throbber
August 4, 1999
`
`Inventors: Scott Moskowitz & Michael Berry
`
`A Secure Personal Content ServerSECURE PERSONAL CONTENT SERVER
`
`Field of Invention
`The present invention relates to the secure distribution of digitized value-added
`information, or media content, while preserving the ability of publishers to make available
`unsecureunsecured versions of the same value-added information, or media content, without
`adverse effect to the systems security.
`Authentication, verification and authorization are all handled with a combination of
`cryptographic and steganographic protocols to achieve efficient, trusted, secure exchange of
`digital information.
`
`Cross-Reference To Related Application
`This application is based on and claims the benefit of pending U.S. Patent Application
`Serial No. 60/147,134, filed 08/04/99, entitled, “A Secure Personal Content Server” and pending
`U.S. Patent Application Serial No. 60/213,489, filed 06/23/2000, entitled “A Secure Personal
`Content Server.”
`This application also incorporates by reference the following applications: pending U.S.
`Patent Application Serial No. 08/999,766, filed 7/23/97, entitled “Steganographic Method and
`Device”; pending U.S. Patent Application Serial No. 08/772,222, filed 12/20/96, entitled “Z-
`Transform Implementation of Digital Watermarks”; pending U.S. Patent Application Serial No.
`09/456,319, filed 12/08/99, entitled “Transform Implementation of Digital Watermarks”;
`pending U.S. Patent Application Serial No. 08/674,726, filed 7/2/96, entitled “Exchange
`Mechanisms for Digital Information Packages with Bandwidth Securitization, Multichannel
`Digital Watermarks, and Key Management”; pending U.S. Patent Application Serial No.
`09/545,589, filed 04/07/2000, entitled “Method and System for Digital Watermarking”; pending
`U.S. Patent Application Serial No. 09/046,627, filed 3/24/98, entitled “Method for Combining
`Transfer Function with Predetermined Key Creation”; pending U.S. Patent Application Serial
`No. 09/053,628, filed 04/02/98, entitled “Multiple Transform Utilization and Application for
`Secure Digital Watermarking”; pending U.S. Patent Application Serial No. 09/281,279, filed
`3/30/99, entitled “Optimization Methods for the Insertion, Protection, and Detection...”; U.S.
`Patent Application Serial No.09/594,719, filed June 16, 2000, entitled “Utilizing Data Reduction
`
` 1
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0001
`
`

`

`in Steganographic and Cryptographic Systems” (which is a continuation-in-part of PCT
`application No. PCT/US00/06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999); and pending U.S.
`Application No 60/169,274, filed 12/7/99, entitled “Systems, Methods And Devices For Trusted
`Transactions.” All of the patent applications previously identified in this paragraph are hereby
`incorporated by reference, in their entireties.
`Background of the Invention
`The music industry is at a critical inflection point. Digital technology enables anyone to
`make perfect replica copies of musical recordings from the comfort of their home, or as in some
`circumstances, in an offshore factory. Internet technology enables anyone to distribute these
`copies to their friends, or the entire world. Indeed, virtually any popular recording is already
`likely available in the MP3 format, for free if you know where to look.
`How the industry will respond to these challenges and protect the rights and livelihoods
`of copyright owners and managers and has been a matter of increasing discussion, both in private
`industry forums and the public media. Security disasters like the cracking of DVD-Video’s CSS
`security system have increased doubt about the potential for effective robust security
`implementations. Meanwhile, the success of non-secure initiatives such as portable MP3 players
`lead many to believe that these decisions may have already been made.
`Music consumers have grown accustomed to copying their music for their own personal
`use. This fact of life was written into law in the United States via the Audio Home Recording
`Act of 1992. Millions of consumers have CD players and purchase music in the Compact Disc
`format. It is expected to take years for a format transition away from Red Book CD Audio to
`reach significant market penetration.
`Hence, a need exists for a new and improved system for protecting digital content against
`unauthorized copying and distribution.
`Summary of the Invention
`A local content server system (LCS) for creating a secure environment for digital content
`is disclosed, which system comprises: a communications port in communication for connecting
`the LCS via a network to at least one Secure Electronic Content Distributor (SECD), which
`SECD is capable of storing a plurality of data sets, is capable of receiving a request to transfer at
`least one content data set, and is capable of transmitting the at least one content data set in a
`
` 2
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0002
`
`

`

`secured transmission; a rewritable storage medium whereby content received from outside the
`LCS may be stored and retrieved; a domain processor that imposes rules and procedures for
`content being transferred between the LCS and devices outside the LCS; and a programmable
`address module which can be programmed with an identification code uniquely associated with
`the LCS. The LCS is provided with rules and procedures for accepting and transmitting content
`data. Optionally, the system may further comprise: an interface to permit the LCS to
`communicate with one or more Satellite Units (SU) which may be connected to the system
`through the interface, which SUs are capable of receiving and transmitting digital content; at
`least one SU; and/or at least one SECD. The SECD may have a storage device for storing a
`plurality of data sets, as well as a transaction processor for validating the request to purchase and
`for processing payment for a request to retrieve one of the data sets. The SECD typically
`includes a security module for encrypting or otherwise securitizing data which the SECD may
`transmit.
`A method for creating a secure environment for digital content for a consumer is also
`disclosed. As part of the method, a LCS requests and receives a digital data set that may be
`encrypted or scrambled. The digital data set may be embedded with at least one robust open
`watermark, which permits the content to be authenticated. The digital data set is preferably be
`embedded with additional watermarks which are generated using information about the LCS
`requesting the copy and/or the SECD which provides the copy. Once received by the LCS, the
`LCS exercises control over the content and only releases the data to authorized users. Generally,
`the data is not released until the LCS embeds at least one additional watermark based upon
`protected information associated with the LCS and/or information associated with the user.
`Another embodiment of the method of the present invention comprises: connecting a
`Satellite Unit to an local content server (LCS), sending a message indicating that the SU is
`requesting a copy of a content data set that is stored on the LCS, said message including
`information about the identity of the SU; analyzing the message to confirm that the SU is
`authorized to use the LCS; retrieving a copy of the requested content data set; assessing whether
`a secured connection exists between the LCS and the SU; if a secured connection exists,
`embedding a watermark into the copy of the requested content data set, said watermark being
`created based upon information transmitted by the SU and information about the LCS; and
`delivering the content data set to the SU for its use.
`
` 3
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0003
`
`

`

`The SU may also request information that is located not on the LCS, but on an SECD, in
`which case, the LCS will request and obtain a copy from the SECD, provided the requesting SU
`is authorized to access the information.
`Digital technology offers economies of scale to value-added data not possible with
`physical or tangible media distribution. The ability to digitize information both reduces the cost
`of copying and enables perfect copies:. This is an advantage and a disadvantage to commercial
`publishers who facemust weigh the cost reduction against the real threat of unauthorized
`duplication of their value-added data content. WhereBecause cost reduction is an important
`business consideration, securing payment and authentication of anauthenticating individual
`copycopies of digital information, (such as media content,) presents unique opportunities to
`information service and media content providers with the appropriate tools. The present
`invention seeks to leverage the benefits of digital distribution to consumers and publishers alike,
`while ensuring the development and persistence of trust between theseall parties, oras well as
`with any third parties involved, directly or indirectly, in a given transaction.
`In another approach that is related to this goal, there are instances where transactions
`must be allowed to happen after perceptually-based [acoustic (hearing)/psychoacoustic
`(perceived hearing) or visual (viewing)/psychovisual (perceived viewing)] digital information
`can be authenticated. This type of verification(Perceptually based information is information
`whose value is in large part, based upon its ability to be perceived by a human, and includes for
`example, acoustic, psychoacoustic, visual and psychovisual information.) The process of
`authenticating before distributing will become increasingly important for areas where the
`distributed material relates more to a provided,is related to a trust-requiring transaction event. A
`number of examples exist. These include virtual retailers (for example, an on-line music store
`selling CDs and electronic versions of songs); service providers (for example, an on-line bank or
`broker who performs transactions on behalf of a consumer); and transaction providers (for
`example, wholesalers or auction houses). These parties rely onhave different authentication
`issues which caninterests and requirements. By using the teachings of this application, these
`interests and requirements may be separated and then independently quantified or qualified by
`market participants in shorter periods of time under what is described by the present invention.
`Any party who must establish authentication ofAll parties in a transaction must
`authenticate information that is perceptually-observed, by nature of media content-richness, by
`
` 4
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0004
`
`

