1-Acip
`
`, , ...........,-,----
`
`fa or 1.e.o...'"-
`
`Voi)
`""".ell 41/4
`00"
`
`ii
` Meant
`
`...,
`
`-
`
`Mk
`
`IN
`
`litt
`iiirk
`
`00.111111.
`Worn
`
`...0
`
`'
`ir 11:- .
`
`I , P
`
`_.--
`la L
`HSI
`471,"•=r--Siiiiii
`..4?!..1-"P-----zillti
`- - . . .1 4 ;0 4 ,i 1_ "
`I I till'
`iaaiiii
`Aiiiiiiii.P5
`lijirrear.91!
`lEmosiiii ft."
`''..
`i.-
` AO a. il r 9 lir
`* i0.
`.......t__ _
`.....1r.
`eI>II:11+1
`+1
`EJI>111
`
`file _View Help
`F ile View Help
`Wm
`U synergy_out_vscfp_nods_key1234.mpg - Player
`r„, synergy_out_vscfp_nods_key12343-npg - Player
`
`4'
`1.
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0008
`
`

`

`U.S. Patent
`Waled °S'Il
`luaiud 'S'fl
`
`Dec. 23, 2003
`
`6 JO 8 laNS
`6 JO 8 lamiS
`Sheet 8 of 9
`
`HI 917Z`899`9 Sfl US 6,668,246 B1
`is 917e899`9 Sf1
`
`/4
`Asf
`
`I
`
`
`
`3I6x6 11CW6516
`316x6
` I GDI,RGB15
`
`I
`J
`
` I MPEG-2
`II MPEG-2
`
`I [Type: B
`itype: 13
`
`3.
`
`1 Me'
`IfFrame: WOO (T
` rMei
`
`l
`
` IFPS: 17
`I n
`Fps:17,60022
`
` !
`
`iReadY
`I Reach,
`
`)
`)
`
`FIG. 8
`FIG. 8
`
`Stream Navigation
`Stream Navigation
`
`s•.. „
`
`0 0 r\
`
`r---__7-----
`i ______
`-_-:.:-.---- --•\
`____,
`
`,c
`
`\
`
`,,
`
`Y
`
`/
`
`(
`
`) e) )
`
`--?
`
`\:-..,....\_,,,_\
`
`1
`
`I
`
`/I 11
`!
`, , 1
`I I
`I I 1
`
`I
`
`El
`
`WO (4
`Z
`
`
`
`800
`800
`
`Cool!
`Cool!
`
`..i
`
`Created on Katmai A
`Created on Katmai A
`Copyright information: watermark not found
`Copyright information: Watermark not found
`
`Recipient information:
`Recipient intonation:
`
`Extracted watermarks
`Extracted watermarks
`
`ci ^ rs
`1/1„10°°
`) / 1 0el
`,„.., —
`r, Li
`
`,..
`._,,,,..
`
`/
`
`;, -%''`-•
`
`,,,,i ._,:i.%,
`
`<->)
`
`—
`
`e'----
`
`(
`
`....
`
`-1 1
`
`0
`
`1
`
`i.c..•
`
`l'
`
`---T-L.
`72"L
`
`.(
`
`Lj
`
`/
`
`------
`__rir.____\
`_-----
`
`i
`
`—
`
`--"---::-------"-----
`—.
`
`-
`
`Y U V 1: ELLI 14, ^01©l P
`YUV1:101 ? v -A(01 p
`
`I P B
`I P B
`
`t>01+1I
`I> 0 +1
`
`6
`
`File View Help
`File View Help
`mi'G synergy_out_vecip_nods_nokey.mpg - Player
`7:, synergy_out_vscip_nods_nokey.mpg - Player
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0009
`
`

