`
`March 19, 2019
`
`THIS IS TO CERTIFY THAT ANNEXED IS A TRUE COPY FROM THE
`RECORDS OF THIS OFFICE OF THE FILE WRAPPER AND CONTENTS
`OF:
`
`APPLICATION NUMBER: 60/213,489
`FILING DATE: June 23, 2000
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0001
`
`
`
`00/€2/90QAM
`
`‘nhwELoel
`
`
`
`
`
`
`
`
`CORRESPONDENCE ADDRESS
`
`
`Directalf correspondence to:oe
`a — ATI
`
`24735
`—
`
`Firm or
`PATENT TRADEMARK OFFICE
`
`
`Individual Name
`Address
`
`
`
` Address
`
`City
`
`Telephone
`
`
`
`ENCLOSED APPLICATION PARTS(checkall that apply)
`
`
`
`
`
`x! Specification NumberofPages |[| Small Entity Staternent
`BQ on
`tens7 Jom[|
`
`
`
`
`
`
`
`METHOD OF PAYMENTOFFILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT(check one)
`
`FILING FEE
`
`[| A check or money order is enclosed to coverthefiling fees
`AMOUNT(S$)
`
`The Commissioneris hereby authorized to chargefiling fees or [sd
`|
`
`
`|
`credit any overpayment to Deposit Account Number:
`$75.00
`|
`
`
`The invention was made by an agencyof the United States Governmentor undera contract with an agency of the United States Government.
`
`No.
`Cc] Yes, the name of the U.S. Government agency and the Government contract number are:
`
`
`Respectfully submitte
`
`
`
`SIGNATURE. June23, 2000 €) bEGoshna Date
`
`
`
`
`State
`
`
`
`
`
`
`Please type a plus sign (+) inside this box —»
`
`aceitecise
`
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET(Small Entity)
`This is a requestfor filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53 (c).
`
`
`|
`
`:
`
`Given Name(first and middle [if any])
`
`Family Name or Surname
`
`Residence (City and either State or Fareign Country)
`
`INVENTOR(S)/APPLICANT(S)
`
`Scott A.
`Michael
`
`MOSKOWITZ
`BERRY
`
`Miami, Florida USA
`Albuquerque, New Mexico USA
`
`
`
`
`° =e —
`as =
`oo Sos
`as ==8
`ss =r
`oS
`wo vo
`to uc Sas,oO
`
`| Additional inventors are being named on page 2 attached hereto
`TITLE OF THE INVENTION(280 characters max)
`SECURE PERSONAL CONTENT SERVER
`
`
`
`
`
`TYPED or
`
`TELEPHONE
`
`PRINTED NAME
`
`Floyd B. Ch
`apma
`Floy
`
`202/639/7700
`
`n
`
`REGISTRATION NO.
`(iapprooriete)
`
`40,555
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`SEND TO: Box Provisional Application, Assistant Commissionerfor Patents, Washington, DC 20231
`
`
`[Pagelof
`
`J
`
`]
`
`49SMALUREVO4
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0002
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0002
`
`
`
`June 23, 2000
`
`066112.0138
`
`Inventors:
`
`Scott Moskowitz & Michael Berry
`
`A Secure Personal Content Server
`
`Field of Invention
`The present inventionrelates to the secure distribution of digitized value-
`added information, or media content, while preserving the ability of publishers
`to make available unsecure versions of the same value-added information, or
`media content, without adverse effect to the systemssecurity.
`Authentication, verification and authorization are all handled with a
`combination of cryptographic and steganographic protocols to achieve efficient,
`trusted, secure exchangeof digital information.
`
`Cross-Reference To Related Application
`
`This application is based on and claims the benefit of pending U.S. Patent
`Application Serial No. 60/147,134, filed 08/04/99, entitled, "A Secure Personal
`Content Server." MUST FOLLOW THIS SENTENCE WITH ONE OF THE TWO
`PARAGRAPHS BELOW
`
`This application also claims the benefit of the following applications:
`pending U.S. Patent Application Serial No. 09/046,627, filed 3/24/98, entitled
`"Method for Combining Transfer Function with Predetermined Key Creation";
`pending U.S. Patent Application Serial No. 09/053,628, filed 04/02/98, entitled
`"Multiple Transform Utilization
`and Application
`for
`Secure Digital
`Watermarking"; pending U.S. Patent Application Serial No. 60/169,274, filed
`12/7/99,
`entitled
`"Utilizing Data Reduction
`in Steganographic
`and
`Cryptographic Systems"; and U.S. Patent Application Serial No.
`, filed June 16, 2000, entitled “Utilizing Data Reduction in Steganographic and
`Cryptographic Systems” (which is a continuation-in-part of PCT application No.
`PCT/US00/06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999) All of the
`patent applications previously identified in this paragraph are hereby
`incorporated by reference, in their entireties.
`
`This application also claims the benefit of pending pending U.S. Patent
`Application Serial No. 08/999,766,
`filed 7/23/97, entitled “Steganographic
`Method and Device’; pending U.S. Patent Application Serial No, 08/772,222,
`filed 12/20/96, entitled “Z-Transform Implementation of Digital Watermarks”;
`pending U.S. Patent Application Serial No. 09/456,319, filed 12/08/99, entitled
`265112
`
`of
`
`heetCe
`
`
`sa
`
`iU
`
`ICHse
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0003
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0003
`
`
`
`“Transform Implementation of Digital Watermarks’; pending U.S. Patent
`Application Serial No. 08/674,726, filed 7/2/96, entitled “Exchange Mechanisms
`for Digital Information Packages with Bandwidth Securitization, Multichannel]
`Digital Watermarks, and Key Management”; pending U.S. Patent Application
`Serial No. 09/545,589, filed 04/07/2000, entitled “Method and System for Digital
`Watermarking”; pending U.S. Patent Application Serial No. 09/046,627, filed
`3/24/98, entitled “Method for Combining Transfer Function with Predetermined
`Key Creation”; pending U.S. Patent Application Serial No. 09/053,628, filed
`04/02/98, entitled “Multiple Transform Utilization and Application for Secure
`Digital Watermarking”; pending U.S. Patent Application Serial No. 09/281,279,
`filed 3/30/99, entitled “Optimization Methodsfor the Insertion, Protection, and
`Detection...”; U.S, Patent Application Serial No.
`, filed June 16,
`2000, entitled “Utilizing Data Reduction in Steganographic and Cryptographic
`Systems”
`(which
`is
`a_
`continuation-in-part
`of PCT application No.
`PCT/US00/06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999); and
`pending U.S. Application No 60/169,274,
`filed 12/7/99, entitled “Systems,
`Methods And Devices For Trusted Transactions.” All of the patent applications
`previously identified in this paragraph are hereby incorporated by reference, in
`their entireties.
`
`Summary of the Invention
`Digital
`technology offers economies of scale to value-added data not
`possible with physical or tangible media distribution. The ability to digitize
`information both reduces the cost of copying and enables perfect copies. Thisis
`an advantage and a disadvantage to commercial publishers who must weigh the
`cost reduction against the real threat of unauthorized duplication of their value-
`added data content.
`Because cost
`reduction is an important business
`consideration, securing payment and authenticating individual copies of digital
`information (such as media content) presents unique opportunities
`to
`information service and media content providers. The present invention seeks to
`leverage the benefits of digital distribution to consumers and publishers alike,
`while ensuring the development and persistence of trust betweenall parties, as
`well as with any third parties involved, directly or indirectly,
`in a given
`transaction.
`In another approachthatis related to this goal, there are instances where
`transactions must be allowed to happen after perceptually-based digital
`information can be authenticated.
`(Perceptually based information is
`information whose valueis in large part, based uponits ability to be perceived
`by a human, and includes for example, acoustic, psychoacoustic, visual and
`psychovisual information.) The process of authenticating before distributing will
`become increasingly important for areas where the distributed material is related
`265112
`
`a Bie
`
` i
`
`2
`
`
`
`Eel
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0004
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0004
`
`
`
`to a trust-requiring transaction event. A number of examples exist. These
`include virtual retailers (for example, an on-line music store selling CDs and
`electronic versions of songs); service providers (for example, an on-line bank or
`broker who performs transactions on behalf of a consumer); and transaction
`providers (for example, wholesalers or auction houses). These parties have
`different authentication interests and requirements. By using the teachings of
`this application, these interests and requirements may be separated and then
`independently quantified by market participants in shorter periodsof time.
`is
`All parties in a transaction must authenticate information that
`In
`perceptually observable before trust between the parties can be established.
`today’s world, information (including perceptually rich information)is typically
`digitized, and as a result, can easily be copied and redistributed, negatively
`
`impacting buyers, sellers and other market participants.|Unauthorized
`redistribution confuses authenticity, non-repudiation, limit of ability and other
`important “transaction events.” In a networked environment, transactions and
`interactions occur over a transmission line or a network, with buyerandseller at
`different points on the line or network. While such electronic transactions have
`the potential to add value to the underlying information being bought and sold
`(and the potential to reduce the cost of the transaction), instantaneous piracy can
`significantly reduce the value of the underlying data, if not wholly destroyit.
`Even the threat of piracy tends to undermine the value of the data that might
`otherwise exist for such an electronic transaction.
`Related situations range from the ability to provably establish the
`“existence” of a virtual financial institution to determining thereliability of an
`“electronic stamp.” The present invention seeks to improve on the prior art by
`describing optimal combinations of cryptographic and steganographic protocols
`for “trusted” verification,
`confidence
`and non-repudiation of digitized
`representations of perceptually rich information of the actual seller, vendor or
`other associated institutions which may not be commercial in nature (confidence
`building with logo’s such as the SEC, FDIC, Federal Reserve, FBI, etc. apply). To
`the extent that an entity plays a role in purchase decisions made by a consumer
`of goodsandservicesrelating to data, the present invention has a wide range of
`beneficial applications. One is enabling independent trust based on real world
`representations that are not physically available to a consumeror user. A second
`is the ability to match informational needs between buyers and sellers that may
`not be universally appealing or cost effective in given market situations. These
`include auction models based on recognition of the interests or demand of
`consumers and market participants— which make trading profitable by focusing
`specialized buyers and sellers. Another use for the information matching is to
`establish limits on the liability of such institutions and profit-seeking entities,
`such as
`insurance providers or credit companies.
`These vendors
`lack
`appropriate tools for determining intangible asset risk or even the value of the
`information being exchanged. By encouraging separate and distinct “trust”
`265112
`
`wot
`desesi
`
`tes
`
`chaS
`
`as
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0005
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0005
`
`
`
` B23
`
`arrangements over an electronic network, profitable market-based relationships
`can result.
`The present invention can make possible efficient and openly accessible
`markets for tradable information. Existing transaction security (including on-line
`credit cards, electronic cash or its equivalents, electronic wallets, electronic
`tokens, etc.) which primarily use cryptographic techniques
`to secure a
`transmission channel--but are not directly associated or dependent on the
`information being sold--fails to meet this valuable need. The present invention
`proposes a departure from the prior art by separating transactions from
`authentication in the sale of digitized data. Such data may include videos, songs,
`images, electronic stamps, electronic trademarks, and electronic logos used to
`ensure membership in someinstitutional body whose purposeis to assist in a
`dispute, limit liability and provide indirect guidance to consumers and market
`participants,alike.
`the present invention
`With an increasingly anonymous marketplace,
`offers invaluable embodiments to accomplish “trusted” transactions in a more
`flexible, transparent manner while enabling market participants to negotiate
`terms and conditions. Negotiation may be driven by predetermined usage rules
`or parameters, especially as the information economyoffers potentially many
`competitive marketplaces in which to transact,
`trade or exchange among
`businesses and consumers. As information grows exponentially,
`flexibility
`becomes an advantage to marketparticipants, in that they need to screen,filter
`and verify information before making a transaction decision. Moreover, the
`accuracy and speed at which decisions can be madereliably enables confidence
`to grow with an aggregate of “trusted transactions’.
`“Trusted transactions”
`beget further “trusted transactions” through experience. The present invention
`also provides for improvements over the prior art in the ability to utilize
`different independently important “modules” to enable a “trusted transaction”
`using competitive cryptographic and steganographic elements, as well as being
`able to support a wide variety of perceptually-based media and information
`formats. The envisioned system is not bound by a proprietary meansofcreating
`recognition for a good or service, such as that embodied in existing closed
`system. Instead, the flexibility of the present invention will enable a greater and
`more diverse information marketplace.
`The present invention is not a “trusted system”, per se, but “trusted
`transactions” are enabled, since the same value-added informationthat is sought
`maystill be in the clear, not in a protected storage area or closed, rule-based
`“inaccessible virtual environment’.
`A related additional set of embodiments regards the further separation of
`the transaction and the consumer's identification versus the identification of the
`transaction only. This is accomplished through separated “trusted transactions”
`bound by authentication, verification and authorization in a transparent manner.
`With these embodiments, consumer and vendor privacy could be incorporated.
`265112
`
`= Te
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0006
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0006
`
`
`
`PcliSe
`iaishaES
`
`ear=
`
`
`
`CH
`
`More sophisticated relationships are anticipated between parties, who can mix
`information abouttheir physical goods andservices with a transparent means for
`consumers, who may not be knownto theseller, who choose not to confide in an
`inherently closed “trusted system” or provide additional personal information or
`purchasing information (in the form of a credit card or other electronic payment
`system), in advance of an actual purchasedecision orability to observe (audibly
`or visibly) the content in the clear. This dynamic is inconsistent with the prior
`art's emphasis on access control, not
`transparent access to value-added
`information (in the form or goods or services), that can be transacted on an
`electronic or otherwise anonymous exchange.
`These embodiments may include decisions about availability of a
`particular good or service through electronic means, such as the Internet, or
`means
`that
`can be modularized to conduct
`a
`transaction based
`on
`interconnection of various users (such as WebTV, a Nintendo or Sony game
`console with network abilities, cellular phone, PalmPilot, etc.).
`These
`embodiments may additionally be implemented in traditional auction types
`(including Dutch auctions), Consumers may view their anonymous marketplace
`transactions very differently because of a lack of physical human interactions,
`but
`the present
`invention can enable realistic transactions to occur by
`maintaining open access and offering strict authentication and verification of the
`information being traded. This has theeffect of allowing legacy relationships,
`legacy information, and legacy business models to be offered in a manner which
`moreclosely reflects many observable transactions in the physical world. The
`tremendous benefits to sellers and consumers is obvious; existing transactions
`need not reduce their expectations of security. As well, the ability to isolate and
`quantify aspects of a transaction by module potentially allows for better price
`determinations of intangible asset insurance, transaction costs, advertising costs,
`liability, etc. which have physical world precedent.
`It is contemplated that the publisher and/or ownerof the copyrights will
`wantto dictate restrictions on the ability of the purchaser to use the data being
`sold. Such restrictions can be implemented throughthe present invention, which
`presents a significant advantage over the prior art (which attempts to effect
`security through access control and attempted tight reigns over distribution).
`See US Pat. No. 5,428,606 for a discussion on democratizing digital information
`exchange between publishers and subscribers of said information.
`A goal for providers of value-added content is to maximize profits for the
`sale of their content. Marketing and promotion of the informational content
`cannot be eliminated, considering the ever increasing amount of information
`vying for consumers and other market participant's attention. Nonetheless, in a
`market where the goods are speculatively valued, marketing budgets are
`inherently constrained, as you are trying to create demand for a product with
`little inherent value. Where such markets have participants, both buyers and
`sellers and their respective agents, with access to the same information in real
`265112
`
`~ 5.
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0007
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0007
`
`
`
`
`
`time, market mechanismsefficiently price the market goods or services. These
`markets are characterized by “price commoditization” so buyers and sellers are
`limited to differentiating their offerings by selection and service.
`If the markets
`are aboutinformationitself, it has proven moredifficult to accurately forecast the
`target price where sellers can maximize their profits. Quality and quantity
`provide different evaluation criteria of selection and service relating to the
`information being traded. The present invention regards a particular set of
`implementations of value-added content security in markets which may include
`unsecure and secure versions of the same value-added data (such as songs,
`video, research, pictures, electronic logos, electronic trademarks, value-added
`information, etc.).
`Transactions for value-added information can occur without any physical
`location. So, there is a need for a secure personal content server for which the
`value added information can be offered for transactions in a mannersimilar to
`real world transactions. One feature is to offer seemingly similar value added
`information in differing quality settings.
`These settings have logical
`relationships with fidelity and discreteness and are determined by market
`participants. Another issue is that because purchasers may be anonymous to
`sellers, it is more important to have a particular value-added information object
`available so that market participants can fulfil there role are consumers.
`One fundamental weakness of current information markets is the lack of
`mechanisms to ensure that buyers and sellers can reach pricing equilibrium.
`This deficit is related to the “speculative” , “fashion”, and “vanity” aspects of
`perceptual content (such as music, video, and art or some future recognition to
`purchasers). For other goods and services being marketed to an anonymous
`marketplace, market participants may never see (and indeed, may choose to
`never see, an actual location where the transaction may physically occur. A
`physical location may simply not exist. There are a number of such virtual
`operations in business today, which would benefit from the improvements
`offered underthe present system.
`The present invention also seeks to provide improvements to the art in
`enabling a realistic model for building trust between parties (or their agents) not
`in a “system”, per se. Because prior art systems lack any inherentability to allow
`for information to flow freely to enable buyers andsellers to react to changing
`market conditions. The present invention can co-exist with these “trusted
`systems” to the extent that all market participants in a given industry have
`relatively similar information with which to price value-added data.
`The
`improvement over such systems, however, addresses a core features in most
`data-added value markets: predictions, forecasts, and speculation over the value
`of informationis largely a unsuccessful activity for buyers and sellers alike. The
`additional improvementis the ability to maintain security even with unsecure or
`legacy versions of value-added information available to those who seek choices
`that fit less quantitative criteria—“aesthetic quality” of the information versus
`265112
`
`-6-
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0008
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0008
`
`
`
`YtCh
`
`>akeBAES
`
`iolAa
`
`“commercial price”. Purchase or transaction decisions can be madefirst by
`authenticating an electronic version of a song, image, video, trademark, stamp,
`currency,etc.
`Additional anticipated improvements include the ability to support
`varying pricing models such as auctions that are difficult or impossible to
`accomplish underexistingprior art that leavesall access and pricing control with
`the seller alone, and the separation of the transaction from the exchange of the
`value-added information, which gives more control
`to buyers over
`their
`identities and purchasing habits, (both sensitive and separately distinct forms of
`“unrelated” value-added information). Essentially, no system knownin the art
`allows for realistic protocols to establish trust between buyers and sellers in a
`manner more closely reflecting actual purchasing behavior of consumers and
`changingselling behavior of sellers. The goal in such transactionsis the creation
`of trust between parties as well as “trusted relationships” with those parties. The
`present invention is an example of one such system for media content where the
`“aesthetic” or “gestalt” of the underlying content and its characteristics is a
`componentof buying habits. Without an ability to open distribution systems to
`varying buyers and sellers, media content may be priced at less than maximum
`economic value and buyers may be deprived of a competitive, vigorous
`marketplace
`for
`exciting media
`content
`from many different creative
`participants.
`To the extent that recognition plays such a key role in an information
`economy, value-added data should be as accessible as possible to the highest
`number of market participants in the interests of furthering creativity and
`building a competitive marketplace for related goods and services. This is to the
`benefit of both buyers and sellers as well as the other participants in such an
`economic ecosystem. The Internet and other transmission-based transactions
`with unknownparties presents a number of challenges to information vendors
`who wish to develop customer relations,
`trust and profitable sales.
`The
`information economy is largely an anonymous marketplace,
`thus, making it
`much more difficult to identify consumers andsellers. The present invention
`provides remedies to help overcome these weaknesses.
`The present invention is concerned with methods and systems which
`enable secure, paid exchange of value-added information, while separating
`transaction protocols. The present invention improves on existing means for
`distribution control by relying on authentication, verification and authorization
`that may be flexibly determined by both buyers and sellers.
`These
`determinations may not need to be predetermined, although pricing matrix and
`variable access to the information opens additional advantagesoverthepriorart.
`The present invention offers methods and protocols for ensuring value-added
`information distribution can be used to facilitate trust in a large or relatively
`anonymous marketplace (such as the Internet's World Wide Web).
`
`265112
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0009
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0009
`
`
`
`
`
`We now define components of the preferred embodiments for methods,
`systems, and devices.
`
`Definitions:
`Local Content Server (LCS): A device or software application which can
`securely store a collection of value-added digital content. The LCS has a unique
`ID.
`
`Secure Electronic Content Distributor (GECD): An entity, device or
`software application which can validate a transaction with a LCS, process a
`payment, and deliver digital content securely to a LCS.
`In cryptographic terms,
`the SECDacts as a “certification authority” or its equivalent. SECDs may have
`differing arrangements with consumers
`and providers of value-added
`information.
`Satellite Unit (SU): A portable medium or device which can accept secure
`digital content from a LCS through a physical, local connection and which can
`either play or make playable the digital content. The SU may have other
`functionality as it relates to manipulating the content, such as recording. The SU
`has a unique ID.
`LCS Domain: A secure medium or area where digital content can be
`stored, with an accompanying rule system for transfer of digital content in and
`out of the LCS Domain.
`SecureChannel™; A secure channel to pass individualized content to
`differentiate authentic content from legacy or unauthorized, pirated content.
`SecureChannel maycarry a value-adding component ( VAC).
`Standard Quality: A transfer path into the LCS Domain which maintains
`the digital content at a predetermined reference level or degrades the contentifit
`is at a higher quality level. In an audio implementation, this might be defined as
`Red Book CD Quality (44100 Hz., 16 bits, 2 channels).
`Low Quality: A transfer path into the LCS Domain which degrades the
`digital content to a sub-referencelevel.
`In an audio implementation, this might
`be defined as below CD Quality (for instance, 32000 Hz., 16 bits, 2 channels).
`High Quality: A transfer path into the LCS Domain which allowsdigital
`content of any quality level to pass unaltered.
`Rewritable Media: An mass storage device which can be rewritten (e.g.
`hard drive, CD-RW,Zip cartridge, M-O drive,etc...).
`Read-Only Media: A mass storage device which can only be written once
`(e.g. CD-ROM, CD-R, DVD, DVD-R,etc...). Note: pre-recorded music, video,
`software, or images,etc. are all “read only” media.
`Unique ID: A Unique ID is created for a particular transaction and is
`unique to that transaction (roughly analogous to a humanfingerprint). One
`way to generate a Unique ID is with a one-way hash function. Another wayis
`by incorporating the hash result with a message into a signing algorithm will
`create a signature scheme. For example, the hash result may be concatenated
`265112
`
`-8-
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0010
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0010
`
`
`
`
`
`to the digitized, value added information which is the subject of a transaction.
`Additional uniqueness may be observed in a hardware device so as to
`differentiate that device, which may be used in a plurality of transactions,
`from othersimilar devices.
`Value-added: Value-added information is differentiated from non-
`commoditized information in termsof its marketability or demand, which can
`vary, obviously, from each marketthatis created for the information. By way
`of example, information in the abstract has no value until a marketis created
`for the information (i.e., the information becomes a commodity). The same
`information can be packaged in many different forms, each of which may have
`different values. Because information is easily digitized, one way to package
`the “same” information differently is by different levels of fidelity and
`discreteness. Value is typically bounded by context and consideration.
`Authentication: A receiver of a “message” (embedded or otherwise
`within the value-added information) should be able to ascertain the original of
`the message (or by effects, the origin of the carrier within which the messageis
`stored). An intruder should notbe able to successfully represent someoneelse.
`Additional functionality such as Message Authentication Codes (MAC) could be
`incorporated (a one-way hash function with a secret key) to ensure limited
`verification or subsequent processing of value-added data.
`Verification:
`In cryptographic terms, “verification” serves the “integrity”
`function to prevent an intruder from substituting false messages for legitimate
`ones. In this sense, the receiver of the message (embedded or otherwise present
`within the value-added information) should be assured that the message wasnot
`modified or altered in transit.
`One way hash function: One-way hash functions are knownin theart.
`The way in which the hashis generated is defined in such a way that does not
`depend on the characteristics of the input, though certainly the hash function
`can operates on in an input signal. The output is a hash value which is not
`secret, but it is computationally unfeasible to determine the pre-image that
`hashesto the hash value.
`Authorization: A term which is used broadly to cover the acts of
`conveying official sanction, permitting access or granting legal power to an
`entity.
`
`For non digitally-sampled data, encryption is data
`Encryption:
`scrambling using keys. For value-added or information rich data with content
`characteristics, encryption is typically slow or inefficient because contentfile
`sizes tend to be generally large. Encrypted data is called “ciphertext”.
`to
`refers
`Scrambling:
`For
`digitally-sampled
`data,
`scrambling
`manipulations of the value-added or information rich data at the inherent
`granularity of the file format. The manipulations are associated with a key,
`which may be made cryptographically secure or broken into key pairs.
`Scramblingis efficient for larger media files and can be used to provide content
`in less than commercially viable or referenced quality levels. Scrambling is not
`265112
`
`= Oi
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0011
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0011
`
`
`
`these applications, but provide morefitting
`as secure as encryption for
`manipulation of media rich content in the context of secured distribution.
`Scrambled data is also called “ciphertext” for the purposes of this invention.
`Encryption generally acts on the data as a whole, whereas scrambling is
`applied often to a particular subset of the data concerned with the granularity
`of the data, for instance the file formatting. Theresult is that a smaller amount
`of data is “encoded” or “processed” versus strict encryption, whereall of the
`data is “encoded” or “processed.” By way of example, a cable TV signal can be
`scrambled by altering the signal which provides for horizontal and vertical
`tracking, which wouldalter only a subset of the data, but not all of the data—
`which is why the audio signal is often untouched. Encryption, however,
`would generally so alter the data that no recognizable signal would be
`perceptually appreciated. Further, the scrambled data can be compared with
`the unscrambled data to yield the scrambling key. The difference with
`encryption is that the ciphertext is not completely random,
`that is,
`the
`scrambled data is still perceptible albeit in a lessened quality. Unlike
`watermarking, which maps a changeto the data set, scrambling is a transfer
`function which doesnotalter or modify the dataset.
`
`
`
`Detailed Discussion of Invention
`The LCS Domainis a logical area inside which a set of rules governing
`content use can be strictly enforced.
`The exact rules can vary between
`implementations, but in general, unrestricted access to the content inside the LCS
`Domainis disallowed. The LCS Domain hasa set of paths which allow content
`to enter the domain under different circumstances. The LCS Domain also has
`paths which allow the content to exit the domain.
`The act of entering the LCS Domain includesa verification of the content
`(an authentication check). Depending upon the source of the content, such
`verification may be easier or harder. Unvalidateable contentwill be subjected to
`a quality degradation. Content that can be validated but which belongs to a
`different LCS Domain will be excluded. The primary purpose of the validation is
`to prevent unauthorized, high-quality, sharing of content between domains.
`Whencontent leaves the LCS Domain,it is watermarked as belonging to
`that domain. It is allowed to leave at the quality level at which it was stored(i.e.
`the quality level determined by the