`

`users or market participants. Thisperceptually observable before trust between the parties can be
`established. In today’s world, information (including perceptually rich information) is typically
`digitized, and may be perceptually based in natureas a result, can easily be copied and
`redistributed, negatively impacting buyers and, sellers orand other market participants, in
`confusing. Unauthorized redistribution confuses authenticity, non-repudiation,
`limit of
`liabilityability and other important “transaction events”.” In a networked environment,
`transactions and interactions occur over a transmission line between aor a network, with buyer
`and seller, or networked groups of users (Internet communities, closed electronic trading
`environments, etc.). While network effects may lead to increasing economic utility of at
`different points on the line or network. While such electronic transactions have the potential to
`add value to the underlying value-added information: in the absolute being bought and sold (and
`the potential to reduce the cost of the transaction), instantaneous piracy can rendersignificantly
`reduce the economic value of the good and services being offered to zero, or less than optimal
`profit positions.underlying data, if not wholly destroy it. Even the threat of piracy tends to
`undermine the value of the data that might otherwise exist for such an electronic transaction.
`Related situations extend to instances rangingrange from the ability to provably establish
`the “existence” of a virtual financial institution to determining the reliability of an “electronic
`stamp”.” The present invention seeks to improve on the existing prior art by describing optimal
`combinations of cryptographic and steganographic protocols for “trusted” verification,
`confidence and non-repudiation of perceptually-based, digitized representations of perceptually
`rich information of the actual seller, vendor or anotherother associated institutioninstitutions
`which may not be commercial in nature (confidence building with logo’s such as the SEC, FDIC,
`Federal Reserve, FBI, etc. apply). To the extent that an entity plays a role in purchase decisions
`made by a consumer of goods and services that are not physically present for the actual
`transactionrelating to data, the present invention has a wide range of beneficial applications. One
`is enabling independent trust based on real world representations that are not physically available
`to a consumer or user. TheA second is the ability to match informationinformational needs
`between buyers and sellers that may not be universally appealing or cost effective in given
`market situations. These include auction models based on recognition of the interests or demand
`of consumers and market participants—and serves to assist in narrowing andwhich make trading
`profitable by focusing profitable trade between partiesspecialized buyers and sellers. Another use
`
` 5
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0005
`
`

`

`for the information matching is to establish limits on the liability of such institutions and profit-
`seeking entities, such as insurance providers or credit companies. These vendors lack appropriate
`tools for determining intangible asset risk and exposure, value-addedor even the value of the
`information is such an assetbeing exchanged. By encouraging separate and distinct “trust”
`arrangements over an electronic network, profitable, market-based relationships can result.
`Utilizing theThe present invention in one of its many embodiments,can make possible
`efficient, and openly accessible markets for trade-basedtradable information can be made
`possible. Existing transaction security, (including on-line credit card purchasingcards, electronic
`cash or its equivalents, electronic wallets, electronic tokens, etc.) which primarily use
`cryptographic techniques to secure a transmission channel-but are not directly associated or
`dependent on the value-added information being transacted or purchased failssold--fails to meet
`this valuable need. The present invention proposes a departure from the prior art by separating
`transactions from authentication in the sale of digitized data. TheseSuch data may include
`videos, songs, images, electronic stamps, electronic trademarks, and electronic logos used to
`ensure membership in some institutional body whose purpose is to assist in a dispute, limit
`liability and provide indirect guidance to consumers and market participants, alike.
`Buyers’ should still beware: but withWith an increasingly anonymous marketplace, the
`present invention offers invaluable embodiments to accomplish “trusted” transactions in a more
`flexible, transparent manner while enabling market participants to negotiate terms and
`conditions. Negotiation should not onlymay be seller driven throughby predetermined usage
`rules or parameters, especially as the information economy offers potentially many competitive
`marketplaces in which to transact, trade or exchange among businesses and consumers. As
`information grows exponentially, flexibility becomes an advantage to market participants, in that
`they need to screen, filter and verify information inbefore making a transaction decision.
`Moreover, the accuracy and speed at which decisions can be made reliably enables confidence to
`grow with an aggregate of “trusted transactions”. “Trusted transactions” beget further “trusted
`transactions” through experience. The present invention also provides for improvements over the
`prior art in the ability to utilize different independently important “modules” to enable a “trusted
`transaction” using competitive cryptographic and steganographic elements, as well as being able
`to support a wide variety of perceptually-based media and information formats. The envisioned
`system is not bound by a proprietary means of creating recognition for a good or service, such as
`
` 6
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0006
`
`

`

`that envisionedembodied in existing closed system. Instead, the flexibility of the present
`invention’s architecture is sure toinvention will enable a greater and more diverse information
`marketplace.
`The present invention is not a “trusted system”, per sayse, but “trusted transactions” are
`enabled, since the same value-added information that is sought may still be in the clear, not in a
`protected storage area or closed, rule-based “inaccessible virtual environment”.
`A related additional set of embodiments regards the further separation of the transaction
`and the consumer’s identification versus the identification of the transaction only. This is
`accomplished through separated “trusted transactions” bound by authentication, verification and
`authorization in a transparent manner. With these embodiments, consumer and vendor privacy
`could be incorporated. More sophisticated relationships are anticipated between parties, who can
`mix information about their physical goods and services with a transparent means for consumers,
`who may not be known to the seller, who choose not to confide in an inherently closed “trusted
`system” or provide additional personal information or purchasing information (in the form of a
`credit card or other electronic payment system), in advance of an actual purchase decision or
`ability to observe (audibly or visibly) the content in the clear. This dynamic is inconsistent with
`existing systems’the prior art’s emphasis on access control, not transparent access to value-added
`information (in the form or goods or services), that can be transacted on an electronic or
`otherwise anonymous exchange.
`These embodiments may include decisions about availability of a particular good or
`service through electronic means (recognition, search engine function or find, so-called push,
`functions), such as the Internet, or means that can be modularized to conduct a transaction based
`on the present inventioninterconnection of various users (such as WebTV, a Nintendo or Sony
`game console which can be networkedwith network abilities, cellular phone, PalmPilot, etc.) that
`may have the capability of interconnections with a network of users (including sellers and
`consumers). Additionally, modularity of price and service desired by the consumer and available
`by the seller (fixed price, Dutch auction where the consumer fixes a price, auction where a
`market of buyers and sellers can “decide” a price. These embodiments may additionally be
`implemented in traditional auction types (including Dutch auctions). Consumers may view their
`anonymous marketplace transactions very differently because of a lack of physical human
`interactions, but the present invention can enable realistic transactions to occur by maintaining
`
` 7
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0007
`
`

`

`open access and offering strict authentication and verification of value-addedthe information
`being traded. This has the effect of allowing legacy relationships, legacy information, and legacy
`business models to be offered in a manner which more closely reflects many observable
`transactions in the physical world. The tremendous benefits to sellers and consumers is obvious
`but; existing transactions need not reduce their expectations of security. As well, the ability to
`isolate and quantify aspects of an overa transaction by module potentially allows for better price
`determinations of intangible asset insurance, transaction costs, advertising costs, liability, etc.
`which have physical world precedent. In some embodiments, standardization or government
`support are surely anticipated, as the physical world will undoubtedly continue to make legal
`determinations in transactions under dispute.
`An important area of the prior art is discussed under the heading of “trusted systems”
`
`which architecturally enable users, almost always the publisher or rights owner, to set rules
`
`which bind digitized information copies to an inflexible and “containerized” architecture.
`
`System security is typically based on persistence of access control over the content in a variety of
`
`implementations, with access and subsequent usage being tightly tied into the distribution
`
`system. The prior art has many disclosures which fail to mimic the real world and, in effect,
`
`eliminate impulse buying, sampling, re-creation of existing works, making a transaction more
`
`transparent to consumers, providing for support of both controlled and uncontrolled value-added
`
`information within the same system, and other important aspects of information distribution that
`
`cannot be predicted in advance of more open consumer access or recognition of the information
`
`in question. See US Pat. No. 5,428,606 for a discussion on democratizing digital information
`
`exchange between publishers and subscribers of said information.
`
`It is contemplated that the publisher and/or owner of the copyrights will want to dictate
`restrictions on the ability of the purchaser to use the data being sold. Such restrictions can be
`implemented through the present invention, which presents a significant advantage over the prior
`art (which attempts to effect security through access control and attempted tight reigns over
`
` 8
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0008
`
`

`

`distribution). See US Pat. No. 5,428,606 for a discussion on democratizing digital information
`exchange between publishers and subscribers of said information.
`A goal for providers of value-added content is to maximize profits for the sale of their
`
`content. Marketing and promotion of thisthe informational content still requires costly
`
`advertising that will notcannot be eliminated with an ever-increasing, considering the ever
`
`increasing amount of information vying for consumers and other market participantsparticipant’s
`
`attention. Pricing, when inflexible, and expense limitations in creating recognition of a particular
`
`piece of value-added content are inherent to the nature of a market forNonetheless, in a market
`
`where the goods are speculatively valued goods, marketing budgets are inherently constrained, as
`
`you are trying to create demand for a product with little inherent value. Where such markets have
`
`participants, both buyers and sellers and their respective agents, with access to the same
`
`information in real time, market mechanisms efficiently price the market goods or services.
`
` These markets are characterized by “price commoditization” so buyers and sellers are
`limited to differentiating their offerings by selection and service. If the markets are about
`information itself, it has proven more difficult to accurately forecast the markettarget price where
`sellers can maximize their profits. Quality and quantity provide different evaluation criteria of
`selection and service relating to the value-added information to bebeing traded. The present
`invention regards a particular set of implementations of value-added content security in markets
`which may include unsecureunsecured and secure versions of the same value-added data (such as
`songs, video, research, pictures, electronic
`logos, electronic
`trademarks, value-added
`information, etc.).
`Transactions for value-added information can occur without any physical location. So,
`there is a need for a secure personal content server for which the value added information can be
`offered for transactions in a manner similar to real world transactions. One feature is to offer
`seemingly similar value added information in differing quality settings. These settings have
`logical relationships with fidelity and discreteness and are determined by market participants.
`Another issue is that because purchasers may be anonymous to sellers, it is more important to
`
` 9
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0009
`
`

`

`have a particular value-added information object available so that market participants can fulfill
`their role are consumers.
`One fundamental weakness with systems known to those skilled in the artof current
`information markets is the lack of mechanisms to ensure that buyers and sellers can reach pricing
`equilibrium. This deficit is related to the “speculative” , “fashion”, and “vanity” aspectaspects of
`perceptual content (such as music, video, and art or some future recognition to purchasers). For
`other goods and services being marketed to an anonymous marketplace, market participants may
`never or choose never to see (and indeed, may choose to never see, an actual location with
`whichwhere the transaction is being soughtmay physically occur. A physical location may
`simply not exist. There are a number of such virtual operations in business today who, which
`would benefit from the improvements offered under the present system.
`The present invention also seeks to provide improvements to the art in enabling a realistic
`model for building trust between parties (or their agents) not in a “system”, per se. Because prior
`art systems lack any inherent ability to allow for information to flow freely to enable buyers and
`sellers to react to changing market conditions, as a matter of maintaining “security”. The present
`invention can co-exist with these “trusted systems” to the extent that all market participants in a
`given industry have relatively similar information inwith which to price value-added data. The
`improvement over such systems, however, addresses a core features in most data-added value
`markets:’ predictions, forecasts, and speculation over the value of information is largely aan
`unsuccessful activity for buyers and sellers alike. The additional improvement is the ability to
`maintain security even with unsecureunsecured or legacy versions of value-added information
`available to those who seek choices that fit less quantitative criteria—”“aesthetic quality” of the
`information versus “commercial price”. Purchase or transaction decisions can be made first by
`authenticating an electronic version of a song, image, video, trademark, stamp, currency, etc.
`Additional anticipated improvements areinclude the ability to support varying pricing
`models such as auctions that are difficult or impossible to accomplish under existing prior art
`that leaves all access and pricing control with the seller alone. As well, and the separation of the
`transaction from the exchange of the value-added information, givingwhich gives more control
`to buyers over their identities and purchasing habits, (both sensitive and separately distinct forms
`of “unrelated” value-added information). Essentially, no system known in the art allows for
`realistic protocols to establish trust between buyers and sellers in a manner more closely
`
` 10
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0010
`
`

`

`reflecting actual purchasing behavior of consumers and changing selling behavior of sellers. The
`goal in such transactions is the creation of trust between parties as well as “trusted relationships”
`with those parties. The present invention is an example of one such system for media content
`where the “aesthetic” or “gestalt” of the underlying content and its characteristics is a component
`of buying habits. Without an ability to open distribution systems to varying buyers and sellers,
`media content may be priced at less than maximum economic value and buyers may be deprived
`of a competitive, vigorous marketplace for exciting media content from many different creative
`participants.
`To the extent that recognition (“recognition, recognition, recognition”) plays such a key
`role in an information economy, value-added data should be as accessible as possible to the
`highest number of market participants in the interests of furtherfurthering creativity, and building
`a competitive marketplace for related goods and services. This is to the benefit of both buyers
`and sellers as well as the other participants in such an economic ecosystem. The Internet and
`other transmission-based transactions with unknown parties presents a number of challenges to
`information age vendors—continuing who wish to develop customer relations, trust and
`profitable sales of their products and services. While the. The information economy, if is largely
`an anonymous marketplace, isthus, making it much hardermore difficult to identify consumers
`“and” sellers alike: a fundamental problem for an information economy. The present invention
`provides remedies to help overcome these weaknesses versus other related systems described in
`the prior art.
`One approach U.S. Pat. No. 5, 892, 900 to Ginter et al., relies on “universal” adoption of
`
`a “virtual distribution environment” (VDE) leaving all control over distribution to the publisher,
`
`without any flexibility provided to the consumer. The limited flexibility that exists is
`
`predetermined by the seller. While in theory this approach appears to offer important advantages
`
`in markets where price and product information may be readily available and known to market
`
`participants (such as commodities), often the sale and exchange of “value-added information”,
`
`itself, is speculative. Absent open access to said data by consumers or other market participants
`
` 11
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0011
`
`

`

`(aggregators, distributors, wholesalers, financial
`
`interests, etc.)
`
`leaves a condition of
`
`indeterminable valuation, or even underexploitation of the intangible information asset.
`
`While Ginter et al. discusses “persistence” of the separation between rights applications
`
`and the foundation of the VDE, what results is a strict set of control which unnecessarily limits
`
`potentially useful and economically beneficial access by those potential purchasers who do not
`
`choose to rigidly make decision solely on price. The pricing structure has no relationship with
`
`the underlying value-added data, only the predetermined rules governing the use of the content is
`
`anticipated. Additionally, the architecture replaces one set of controlled distribution with another
`
`in the form of a proprietary VDE distribution channel or channels; preservation of a “virtual
`
`black box” limits the free flow of content, and information about that content, that actually exists
`
`to the commercial benefit of media content owners.
`
`The present invention concerns itself with higher economic efficiencies by preserving an
`
`open architecture that is focused primarily on authentication, verification and authorization of
`
`value-added information: access restriction is not a primary goal. Thus, failure of authentication
`
`or verification do not constitute a security failure within the context of the present invention as it
`
`would with Ginter el al. Moreover, legacy media which may exist as physical media such as
`
`CDs, LaserDiscs, MiniDiscs, photographs, PhotoCD, VHS, Digital Video, etc., pre-recorded or
`
`otherwise, or other unsecure tangible recorded media is not excluded by fiat. Consumers are
`
`given flexibility in their choice of recording media, content characteristics such as quality, time
`
`of delivery, etc.: publishers are still assured payment and also benefit from better information
`
`flow to and from the marketplace. This is not possible with Ginter et al. because information is
`
`used and accessed in only “authorized ways”.
`
` 12
`
`DISH-Blue Spike-246
`Exhibit 1026, Page 0012
`
`

`

`Another series of related systems, are US Pat. No. 5,715,403, US Patent No. 5,634,012,
`
`US Pat. No. 5,629,980 all to Stefik, propose associations between “usage rights” and a digital
`
`work. While these system offer arguably more flexibility in enabling different rule sets for
`
`different proposed digital distribution channels, all digital works have permanently attached
`
`rights. And all transactions must be coupled to a repository. It is not clear that affixing rights to
`
`content necessarily aides sellers or owners of content, especially if the consumers or other
`
`participants in the market find use in the information not known by the seller at the time rights
`
`were affixed. Unlike, physical media sold

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket