`
`March 19, 2019
`
`THIS IS TO CERTIFY THAT ANNEXED IS A TRUE COPY FROM THE
`RECORDS OF THIS OFFICE OF THE FILE WRAPPER AND CONTENTS
`OF:
`
`APPLICATION NUMBER: 60/213,489
`FILING DATE: June 23, 2000
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0001
`
`
`
`Please type a plus sign (+) Inertia this box _.
`
`0561110133
`
`PROVISIONAL APPLICATION FOR PA TENT COVER SHEET (Small Entity)
`This is a request for filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53 to].
`
`'nIi'ILDI:
`outta/aniiilllillilillliiillilliiil
`
`
`
`
`Given Name (first and middle [if anyj)
`
`Residence (City and Either State or Foreign Country)
`
`Invemonisimnmcmns)
`
`'
`
`
`
`
`
`
`
`O E(- .2
`040‘ =, no =3
`mg E—B
`3-,... =3
`mag:
`«a 2“,
`tom E5
`0 E
`
` -
`
`Scott A.
`MDSKOWITZ
`Miami, Florida USA
`
`
`
`
`BERRY
`Albuquerque, New Mexico USA
`Michael
`
`
`
`
`
`I Additional inventors are being named on page 2 attached hereto
`TITLE OF THE iNVEN'nON (280 characters max]
`
`SECURE PERSONAL CONTENT SERVER
`
`
`
`
`State
`
`Telephone
`
`
`
`
`
`
`CORRESPONDENCE ADDRESS
`
`Direct all correspondence to:
`___..
`lilliiililllIllllliilliliill
`
`
`0”
`24735
`Firm or
`PATENT IRADEMARK OFFICE
`
`individual Name
`
`Address
`
`
`Address
`
`
`
`City
`
`
`ENCLOSED APPLICATION PARTS (check 3" fhafapplfl
`
`
`
` E Drawingts)
`E Specification
`NumberofPages I
`I] a
`D Small Entity Statement
`a :
`NumberofSheets
`
`
`METHOD OF PAYMENT OF FILING FEES FOR THIS PROVISIONAL APPLICATION FOR PATENT {check one)
`
`FiLlNG FEE
`
`AMOUNT (3)
`D A check or money order is enclosed to cover the filing fees
`
`
`I
`The commissioner is hereby authorized to charge filing fees or I:,
`
`
`575.00
`.
`credit any overpayment to Deposit Account Number:
`-
`
`
`The invention was made by an agency oi the United states Govemmenl or under a contract with an agency of the United States GovernmenL
`No.
`
`D Yes, the name oithe U3. Gmremmenl agency and the Government contract number are:
`
`
`mitts
`Respectfully sub
`SIGNATURE
`' 63%“,
`Date
`June 23, 2000
`
`
`
`TYPED or
`
`TELEPHONE
`
`PRINTED NAME
`
`d B. Ch
`
`n
`
`1
`apma
`F oy
`
`202I639fl700
`
`
`
`REGISTRATION NO.
`(if appropriate)
`
`40,555
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PA TENT
`
`SEND TO: Box Provision of Application, Assistant Comicsinnerfor Patents, Washington, DC 20233
`
`[Pagelof
`
`I
`
`]
`
`‘1QSMALUREV04
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0002
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0002
`
`
`
`"ii?it!!!till‘iEEil
`
`
`
`
`L5;
`
`Iif}!"Eiiil{if}!"‘
`
`
`
`
`[EllHilli533
`
`Iune 23, 2000
`
`0661120138
`
`Inventors:
`
`Scott Moskowitz. 8: Michael Berry
`
`A Secure Personal Content Server
`
`Field of Invention
`
`The present invention relates to the secure distributiou of digitized value-
`added information, or media content, while preserving the ability of publishers
`to make available unsecure versions of the same value—added information, or
`
`media content, without adverse effect to the systems security.
`Authentication, verification and authorization are all handled with a
`
`combination of cryptographic and steganographic protocols to achieve efficient,
`trusted, secure exchange of digital information.
`
`Cross-Reference To Related Application
`
`This application is based on and claims the benefit of pending U.S. Patent
`Application Serial No. 60/ 147,134, filed 08/04/99, entitled, "A Secure Personal
`Content Server." MUST FOLLOW THIS SENTENCE WITH ONE OF THE TWO
`PARAGRAPHS BELOW
`
`This application also claims the benefit of the following applications:
`pending U.S. Patent Application Serial No. 09/046,627, filed 3/ 24/ 98, entitled
`"Method for Combining Transfer Function with Predetermined Key Creation";
`pending U.S. Patent Application Serial No. 09/ 053,628, filed 04/ 02/ 98, entitled
`"Multiple Transform Utilization
`and Application
`for
`Secure Digital
`Watermarking"; pending U.S. Patent Application Serial No. 60/169,274, filed
`12/7/99,
`entitled
`"Utilizing Data Reduction
`in Steganographic
`and
`Cryptographic Systems"; and U.S. Patent Application Serial No.
`, filed June 16, 2000, entitled ”Utilizing Data Reduction in Steganographic and
`Cryptographic Systems" (which is a continuation—in—part of PCT application No.
`PCT/USOO/ 06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999) All of the
`patent applications previously identified in this paragraph are hereby
`incorporated by reference, in their entireties.
`
`This application also claims the benefit of pending pending U.S. Patent
`Application Serial No. 08/999,766,
`filed 7/23/97, entitled ”Steganographic
`Method and Device”; pending U.S. Patent Application Serial No. 08/ 772,222,
`filed 12/20/96, entitled ”Z-Transform Implementation of Digital Watermarks”;
`pending U.S. Patent Application Serial No. 09/456,319, filed 12/08/99, entitled
`265112
`
`-1-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0003
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0003
`
`
`
`"Transform Implementation of Digital Watermarks"; pending US. Patent
`Application Serial No. 08/674,726, filed 7/2/96, entitled ”Exchange Mechanisms
`for Digital Information Packages with Bandwidth Securitization, Multichannel
`Digital Watermarks, and Key Management”; pending U.S. Patent Application
`Serial No. 09/545,589, filed 04/07/2000, entitled ”Method and System for Digital
`Watermarking”; pending US. Patent Application Serial No. 09/046,627, filed
`3/ 24/ 98, entitled ”Method for Combining Transfer Function with I’redetermined
`Key Creation”; pending U.S. Patent Application Serial No. 09/ 053,628, filed
`04/ 02/98, entitled ”Multiple Transform Utilization and Application for Secure
`Digital Watermarking”; pending US. Patent Application Serial No. 09/ 281,279,
`filed 3/ 30/ 99, entitled "Optimization Methods for the Insertion, Protection, and
`Detection...”,- US. Patent Application Serial No.
`, filed June 16,
`2000, entitled "Utilizing Data Reduction in Steganographic and Cryptographic
`Systems”
`(which
`is
`a
`continuation-in—part
`of PCT application No.
`PCT/ USOO/ 06522, filed 14 March 2000, which PCT application claimed priority
`to U.S. Provisional Application No. 60/125,990, filed 24 March 1999); and
`pending US. Application No 60/ 169,274,
`filed 12/7/99, entitled “Systems,
`Methods And Devices For Trusted Transactions.” All of the patent applications
`previously identified in this paragraph are hereby incorporated by reference, in
`their entireties.
`
`Summagg of the Invention
`Digital
`technology offers economies of scale to value—added data not
`possible with physical or tangible media distribution. The ability to digitize
`information both reduces the cost of copying and enables perfect copies. This is
`an advantage and a disadvantage to commercial publishers who must weigh the
`cost reduction against the real threat of unauthorized duplication of their value-
`added data content.
`Because cost
`reduction is an important business
`consideration, securing payment and authenticating individual copies of digital
`information (such as media content) presents unique opportunities
`to
`information service and media content providers. The present invention seeks to
`leverage the benefits of digital distribution to consumers and publishers alike,
`while ensuring the development and persistence of trust between all parties, as
`well as with any third parties involved, directly or indirectly,
`in a given
`transaction.
`
`In another approach that is related to this goal, there are instances where
`transactions must be allowed to happen after perceptually-based digital
`information can be authenticated.
`(Perceptually based information is
`information whose value is in large part, based upon its ability to be perceived
`by a human, and includes for example, acoustic, psychoacoustic, visual and
`psychovisual information.) The process of authenticating before distributing will
`become increasingly important for areas where the distributed material is related
`265112
`
`-2-
`
` ;
`
`=3
`
`
`
`,4
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0004
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0004
`
`
`
`
`
`
`
`"113'Ellitill'Eiilil
`
`..,
`ml»5:-
`
`
`
`
`illlltiltiii:
`
`to a trust-requiring transaction event. A number of examples exist. These
`include virtual retailers (for example, an on—line music store selling CD5 and
`electronic versions of songs); service providers (for example, an on-line bank or
`broker who performs transactions on behalf of a consumer); and transaction
`providers (for example, wholesalers or auction houses). These parties have
`different authentication interests and requirements. By using the teachings of
`this application, these interests and requirements may be separated and then
`independently quantified by market participants in shorter periods of time.
`is
`All parties in a transaction must authenticate information that
`In
`perceptually observable before trust between the parties can be established.
`today's world, information (including perceptually rich information) is typically
`digitized, and as a result. can easily be copied and redistributed, negatively
`impacting buyers,
`sellers and other market participants.
`Unauthorized
`redistribution confuses authenticity, non-repudiation, limit of ability and other
`important "transaction events." In a networked environment, transactions and
`interactions occur over a transmission line or a network, with buyer and seller at
`different points on the line or network. While such electronic transactions have
`the potential to add value to the underlying information being bought and sold
`(and the potential to reduce the cost of the transaction), instantaneous piracy can
`significantly reduce the value of the underlying data, if not wholly destroy it.
`Even the threat of piracy tends to undermine the value of the data that might
`otherwise exist for such an electronic transaction.
`
`Related situations range from the ability to provably establish the
`”existence" of a virtual financial institution to determining the reliability of an
`”electronic stamp." The present invention seeks to improve on the prior art by
`describing optimal combinations of cryptographic and steganographic protocols
`for ”trusted” verification,
`confidence
`and non-repudiation of digitized
`representations of perceptually rich information of the actual seller, vendor or
`other associated institutions which may not be commercial in nature (confidence
`building with logo’s such as the SEC, FDIC, Federal Reserve, FBI, etc. apply). To
`the extent that an entity plays a role in purchase decisions made by a consumer
`of goods and services relating to data, the present invention has a wide range of
`beneficia] applications. One is enabling independent trust based on real world
`representations that are not physically available to a consumer or user. A second
`is the ability to match informational needs between buyers and sellers that may
`not be universally appealing or cost effective in given market situations. These
`include auction models based on recognition of the interests or demand of
`consumers and market participants—which make trading profitable by focusing
`specialized buyers and sellers. Another use for the information matching is to
`establish limits on the liability of such institutions and profit—seeking entities,
`such as
`insurance providers or credit companies.
`These vendors
`lack
`appropriate tools for determining intangible asset risk or even the value of the
`information being exchanged. By encouraging separate and distinct ”trust”
`265112
`
`-3-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0005
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0005
`
`
`
`
`
`"ii?iii?lililEEEEli
`
`
`
`
`
`
`
`
`
`tilliii}!EEEECE35355!liiilllillil'“tilt:{till“ll"il{EEC
`
`
`
`
`
`
`
`
`
`arrangements over an electronic network, profitable market-based relationships
`can result
`
`The present invention can make possible efficient and openly accessible
`markets for tradable information. Existing transaction security (including on—line
`credit cards, electronic cash or its equivalents, electronic wallets, electronic
`tokens, etc.) which primarily use cryptographic techniques
`to secure a
`transmission channel——but are not directly associated or dependent on the
`information being sold--fails to meet this valuable need. The present invention
`proposes a departure from the prior art by separating transactions from
`authentication in the sale of digitized data. Such data may include videos, songs,
`images, electronic stamps, electronic trademarks, and electronic logos used to
`ensure membership in some institutional body whose purpose is to assist in a
`dispute, limit liability and provide indirect guidance to consumers and market
`participants, alike.
`the present invention
`With an increasingly anonymous marketplace,
`offers invaluable embodiments to accomplish ”trusted” transactions in a more
`flexible, transparent manner while enabling market participants to negotiate
`terms and conditions. Negotiation may be driven by predetermined usage rules
`or parameters, especially as the information economy offers potentially many
`competitive marketplaces in which to transact,
`trade or exchange among
`businesses and consumers. As information grows exponentially,
`flexibility
`becomes an advantage to market participants, in that they need to screen, filter
`and verify information before making a transaction decision. Moreover, the
`accuracy and speed at which decisions can be made reliably enables confidence
`to grow with an aggregate of "trusted transactions”.
`"Trusted transactions"
`beget further ”trusted transactions" through experience. The present invention
`also provides for improvements over the prior art in the ability to utilize
`different independently important ”modules” to enable a “trusted transaction”
`using competitive cryptographic and steganographic elements, as well as being
`able to support a wide variety of perceptually—based media and information
`formats. The envisioned system is not bound by a proprietary means of creating
`recognition for a good or service, such as that embodied in existing closed
`system. Instead, the flexibility of the present invention will enable a greater and
`more diverse information marketplace.
`The present invention is not a “trusted system”, per se, but “trusted
`transactions” are enabled, since the same value-added information that is sought
`may still be in the clear, not in a protected storage area or closed, rule-based
`"inaccessible virtual environment”.
`
`A related additional set of embodiments regards the further separation of
`the transaction and the consumer's identification versus the identification of the
`
`transaction only. This is accomplished through separated “trusted transactions”
`bound by authentication, verification and authorization in a transparent manner.
`With these embodiments, consumer and vendor privacy could be incorporated.
`265112
`
`-4-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0006
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0006
`
`
`
`"NT2535!!lllliilEEEli
`
`
`
`
`iiiffh1153?!"iiiiii:
`
`.355‘iii
`
`
`
`
`it}!it‘ll
`
`More sophisticated relationships are anticipated between parties, who can mix
`information about their physical goods and services with a transparent means for
`consumers, who may not be known to the seller, who choose not to confide in an
`inherently closed ”trusted system” or provide additional personal information or
`purchasing information (in the form of a credit card or other electronic payment
`system), in advance of an actual purchase decision or ability to observe (audibly
`or visibly) the content in the clear. This dynamic is inconsistent with the prior
`art’s emphasis on access control, not
`transparent access to value-added
`information (in the form or goods or services), that can be transacted on an
`electronic or otherwise anonymous exchange.
`These embodiments may include decisions about availability of a
`particular good or service through electronic means, such as the Internet, or
`means
`that
`can be modularized to conduct
`a
`transaction based
`on
`interconnection of various users (such as WebTV, a Nintendo or Sony game
`console with network abilities, cellular phone, PalmPilot, etc.).
`These
`embodiments may additionally be implemented in traditional auction types
`(including Dutch auctions). Consumers may view their anonymous marketplace
`transactions very differently because of a lack of physical human interactions,
`but
`the present
`invention can enable realistic transactions to occur by
`maintaining open access and offering strict authentication and verification of the
`information being traded. This has the effect of allowing legacy relationships,
`legacy information, and legacy business models to be offered in a manner which
`more closely reflects many observable transactions in the physical world. The
`tremendous benefits to sellers and consumers is obvious; existing transactions
`need not reduce their expectations of security. As well, the ability to isolate and
`quantify aspects of a transaction by module potentially allows for better price
`determinations of intangible asset insurance, transaction costs, advertising costs,
`liability, etc. which have physical world precedent.
`It is contemplated that the publisher and/ or owner of the copyrights will
`want to dictate restrictions on the ability of the purchaser to use the data being
`sold. Such restrictions can be implemented through the present invention, which
`presents a significant advantage over the prior art (which attempts to effect
`security through access control and attempted fight reigns over distribution).
`See US Pat. No. 5,428,606 for a discussion on democratizing digital information
`exchange between publishers and subscribers of said information.
`A goal for providers of value-added content is to maximize profits for the
`sale of their content Marketing and promotion of the informatiOnal content
`cannot be eliminated, considering the ever increasing amount of information
`vying for consumers and other market participant’s attention. Nonetheless, in a
`market where the goods are speculatively valued, marketing budgets are
`inherently constrained, as you are trying to create demand for a product with
`little inherent value. Where such markets have participants, both buyers and
`sellers and their respective agents, with access to the same information in real
`265112
`
`-5-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0007
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0007
`
`
`
`
`
`time, market mechanisms efficiently price the market goods or services. These
`markets are characterized by ”price commoditization” so buyers and sellers are
`limited to differentiating their offerings by selection and service.
`If the markets
`are about information itself, it has proven more difficult to accurately forecast the
`target price where sellers can maximize their profits. Quality and quantity
`provide different evaluation criteria of selection and service relating to the
`information being traded. The present invention regards a particular set of
`implementations of value-added content security in markets which may include
`unsecure and secure versions of the same value—added data (such as songs,
`video, research, pictures, electronic logos, electronic trademarks, value-added
`information, etc).
`Transactions for value-added information can occur without any physical
`location. So, there is a need for a secure personal content server for which the
`value added information can be offered for transactions in a manner similar to
`real world transactions. One feature is to offer seemingly similar value added
`information in differing quality settings.
`These settings have logical
`relationships with fidelity and discreteness and are determined by market
`participants. Another issue is that because purchasers may be anonymous to
`sellers, it is more important to have a particular value~added information object
`available so that market participants can fulfil there role are consumers.
`One fundamental weakness of current information markets is the tack of
`mechanisms to ensure that buyers and sellers can reach pricing equilibrium.
`This deficit is related to the ”speculative” , ”fashion”, and ”vanity" aspects of
`perceptual content (such as music, video, and art or some future recognition to
`purchasers). For other goods and services being marketed to an anonymous
`marketplace, market participants may never see (and indeed, may choose to
`never see, an actual location where the transaction may physically occur. A
`physical location may simply not exist. There are a number of such virtual
`Operations in business today, which would benefit from the improvements
`offered under the present system.
`The present invention also seeks to provide improvements to the art in
`enabling a realistic model for building trust between parties (or their agents) not
`in a ”system”, per se. Because prior art systems lack any inherent ability to allow
`for information to flow freely to enable buyers and sellers to react to changing
`market conditions. The present invention can co-exist with these ”trusted
`systems” to the extent that all market participants in a given industry have
`relatively similar information with which to price value-added data.
`The
`improvement over such systems, however, addresses a core features in most
`data—added value markets: predictions, forecasts, and speculation over the value
`of information is largely a unsuccessful activity for buyers and sellers alike. The
`additional improvement is the ability to maintain security even with unsecure or
`legacy versions of value-added information available to those who seek choices
`that fit less quantitative criteria—“aesthetic quality” of the information versus
`265112
`
`-6-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0008
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0008
`
`
`
`
`
`"it?'[Liiilililiiii
`
`
`
`2::re‘EiiiiJJIIZiiis.is:itii}:
`
`
`
`
`
`iii]!till'ilii
`
`”commercial price”. Purchase or transaction decisions can be made first by
`authenticating an electronic version of a song, image, video, trademark, stamp,
`currency, etc.
`Additional anticipated improvements include the ability to support
`varying pricing models such as auctions that are difficult or impossible to
`accomplish under existing prior art that leaves all access and pricing control with
`the seller alone, and the separation of the transaction from the exchange of the
`value-added information, which gives more control
`to buyers over
`their
`identities and purchasing habits, (both sensitive and separately distinct forms of
`”unrelated” value—added information). Essentially, no system known in the art
`allows for realistic protocols to establish trust between buyers and sellers in a
`manner more closely reflecting actual purchasing behavior of consumers and
`changing selling behavior of sellers. The goal in such transactions is the creation
`of trust between parties as well as ”trusted relationships” with those parties. The
`present invention is an example of one such system for media content where the
`”aesthetic” or ”gestalt” of the underlying content and its characteristics is a
`component of buying habits. Without an ability to open distribution systems to
`varying buyers and sellers, media content may be priced at less than maximum
`economic value and buyers may be deprived of a competitive, vigorous
`marketplace
`for
`exciting media
`content
`from many different creative
`participants.
`To the extent that recognition plays such a key role in an information
`economy, value—added data should be as accessible as possible to the highest
`number of market participants in the interests of furthering creativity and
`building a competitive marketplace for related goods and services. This is to the
`benefit of both buyers and sellers as well as the other participants in such an
`economic ecosystem, The Internet and other transmission-based transactions
`with unknown parties presents a number of chailenges to information vendors
`who wish to deveIOp customer relations,
`trust and profitable sales.
`The
`information economy is largely an anonymous marketplace,
`thus, making it
`much more difficult to identify consumers and sellers. The present invention
`provides remedies to help overcome these weaknesses.
`The present invention is concerned with methods and systems which
`enable secure, paid exchange of value-added information, while separating
`transaction protocols. The present invention improves on existing means for
`distribution control by relying on authentication, verification and authorization
`that may be flexibly determined by both buyers and sellers.
`These
`determinations may not need to be predetermined, although pricing matrix and
`variable access to the information opens additional advantages over the prior art.
`The present invention offers methods and protocols for ensuring value-added
`information distribution can be used to facilitate trust in a large or relatively
`anonymous marketplace (such as the Internet’5 World Wide Web).
`
`26.5112
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0009
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0009
`
`
`
`
`
`We now define components of the preferred embodiments for methods,
`systems, and devices.
`
`Definitions:
`
`Local Content Server (LCS): A device or software application which can
`securely store a collection of value-added digital content. The LCS has a unique
`ID.
`
`Secure Electronic Content Distributor (SECD): An entity, device or
`software application which can validate a transaction with a LCS, process a
`payment, and deliver digital content securely to a LCS.
`In cryptographic terms,
`the SECD acts as a “certification authority” or its equivalent. SECDs may have
`differing arrangements with consumers
`and providers of value—added
`information.
`
`Satellite Unit (SU): A portable medium or device which can accept secure
`digital content from a LCS through a physical, local connection and which can
`either play or make playable the digital content. The SU may have other
`functionality as it relates to manipulating the content, such as recording. The SU
`has a unique ID.
`LCS Domain: A secure medium or area where digital content can be
`stored, with an accompanying rule system for transfer of digital content in and
`out of the LCS Domain.
`
`SecureChannelm: A secure channel to pass individualized content to
`differentiate authentic content from legacy or unauthorized, pirated content.
`SecureChannel may carry a value—adding component (VAC).
`Standard Quality: A transfer path into the LCS Domain which maintains
`the digital content at a predetermined reference level or degrades the content if it
`is at a higher quality level. In an audio implementation, this might be defined as
`Red Book CD Quality (44100 Hz., 16 bits, 2 channels).
`Low Quality: A transfer path into the LCS Domain which degrades the
`digital content to a sub—reference level.
`In an audio implementation, this might
`be defined as below CD Quality (for instance, 32000 Hz., 16 bits, 2 channels).
`High Quality: A transfer path into the LCS Domain which allows digital
`content of any quality level to pass unaltered.
`Rewritable Media: An mass storage device which can be rewritten (e.g.
`hard drive, CD—RW, Zip cartridge, M-O drive, etc. . .).
`Read-Only Media: A mass storage device which can only be written once
`(e.g. CID-ROM, CD—R, DVD, DVD-R, etc...) Note: pre-recorded music, video,
`software, or images, etc. are all ”read only” media.
`Unique ID: A Unique ID is created for a particular transaction and is
`unique to that transaction (roughly analogous to a human fingerprint). One
`way to generate a Unique ID is with a one-way hash function. Another way is
`by incorporating the hash result with a message into a signing algorithm will
`create a signature scheme. For example, the hash result may be concatenated
`265112
`
`-3”
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0010
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0010
`
`
`
`
`
`to the digitized, value added information which is the subject of a transaction.
`Additional uniqueness may be observed in a hardware device so as to
`differentiate that device, which may be used in a plurality of transactions,
`from other similar devices.
`
`Value-added: Value-added information is differentiated from non-
`commoditized information in terms of its marketability or demand, which can
`vary, obviously, from each market that is created for the information. By way
`of example, information in the abstract has no value until a market is created
`for the information (i.e., the information becomes a commodity). The same
`information can be packaged in many different forms, each of which may have
`different values. Because information is easily digitized, one way to package
`the "same” information differently is by different levels of fidelity and
`discreteness. Value is typically bounded by context and consideration.
`Authentication: A receiver of a ”message” (embedded or otherwise
`within the value-added information) should be able to ascertain the original of
`the message (or by effects, the origin of the carrier within which the message is
`stored). An intruder should not be able to successfully represent someone else.
`Additional functionality such as Message Authentication Codes (MAC) could be
`incorporated (a one-way hash function with a secret key) to ensure limited
`verification or subsequent processing of value-added data.
`Verification:
`In cryptographic terms, ”verification” serves the “integrity”
`function to prevent an intruder from substituting false messages for legitimate
`ones. In this sense, the receiver of the message (embedded or otherwise present
`within the value-added information) should be assured that the message was not
`modified or altered in transit.
`
`One way hash function: One-way hash functions are known in the art.
`The way in which the hash is generated is defined in such a way that does not
`depend on the characteristics of the input, though certainly the hash function
`can operates on in an input signal. The output is a hash value which is not
`secret, but it is computationally unfeasible to determine the pre-image that
`hashes to the hash value.
`
`Authorization: A term which is used broadly to cover the acts of
`conveying official sanction, permitting access or granting legal power to an
`entity.
`
`For non digitally-sampled data, encryption is data
`Encryption:
`scrambling using keys. For value-added or information rich data with content
`characteristics, encryption is typically slow or inefficient because content file
`sizes tend to be generally large. Encrypted data is called ”ciphertext”.
`to
`refers
`Scrambling:
`For
`digitally~sampled
`data,
`scrambling
`manipulations of the value-added or information rich data at the inherent
`granularity of the file format. The manipulations are associated with a key,
`which may be made cryptographically secure or broken into key pairs.
`Scrambling is efficient for larger media files and can be used to provide content
`in less than commercially viable or referenced quality levels. Scrambling is not
`265112
`
`-9-
`
`DISH-Blue Spike-246
`
`Exhibit 1012, Page 0011
`
`DISH-Blue Spike-246
`Exhibit 1012, Page 0011
`
`
`
`
`
`these applications, but provide more fitting
`as secure as encryption for
`manipulation of media rich content in the context of secured distribution.
`Scrambled data is also called ”ciphertext” for the purposes of this invention.
`Encryption generally acts on the data as a whole, whereas scrambling is
`applied often to a particular subset of the data concerned with the granularity
`of the data, for instance the file formatting. The result is that a smaller amount
`of data is “encoded” or "processed” versus strict encryption, where all of the
`data is “encoded" or ”processed.” By way of example, a cable TV signal can he
`scrambled by altering the signal which provides for horizontal and vertical
`tracking, which would alter only a subset of the data, but not all of the data—
`which is why the audio signal is often untouched. Encryption, however,
`would generally so alter the data that no recognizable signal would be
`perceptually appreciated. Further, the scrambled data can be compared with
`the unscrambled data to yield the scrambling key. The difference with
`encryption is that the ciphertext is not completely random,
`that is,
`the
`scrambled data is still perceptible albeit in a lessened quality. Unlike
`watermarking, which maps a change to the data set, scrambling is a transfer
`function which does not alter or modify the data set.
`
`Detailed Discussion of Invention
`The LCS Domain is a logical area inside which a set of rules governing
`content use can be strictly enforced.
`The exact rules can vary between
`implementations, but in general, unrestricted access to the content inside the LCS
`Domain is disallowed. The LCS Domain has a set of paths which allow content
`to enter the domain under different circumstances. The LCS Domain also has
`paths which allow the content to exit the domain.
`The act of entering the LCS Domain includes a verification of the content
`(an authentication check). Depending upon the source of the content, such
`verification may be easier or harder. Unvalidateable content will be