`

`US 6,668,246 B1
`HI 917Z`899`9 Sfl
`is 917e899`9 Sf1
`
`6 JO 6 lamIS
`6 JO 6 lamIS
`
`IN)
`
`U.S. Patent
`luaiud 'S'fl
`Waled *S11
`
`FIG, 9
`FIG, 9
`
`6 91-7
`
`PLAYER
`PLAYER
`CONTENT
`CONTENT
`TO>
`
`270
`270
`
`SCRAMBLING
`SCRAMBLING
`
`DATA
`DATA
`
`260
`260
`
`SCRAMBLING
`SCRAMBLING
`PERCEPTUAL
`PERCEPTUAL
`
`VISUAL/
`VISUAL/
`
`DESCRAMBLING
`DESCRAMBLING
`
`DATA
`DATA
`
`SCRAMBLING
`SCRAMBLING
`
`DATA
`DATA
`
`280
`280
`
`
`
`CONTENT
`CONTENT
`
`INSERTION
`INSERTION
`
`WATERMARK
`WATERMARK
`
`FAST
`FAST
`
`CONTENT
`CONTENT>
`
`900 -)
`900 -\
`
`KEY 2
`KEY 2
`
`KEY I
`KEY 1
`
`410
`410
`UNIT
`UNIT
`
`MEMORY
`MEMORY
`
`120
`120
`
`JQ
`
`PLATFORM
`PLATFORM
`CLIENT
`CLIENT
`
`PLATFORM
`PLATFORM
`SERVER
`SERVER
`
`KEY
`KEY
`
`INSERTION
`INSERTION
`
`WATERMARK
`WATERMARK
`
`026
`
`920
`920
`
`
`
`
`
`
`
`
`
`DISH-Blue Spike-246
`Exhibit 1014, Page 0010
`
`

`

`US 6,668,246 B1
`US 6,668,246 B1
`US 6,668,246 B1
`
`1
`1
`1
`MULTIMEDIA DATA DELIVERY AND
`MULTIMEDIA DATA DELIVERY AND
`MULTIMEDIA DATA DELIVERY AND
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`PLAYBACK SYSTEM WITH MULTI-LEVEL
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`CONTENT AND PRIVACY PROTECTION
`
`BACKGROUND
`BACKGROUND
`BACKGROUND
`
`2
`2
`2
`FIG. 3 is an embodiment of a screen menu produced at the
`FIG. 3 is an embodiment of a screen menu produced at the
`FIG. 3 is an embodiment of a screen menu produced at the
`Server platform for Selecting the origin of the content and the
`server platform for selecting the origin of the content and the
`server platform for selecting the origin of the content and the
`level of access control based on the Selected content pro
`level of access control based on the selected content pro-
`level of access control based on the selected content pro-
`tection mechanisms.
`tection mechanisms.
`tection mechanisms.
`FIG. 4 is an illustrative block diagram of an embodiment
`FIG. 4 is an illustrative block diagram of an embodiment
`FIG. 4 is an illustrative block diagram of an embodiment
`of a client platform of the content distribution system of
`of a client platform of the content distribution system of
`of a client platform of the content distribution system of
`FIG. 1.
`FIG. 1.
`FIG. 1.
`1. Field
`1. Field
`1. Field
`FIG. 5 is an embodiment of a screen display produced by
`FIG. 5 is an embodiment of a screen display produced by
`FIG. 5 is an embodiment of a screen display produced by
`The present invention relates to the field of data security.
`The present invention relates to the field of data security.
`The present invention relates to the field of data security.
`the client platform of FIG. 4 when the content client
`More particularly, this invention relates to a platform and
`the client platform of FIG. 4 when the content client
`the client platform of FIG. 4 when the content client
`More particularly, this invention relates to a platform and
`More particularly, this invention relates to a platform and
`10 platform is unable to pass a first level of access control.
`10
`platform is unable to pass a first level of acceSS control.
`corresponding method for protecting content through mul
`platform is unable to pass a first level of access control.
`corresponding method for protecting content through mul-
`corresponding method for protecting content through mul-
`tiple content control.
`FIG. 6 is an embodiment of a Screen display featuring
`tiple content control.
`tiple content control.
`FIG. 6 is an embodiment of a screen display featuring
`FIG. 6 is an embodiment of a screen display featuring
`degraded digital content produced by the client platform of
`2. General Background
`degraded digital content produced by the client platform of
`degraded digital content produced by the client platform of
`2. General Background
`2. General Background
`FIG. 4 when the client platform is unable to pass a second
`FIG. 4 when the client platform is unable to pass a second
`FIG. 4 when the client platform is unable to pass a second
`For over fifty years, the entertainment industry has pro
`For over fifty years, the entertainment industry has pro-
`For over fifty years, the entertainment industry has pro-
`level of acceSS control.
`level of access control.
`level of access control.
`Vided audio-visual information to the general populous in
`vided audio-visual information to the general populous in
`vided audio-visual information to the general populous in
`FIG. 7 is an embodiment of a screen display featuring a
`FIG. 7 is an embodiment of a screen display featuring a
`the form of television programming. When transmitted in an
`FIG. 7 is an embodiment of a screen display featuring a
`the form of television programming. When transmitted in an
`the form of television programming. When transmitted in an
`user identification window that prompting input of user
`user identification window that prompting input of user
`analog format Such as National Television Systems Com
`user identification window that prompting input of user
`analog format such as National Television Systems Com-
`analog format such as National Television Systems Com-
`information before removing visual degradation from the
`mittee (NTSC) or Phase Alternating Line (PAL), this pro
`information before removing visual degradation from the
`information before removing visual degradation from the
`mittee (NTSC) or Phase Alternating Line (PAL), this pro-
`mittee (NTSC) or Phase Alternating Line (PAL), this pro-
`digital content.
`gramming is Somewhat protected due to the inherent nature
`digital content.
`digital content.
`gramming is somewhat protected due to the inherent nature
`gramming is somewhat protected due to the inherent nature
`of analog signaling. For example, analog Signals are trouble
`FIG. 8 is an embodiment of a screen display featuring a
`of analog signaling. For example, analog signals are trouble-
`of analog signaling. For example, analog signals are trouble-
`FIG. 8 is an embodiment of a screen display featuring a
`FIG. 8 is an embodiment of a screen display featuring a
`fingerprinting menu to provide ownership information con
`Some to illicitly copy and redistribute. Also, the recorded
`some to illicitly copy and redistribute. Also, the recorded
`some to illicitly copy and redistribute. Also, the recorded
`fingerprinting menu to provide ownership information con-
`fingerprinting menu to provide ownership information con-
`copies have poorer image quality than the original program
`cerning the digital content prior to playback on the content
`copies have poorer image quality than the original program-
`copies have poorer image quality than the original program-
`cerning the digital content prior to playback on the content
`cerning the digital content prior to playback on the content
`ming.
`client platform.
`ming.
`ming.
`client platform.
`client platform.
`Due to advances in digital processing technology and
`FIG. 9 is an illustrative block diagram of a second
`Due to advances in digital processing technology and
`Due to advances in digital processing technology and
`FIG. 9 is an illustrative block diagram of a second
`FIG. 9 is an illustrative block diagram of a second
`acceptance of the Internet, digital content distribution is now
`embodiment of the content distribution system of FIG. 1.
`25
`acceptance of the Internet, digital content distribution is now
`acceptance of the Internet, digital content distribution is now
`25 embodiment of the content distribution system of FIG. 1.
`25 embodiment of the content distribution system of FIG. 1.
`growing in popularity. Presently, original equipment manu
`growing in popularity. Presently, original equipment manu-
`growing in popularity. Presently, original equipment manu-
`facturers (OEMs) are providing personal computers with
`DETAILED DESCRIPTION
`DETAILED DESCRIPTION
`DETAILED DESCRIPTION
`facturers (OEMs) are providing personal computers with
`facturers (OEMs) are providing personal computers with
`open, programmable architectures that are capable of receiv
`open, programmable architectures that are capable of receiv-
`open, programmable architectures that are capable of receiv-
`The present invention relates to a platform and corre
`The present invention relates to a platform and corre-
`The present invention relates to a platform and corre-
`ing and/or transmitting audio-Visual information in a digital
`ing and/or transmitting audio-visual information in a digital
`ing and/or transmitting audio-visual information in a digital
`sponding method to protect content from unauthorized
`sponding method to protect content from unauthorized
`sponding method to protect content from unauthorized
`format. In many instances, the digitized audio-visual infor
`format. In many instances, the digitized audio-visual infor-
`format. In many instances, the digitized audio-visual infor-
`observation and/or manipulation through hardware-based
`observation and/or manipulation through hardware-based
`observation and/or manipulation through hardware-based
`mation is encrypted before transmission and decryption
`mation is encrypted before transmission and decryption
`mation is encrypted before transmission and decryption
`identification and a variety of content protection mecha
`identification and a variety of content protection mecha-
`identification and a variety of content protection mecha-
`upon receipt. Thus, most conventional personal computers
`upon receipt. Thus, most conventional personal computers
`upon receipt. Thus, most conventional personal computers
`nisms. Selected combinations of content protection mecha
`nisms. Selected combinations of content protection mecha-
`nisms. Selected combinations of content protection mecha-
`only rely on a single content protection mechanism (e.g.,
`only rely on a single content protection mechanism (e.g.,
`only rely on a single content protection mechanism (e.g.,
`nisms combined with hardware-based identification can
`nisms combined with hardware-based identification can
`nisms combined with hardware-based identification can
`encryption and decryption) that either provides program
`encryption and decryption) that either provides program-
`encryption and decryption) that either provides program-
`provide different levels of access control. Each level of
`provide different levels of access control. Each level of
`provide different levels of access control. Each level of
`ming in full quality or prevents the programming from being
`ming in full quality or prevents the programming from being
`ming in full quality or prevents the programming from being
`acceSS control is associated with a unique degree of protec
`access control is associated with a unique degree of protec-
`access control is associated with a unique degree of protec-
`displayed. Due to a lack of multiple content protection
`displayed. Due to a lack of multiple content protection
`displayed. Due to a lack of multiple content protection
`tion against unauthorized observation and/or manipulation
`tion against unauthorized observation and/or manipulation
`tion against unauthorized observation and/or manipulation
`mechanisms, conventional computers are unable to protect
`mechanisms, conventional computers are unable to protect
`mechanisms, conventional computers are unable to protect
`of content. Hence, each level of acceSS control comprises:
`of content. Hence, each level of access control comprises:
`of content. Hence, each level of access control comprises:
`the decrypted, digitized Video from being observed by an
`the decrypted, digitized video from being observed by an
`the decrypted, digitized video from being observed by an
`one or more authentication checks of a client identifier
`one or more authentication checks of a client identifier
`one or more authentication checks of a client identifier
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`unauthorized user or manipulated (e.g., copied, altered, etc.)
`and/or auxiliary information associated with the content
`and/or auxiliary information associated with the content
`and/or auxiliary information associated with the content
`by a malicious program during playback. This has greatly
`by a malicious program during playback. This has greatly
`by a malicious program during playback. This has greatly
`purchaser, content transformation and distortion; and pos
`purchaser; content transformation and distortion; and pos-
`purchaser; content transformation and distortion; and pos-
`impeded the expansion of digital content distribution.
`impeded the expansion of digital content distribution.
`impeded the expansion of digital content distribution.
`sibly extraction of meta-data from delivered content.
`sibly extraction of meta-data from delivered content.
`sibly extraction of meta-data from delivered content.
`Therefore, it would be desirable to create a platform and
`Therefore, it would be desirable to create a platform and
`Therefore, it would be desirable to create a platform and
`It should be apparent that certain embodiments are
`It should be apparent that certain embodiments are
`It should be apparent that certain embodiments are
`method for protecting digital content through hardware
`method for protecting digital content through hardware-
`method for protecting digital content through hardware-
`described in order to provide a thorough understanding of
`described in order to provide a thorough understanding of
`described in order to provide a thorough understanding of
`based identification and a variety of content protection
`based identification and a variety of content protection
`based identification and a variety of content protection
`the invention; however, these embodiments should

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket