throbber
7715068
`
`March 19, 2019
`
`THIS IS TO CERTIFY THAT ANNEXED IS A TRUE COPY FROM THE
`RECORDS OF THIS OFFICE OF THE FILE WRAPPER AND CONTENTS
`OF:
`
`APPLICATION NUMBER: 60/213,489
`FILING DATE: June 23, 2000
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0001
`
`

`

`00/€2/90QAM
`
`‘nhwELoel
`
`
`
`
`
`
`
`
`CORRESPONDENCE ADDRESS
`
`
`Directalf correspondence to:oe
`a — ATI
`
`24735
`—
`
`Firm or
`PATENT TRADEMARK OFFICE
`
`
`Individual Name
`Address
`
`
`
` Address
`
`City
`
`Telephone
`
`
`
`ENCLOSED APPLICATION PARTS(checkall that apply)
`
`
`
`
`
`x! Specification NumberofPages |[| Small Entity Staternent
`BQ on
`tens7 Jom[|
`
`
`
`
`
`
`
`METHOD OF PAYMENTOFFILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT(check one)
`
`FILING FEE
`
`[| A check or money order is enclosed to coverthefiling fees
`AMOUNT(S$)
`
`The Commissioneris hereby authorized to chargefiling fees or [sd
`|
`
`
`|
`credit any overpayment to Deposit Account Number:
`$75.00
`|
`
`
`The invention was made by an agencyof the United States Governmentor undera contract with an agency of the United States Government.
`
`No.
`Cc] Yes, the name of the U.S. Government agency and the Government contract number are:
`
`
`Respectfully submitte
`
`
`
`SIGNATURE. June23, 2000 €) bEGoshna Date
`
`
`
`
`State
`
`
`
`
`
`
`Please type a plus sign (+) inside this box —»
`
`aceitecise
`
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET(Small Entity)
`This is a requestfor filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53 (c).
`
`
`|
`
`:
`
`Given Name(first and middle [if any])
`
`Family Name or Surname
`
`Residence (City and either State or Fareign Country)
`
`INVENTOR(S)/APPLICANT(S)
`
`Scott A.
`Michael
`
`MOSKOWITZ
`BERRY
`
`Miami, Florida USA
`Albuquerque, New Mexico USA
`
`
`
`
`° =e —
`as =
`oo Sos
`as ==8
`ss =r
`oS
`wo vo
`to uc Sas,oO
`
`| Additional inventors are being named on page 2 attached hereto
`TITLE OF THE INVENTION(280 characters max)
`SECURE PERSONAL CONTENT SERVER
`
`
`
`
`
`TYPED or
`
`TELEPHONE
`
`PRINTED NAME
`
`Floyd B. Ch
`apma
`Floy
`
`202/639/7700
`
`n
`
`REGISTRATION NO.
`(iapprooriete)
`
`40,555
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`SEND TO: Box Provisional Application, Assistant Commissionerfor Patents, Washington, DC 20231
`
`
`[Pagelof
`
`J
`
`]
`
`49SMALUREVO4
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0002
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0002
`
`

`

`June 23, 2000
`
`066112.0138
`
`Inventors:
`
`Scott Moskowitz & Michael Berry
`
`A Secure Personal Content Server
`
`Field of Invention
`The present inventionrelates to the secure distribution of digitized value-
`added information, or media content, while preserving the ability of publishers
`to make available unsecure versions of the same value-added information, or
`media content, without adverse effect to the systemssecurity.
`Authentication, verification and authorization are all handled with a
`combination of cryptographic and steganographic protocols to achieve efficient,
`trusted, secure exchangeof digital information.
`
`Cross-Reference To Related Application
`
`This application is based on and claims the benefit of pending U.S. Patent
`Application Serial No. 60/147,134, filed 08/04/99, entitled, "A Secure Personal
`Content Server." MUST FOLLOW THIS SENTENCE WITH ONE OF THE TWO
`PARAGRAPHS BELOW
`
`This application also claims the benefit of the following applications:
`pending U.S. Patent Application Serial No. 09/046,627, filed 3/24/98, entitled
`"Method for Combining Transfer Function with Predetermined Key Creation";
`pending U.S. Patent Application Serial No. 09/053,628, filed 04/02/98, entitled
`"Multiple Transform Utilization
`and Application
`for
`Secure Digital
`Watermarking"; pending U.S. Patent Application Serial No. 60/169,274, filed
`12/7/99,
`entitled
`"Utilizing Data Reduction
`in Steganographic
`and
`Cryptographic Systems"; and U.S. Patent Application Serial No.
`, filed June 16, 2000, entitled “Utilizing Data Reduction in Steganographic and
`Cryptographic Systems” (which is a continuation-in-part of PCT application No.
`PCT/US00/06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999) All of the
`patent applications previously identified in this paragraph are hereby
`incorporated by reference, in their entireties.
`
`This application also claims the benefit of pending pending U.S. Patent
`Application Serial No. 08/999,766,
`filed 7/23/97, entitled “Steganographic
`Method and Device’; pending U.S. Patent Application Serial No, 08/772,222,
`filed 12/20/96, entitled “Z-Transform Implementation of Digital Watermarks”;
`pending U.S. Patent Application Serial No. 09/456,319, filed 12/08/99, entitled
`265112
`
`of
`
`heetCe
`
`
`sa
`
`iU
`
`ICHse
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0003
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0003
`
`

`

`“Transform Implementation of Digital Watermarks’; pending U.S. Patent
`Application Serial No. 08/674,726, filed 7/2/96, entitled “Exchange Mechanisms
`for Digital Information Packages with Bandwidth Securitization, Multichannel]
`Digital Watermarks, and Key Management”; pending U.S. Patent Application
`Serial No. 09/545,589, filed 04/07/2000, entitled “Method and System for Digital
`Watermarking”; pending U.S. Patent Application Serial No. 09/046,627, filed
`3/24/98, entitled “Method for Combining Transfer Function with Predetermined
`Key Creation”; pending U.S. Patent Application Serial No. 09/053,628, filed
`04/02/98, entitled “Multiple Transform Utilization and Application for Secure
`Digital Watermarking”; pending U.S. Patent Application Serial No. 09/281,279,
`filed 3/30/99, entitled “Optimization Methodsfor the Insertion, Protection, and
`Detection...”; U.S, Patent Application Serial No.
`, filed June 16,
`2000, entitled “Utilizing Data Reduction in Steganographic and Cryptographic
`Systems”
`(which
`is
`a_
`continuation-in-part
`of PCT application No.
`PCT/US00/06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999); and
`pending U.S. Application No 60/169,274,
`filed 12/7/99, entitled “Systems,
`Methods And Devices For Trusted Transactions.” All of the patent applications
`previously identified in this paragraph are hereby incorporated by reference, in
`their entireties.
`
`Summary of the Invention
`Digital
`technology offers economies of scale to value-added data not
`possible with physical or tangible media distribution. The ability to digitize
`information both reduces the cost of copying and enables perfect copies. Thisis
`an advantage and a disadvantage to commercial publishers who must weigh the
`cost reduction against the real threat of unauthorized duplication of their value-
`added data content.
`Because cost
`reduction is an important business
`consideration, securing payment and authenticating individual copies of digital
`information (such as media content) presents unique opportunities
`to
`information service and media content providers. The present invention seeks to
`leverage the benefits of digital distribution to consumers and publishers alike,
`while ensuring the development and persistence of trust betweenall parties, as
`well as with any third parties involved, directly or indirectly,
`in a given
`transaction.
`In another approachthatis related to this goal, there are instances where
`transactions must be allowed to happen after perceptually-based digital
`information can be authenticated.
`(Perceptually based information is
`information whose valueis in large part, based uponits ability to be perceived
`by a human, and includes for example, acoustic, psychoacoustic, visual and
`psychovisual information.) The process of authenticating before distributing will
`become increasingly important for areas where the distributed material is related
`265112
`
`a Bie
`
` i
`
`2
`
`
`
`Eel
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0004
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0004
`
`

`

`to a trust-requiring transaction event. A number of examples exist. These
`include virtual retailers (for example, an on-line music store selling CDs and
`electronic versions of songs); service providers (for example, an on-line bank or
`broker who performs transactions on behalf of a consumer); and transaction
`providers (for example, wholesalers or auction houses). These parties have
`different authentication interests and requirements. By using the teachings of
`this application, these interests and requirements may be separated and then
`independently quantified by market participants in shorter periodsof time.
`is
`All parties in a transaction must authenticate information that
`In
`perceptually observable before trust between the parties can be established.
`today’s world, information (including perceptually rich information)is typically
`digitized, and as a result, can easily be copied and redistributed, negatively
`
`impacting buyers, sellers and other market participants.|Unauthorized
`redistribution confuses authenticity, non-repudiation, limit of ability and other
`important “transaction events.” In a networked environment, transactions and
`interactions occur over a transmission line or a network, with buyerandseller at
`different points on the line or network. While such electronic transactions have
`the potential to add value to the underlying information being bought and sold
`(and the potential to reduce the cost of the transaction), instantaneous piracy can
`significantly reduce the value of the underlying data, if not wholly destroyit.
`Even the threat of piracy tends to undermine the value of the data that might
`otherwise exist for such an electronic transaction.
`Related situations range from the ability to provably establish the
`“existence” of a virtual financial institution to determining thereliability of an
`“electronic stamp.” The present invention seeks to improve on the prior art by
`describing optimal combinations of cryptographic and steganographic protocols
`for “trusted” verification,
`confidence
`and non-repudiation of digitized
`representations of perceptually rich information of the actual seller, vendor or
`other associated institutions which may not be commercial in nature (confidence
`building with logo’s such as the SEC, FDIC, Federal Reserve, FBI, etc. apply). To
`the extent that an entity plays a role in purchase decisions made by a consumer
`of goodsandservicesrelating to data, the present invention has a wide range of
`beneficial applications. One is enabling independent trust based on real world
`representations that are not physically available to a consumeror user. A second
`is the ability to match informational needs between buyers and sellers that may
`not be universally appealing or cost effective in given market situations. These
`include auction models based on recognition of the interests or demand of
`consumers and market participants— which make trading profitable by focusing
`specialized buyers and sellers. Another use for the information matching is to
`establish limits on the liability of such institutions and profit-seeking entities,
`such as
`insurance providers or credit companies.
`These vendors
`lack
`appropriate tools for determining intangible asset risk or even the value of the
`information being exchanged. By encouraging separate and distinct “trust”
`265112
`
`wot
`desesi
`
`tes
`
`chaS
`
`as
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0005
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0005
`
`

`

` B23
`
`arrangements over an electronic network, profitable market-based relationships
`can result.
`The present invention can make possible efficient and openly accessible
`markets for tradable information. Existing transaction security (including on-line
`credit cards, electronic cash or its equivalents, electronic wallets, electronic
`tokens, etc.) which primarily use cryptographic techniques
`to secure a
`transmission channel--but are not directly associated or dependent on the
`information being sold--fails to meet this valuable need. The present invention
`proposes a departure from the prior art by separating transactions from
`authentication in the sale of digitized data. Such data may include videos, songs,
`images, electronic stamps, electronic trademarks, and electronic logos used to
`ensure membership in someinstitutional body whose purposeis to assist in a
`dispute, limit liability and provide indirect guidance to consumers and market
`participants,alike.
`the present invention
`With an increasingly anonymous marketplace,
`offers invaluable embodiments to accomplish “trusted” transactions in a more
`flexible, transparent manner while enabling market participants to negotiate
`terms and conditions. Negotiation may be driven by predetermined usage rules
`or parameters, especially as the information economyoffers potentially many
`competitive marketplaces in which to transact,
`trade or exchange among
`businesses and consumers. As information grows exponentially,
`flexibility
`becomes an advantage to marketparticipants, in that they need to screen,filter
`and verify information before making a transaction decision. Moreover, the
`accuracy and speed at which decisions can be madereliably enables confidence
`to grow with an aggregate of “trusted transactions’.
`“Trusted transactions”
`beget further “trusted transactions” through experience. The present invention
`also provides for improvements over the prior art in the ability to utilize
`different independently important “modules” to enable a “trusted transaction”
`using competitive cryptographic and steganographic elements, as well as being
`able to support a wide variety of perceptually-based media and information
`formats. The envisioned system is not bound by a proprietary meansofcreating
`recognition for a good or service, such as that embodied in existing closed
`system. Instead, the flexibility of the present invention will enable a greater and
`more diverse information marketplace.
`The present invention is not a “trusted system”, per se, but “trusted
`transactions” are enabled, since the same value-added informationthat is sought
`maystill be in the clear, not in a protected storage area or closed, rule-based
`“inaccessible virtual environment’.
`A related additional set of embodiments regards the further separation of
`the transaction and the consumer's identification versus the identification of the
`transaction only. This is accomplished through separated “trusted transactions”
`bound by authentication, verification and authorization in a transparent manner.
`With these embodiments, consumer and vendor privacy could be incorporated.
`265112
`
`= Te
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0006
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0006
`
`

`

`PcliSe
`iaishaES
`
`ear=
`
`
`
`CH
`
`More sophisticated relationships are anticipated between parties, who can mix
`information abouttheir physical goods andservices with a transparent means for
`consumers, who may not be knownto theseller, who choose not to confide in an
`inherently closed “trusted system” or provide additional personal information or
`purchasing information (in the form of a credit card or other electronic payment
`system), in advance of an actual purchasedecision orability to observe (audibly
`or visibly) the content in the clear. This dynamic is inconsistent with the prior
`art's emphasis on access control, not
`transparent access to value-added
`information (in the form or goods or services), that can be transacted on an
`electronic or otherwise anonymous exchange.
`These embodiments may include decisions about availability of a
`particular good or service through electronic means, such as the Internet, or
`means
`that
`can be modularized to conduct
`a
`transaction based
`on
`interconnection of various users (such as WebTV, a Nintendo or Sony game
`console with network abilities, cellular phone, PalmPilot, etc.).
`These
`embodiments may additionally be implemented in traditional auction types
`(including Dutch auctions), Consumers may view their anonymous marketplace
`transactions very differently because of a lack of physical human interactions,
`but
`the present
`invention can enable realistic transactions to occur by
`maintaining open access and offering strict authentication and verification of the
`information being traded. This has theeffect of allowing legacy relationships,
`legacy information, and legacy business models to be offered in a manner which
`moreclosely reflects many observable transactions in the physical world. The
`tremendous benefits to sellers and consumers is obvious; existing transactions
`need not reduce their expectations of security. As well, the ability to isolate and
`quantify aspects of a transaction by module potentially allows for better price
`determinations of intangible asset insurance, transaction costs, advertising costs,
`liability, etc. which have physical world precedent.
`It is contemplated that the publisher and/or ownerof the copyrights will
`wantto dictate restrictions on the ability of the purchaser to use the data being
`sold. Such restrictions can be implemented throughthe present invention, which
`presents a significant advantage over the prior art (which attempts to effect
`security through access control and attempted tight reigns over distribution).
`See US Pat. No. 5,428,606 for a discussion on democratizing digital information
`exchange between publishers and subscribers of said information.
`A goal for providers of value-added content is to maximize profits for the
`sale of their content. Marketing and promotion of the informational content
`cannot be eliminated, considering the ever increasing amount of information
`vying for consumers and other market participant's attention. Nonetheless, in a
`market where the goods are speculatively valued, marketing budgets are
`inherently constrained, as you are trying to create demand for a product with
`little inherent value. Where such markets have participants, both buyers and
`sellers and their respective agents, with access to the same information in real
`265112
`
`~ 5.
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0007
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0007
`
`

`

`
`
`time, market mechanismsefficiently price the market goods or services. These
`markets are characterized by “price commoditization” so buyers and sellers are
`limited to differentiating their offerings by selection and service.
`If the markets
`are aboutinformationitself, it has proven moredifficult to accurately forecast the
`target price where sellers can maximize their profits. Quality and quantity
`provide different evaluation criteria of selection and service relating to the
`information being traded. The present invention regards a particular set of
`implementations of value-added content security in markets which may include
`unsecure and secure versions of the same value-added data (such as songs,
`video, research, pictures, electronic logos, electronic trademarks, value-added
`information, etc.).
`Transactions for value-added information can occur without any physical
`location. So, there is a need for a secure personal content server for which the
`value added information can be offered for transactions in a mannersimilar to
`real world transactions. One feature is to offer seemingly similar value added
`information in differing quality settings.
`These settings have logical
`relationships with fidelity and discreteness and are determined by market
`participants. Another issue is that because purchasers may be anonymous to
`sellers, it is more important to have a particular value-added information object
`available so that market participants can fulfil there role are consumers.
`One fundamental weakness of current information markets is the lack of
`mechanisms to ensure that buyers and sellers can reach pricing equilibrium.
`This deficit is related to the “speculative” , “fashion”, and “vanity” aspects of
`perceptual content (such as music, video, and art or some future recognition to
`purchasers). For other goods and services being marketed to an anonymous
`marketplace, market participants may never see (and indeed, may choose to
`never see, an actual location where the transaction may physically occur. A
`physical location may simply not exist. There are a number of such virtual
`operations in business today, which would benefit from the improvements
`offered underthe present system.
`The present invention also seeks to provide improvements to the art in
`enabling a realistic model for building trust between parties (or their agents) not
`in a “system”, per se. Because prior art systems lack any inherentability to allow
`for information to flow freely to enable buyers andsellers to react to changing
`market conditions. The present invention can co-exist with these “trusted
`systems” to the extent that all market participants in a given industry have
`relatively similar information with which to price value-added data.
`The
`improvement over such systems, however, addresses a core features in most
`data-added value markets: predictions, forecasts, and speculation over the value
`of informationis largely a unsuccessful activity for buyers and sellers alike. The
`additional improvementis the ability to maintain security even with unsecure or
`legacy versions of value-added information available to those who seek choices
`that fit less quantitative criteria—“aesthetic quality” of the information versus
`265112
`
`-6-
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0008
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0008
`
`

`

`YtCh
`
`>akeBAES
`
`iolAa
`
`“commercial price”. Purchase or transaction decisions can be madefirst by
`authenticating an electronic version of a song, image, video, trademark, stamp,
`currency,etc.
`Additional anticipated improvements include the ability to support
`varying pricing models such as auctions that are difficult or impossible to
`accomplish underexistingprior art that leavesall access and pricing control with
`the seller alone, and the separation of the transaction from the exchange of the
`value-added information, which gives more control
`to buyers over
`their
`identities and purchasing habits, (both sensitive and separately distinct forms of
`“unrelated” value-added information). Essentially, no system knownin the art
`allows for realistic protocols to establish trust between buyers and sellers in a
`manner more closely reflecting actual purchasing behavior of consumers and
`changingselling behavior of sellers. The goal in such transactionsis the creation
`of trust between parties as well as “trusted relationships” with those parties. The
`present invention is an example of one such system for media content where the
`“aesthetic” or “gestalt” of the underlying content and its characteristics is a
`componentof buying habits. Without an ability to open distribution systems to
`varying buyers and sellers, media content may be priced at less than maximum
`economic value and buyers may be deprived of a competitive, vigorous
`marketplace
`for
`exciting media
`content
`from many different creative
`participants.
`To the extent that recognition plays such a key role in an information
`economy, value-added data should be as accessible as possible to the highest
`number of market participants in the interests of furthering creativity and
`building a competitive marketplace for related goods and services. This is to the
`benefit of both buyers and sellers as well as the other participants in such an
`economic ecosystem. The Internet and other transmission-based transactions
`with unknownparties presents a number of challenges to information vendors
`who wish to develop customer relations,
`trust and profitable sales.
`The
`information economy is largely an anonymous marketplace,
`thus, making it
`much more difficult to identify consumers andsellers. The present invention
`provides remedies to help overcome these weaknesses.
`The present invention is concerned with methods and systems which
`enable secure, paid exchange of value-added information, while separating
`transaction protocols. The present invention improves on existing means for
`distribution control by relying on authentication, verification and authorization
`that may be flexibly determined by both buyers and sellers.
`These
`determinations may not need to be predetermined, although pricing matrix and
`variable access to the information opens additional advantagesoverthepriorart.
`The present invention offers methods and protocols for ensuring value-added
`information distribution can be used to facilitate trust in a large or relatively
`anonymous marketplace (such as the Internet's World Wide Web).
`
`265112
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0009
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0009
`
`

`

`
`
`We now define components of the preferred embodiments for methods,
`systems, and devices.
`
`Definitions:
`Local Content Server (LCS): A device or software application which can
`securely store a collection of value-added digital content. The LCS has a unique
`ID.
`
`Secure Electronic Content Distributor (GECD): An entity, device or
`software application which can validate a transaction with a LCS, process a
`payment, and deliver digital content securely to a LCS.
`In cryptographic terms,
`the SECDacts as a “certification authority” or its equivalent. SECDs may have
`differing arrangements with consumers
`and providers of value-added
`information.
`Satellite Unit (SU): A portable medium or device which can accept secure
`digital content from a LCS through a physical, local connection and which can
`either play or make playable the digital content. The SU may have other
`functionality as it relates to manipulating the content, such as recording. The SU
`has a unique ID.
`LCS Domain: A secure medium or area where digital content can be
`stored, with an accompanying rule system for transfer of digital content in and
`out of the LCS Domain.
`SecureChannel™; A secure channel to pass individualized content to
`differentiate authentic content from legacy or unauthorized, pirated content.
`SecureChannel maycarry a value-adding component ( VAC).
`Standard Quality: A transfer path into the LCS Domain which maintains
`the digital content at a predetermined reference level or degrades the contentifit
`is at a higher quality level. In an audio implementation, this might be defined as
`Red Book CD Quality (44100 Hz., 16 bits, 2 channels).
`Low Quality: A transfer path into the LCS Domain which degrades the
`digital content to a sub-referencelevel.
`In an audio implementation, this might
`be defined as below CD Quality (for instance, 32000 Hz., 16 bits, 2 channels).
`High Quality: A transfer path into the LCS Domain which allowsdigital
`content of any quality level to pass unaltered.
`Rewritable Media: An mass storage device which can be rewritten (e.g.
`hard drive, CD-RW,Zip cartridge, M-O drive,etc...).
`Read-Only Media: A mass storage device which can only be written once
`(e.g. CD-ROM, CD-R, DVD, DVD-R,etc...). Note: pre-recorded music, video,
`software, or images,etc. are all “read only” media.
`Unique ID: A Unique ID is created for a particular transaction and is
`unique to that transaction (roughly analogous to a humanfingerprint). One
`way to generate a Unique ID is with a one-way hash function. Another wayis
`by incorporating the hash result with a message into a signing algorithm will
`create a signature scheme. For example, the hash result may be concatenated
`265112
`
`-8-
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0010
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0010
`
`

`

`
`
`to the digitized, value added information which is the subject of a transaction.
`Additional uniqueness may be observed in a hardware device so as to
`differentiate that device, which may be used in a plurality of transactions,
`from othersimilar devices.
`Value-added: Value-added information is differentiated from non-
`commoditized information in termsof its marketability or demand, which can
`vary, obviously, from each marketthatis created for the information. By way
`of example, information in the abstract has no value until a marketis created
`for the information (i.e., the information becomes a commodity). The same
`information can be packaged in many different forms, each of which may have
`different values. Because information is easily digitized, one way to package
`the “same” information differently is by different levels of fidelity and
`discreteness. Value is typically bounded by context and consideration.
`Authentication: A receiver of a “message” (embedded or otherwise
`within the value-added information) should be able to ascertain the original of
`the message (or by effects, the origin of the carrier within which the messageis
`stored). An intruder should notbe able to successfully represent someoneelse.
`Additional functionality such as Message Authentication Codes (MAC) could be
`incorporated (a one-way hash function with a secret key) to ensure limited
`verification or subsequent processing of value-added data.
`Verification:
`In cryptographic terms, “verification” serves the “integrity”
`function to prevent an intruder from substituting false messages for legitimate
`ones. In this sense, the receiver of the message (embedded or otherwise present
`within the value-added information) should be assured that the message wasnot
`modified or altered in transit.
`One way hash function: One-way hash functions are knownin theart.
`The way in which the hashis generated is defined in such a way that does not
`depend on the characteristics of the input, though certainly the hash function
`can operates on in an input signal. The output is a hash value which is not
`secret, but it is computationally unfeasible to determine the pre-image that
`hashesto the hash value.
`Authorization: A term which is used broadly to cover the acts of
`conveying official sanction, permitting access or granting legal power to an
`entity.
`
`For non digitally-sampled data, encryption is data
`Encryption:
`scrambling using keys. For value-added or information rich data with content
`characteristics, encryption is typically slow or inefficient because contentfile
`sizes tend to be generally large. Encrypted data is called “ciphertext”.
`to
`refers
`Scrambling:
`For
`digitally-sampled
`data,
`scrambling
`manipulations of the value-added or information rich data at the inherent
`granularity of the file format. The manipulations are associated with a key,
`which may be made cryptographically secure or broken into key pairs.
`Scramblingis efficient for larger media files and can be used to provide content
`in less than commercially viable or referenced quality levels. Scrambling is not
`265112
`
`= Oi
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0011
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0011
`
`

`

`these applications, but provide morefitting
`as secure as encryption for
`manipulation of media rich content in the context of secured distribution.
`Scrambled data is also called “ciphertext” for the purposes of this invention.
`Encryption generally acts on the data as a whole, whereas scrambling is
`applied often to a particular subset of the data concerned with the granularity
`of the data, for instance the file formatting. Theresult is that a smaller amount
`of data is “encoded” or “processed” versus strict encryption, whereall of the
`data is “encoded” or “processed.” By way of example, a cable TV signal can be
`scrambled by altering the signal which provides for horizontal and vertical
`tracking, which wouldalter only a subset of the data, but not all of the data—
`which is why the audio signal is often untouched. Encryption, however,
`would generally so alter the data that no recognizable signal would be
`perceptually appreciated. Further, the scrambled data can be compared with
`the unscrambled data to yield the scrambling key. The difference with
`encryption is that the ciphertext is not completely random,
`that is,
`the
`scrambled data is still perceptible albeit in a lessened quality. Unlike
`watermarking, which maps a changeto the data set, scrambling is a transfer
`function which doesnotalter or modify the dataset.
`
`
`
`Detailed Discussion of Invention
`The LCS Domainis a logical area inside which a set of rules governing
`content use can be strictly enforced.
`The exact rules can vary between
`implementations, but in general, unrestricted access to the content inside the LCS
`Domainis disallowed. The LCS Domain hasa set of paths which allow content
`to enter the domain under different circumstances. The LCS Domain also has
`paths which allow the content to exit the domain.
`The act of entering the LCS Domain includesa verification of the content
`(an authentication check). Depending upon the source of the content, such
`verification may be easier or harder. Unvalidateable contentwill be subjected to
`a quality degradation. Content that can be validated but which belongs to a
`different LCS Domain will be excluded. The primary purpose of the validation is
`to prevent unauthorized, high-quality, sharing of content between domains.
`Whencontent leaves the LCS Domain,it is watermarked as belonging to
`that domain. It is allowed to leave at the quality level at which it was stored(i.e.
`the quality level determined by the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket