throbber
U.S. PTO
`1 1I895388
`08/24/2007
`
`Under the Pa - -
`
`PTO/53105 (07—07)
`Approved for use through 06B0l2010 OMB 0651-0032
`U.S. Patent and Trademark Office. U.5. DEPARTMENT OF COMMERCE
`
`
` Em... Mannheim—
`
`UTILITY
`PATENT APPLICATION
`TRANSMITTAL
`(Only fornew nmpruvisr'onal applirzlions under 37 CFR 1.53(b))
`
`First Inventor
`
`Scott MOSKOW'TZ
`Data Protection Method and Device
`
`APPLICATION ELEMENTS
`See MP3? chapter 600 concern/nu utility patenl app/hath" mutants.
`
`ADDRESS TO:
`
`Commissioner for Patients
`P.O. Box 1450
`Alexandria VA 22313-1450
`
`OM0
`
`‘!
`\l
`
`O .
`
`C
`F”
`.0
`.4
`0
`
`
`
`1.
`2.
`
`3,
`
`Fee Transmittal Form (8.9., PTO/SB/17)
`(Submit an original and a dupliwte for fee processing)
`Applicant claims small entity status.
`See 37 CFR 1.27.
`[Total Pages
`Specification
`Both the daims and abstract must start on a new page
`(For infomretbn on lire wafer-red arrangement, see MPEP 6011mm)
`4.. Drawing(s) (35 U.S.C. 113)
`[Total Sheets
`1
`5. Oath or Declaration
`[Total Sheets
`3. - Newly executed (original or copy)
`b. I A copy from a prior appliwtlon (37 CFR 1.63(d))
`for continuation/divisional with Box 18 completed)
`QELEI 9” GE NyfiflTOflSl
`Signed statement attached deleting invantor(s)
`name in the prior appiimtion, see 37 CFR
`1.63(d)(2) and 1.330)).
`
`
`
`1.
`
`9. D Assignment Papers (cover sheet & document(s))
`Name of Assignee
`
`10. E] 37 CFR 3.13m) Statement
`(when there Is an assignee)
`
`Power at
`Attorney
`
`11. B English Translation Document (if applicable)
`
`12. El IntoETtion- Disclosure Statement (PTO/SBIua or PT01449)
`Copies of citations attached
`
`6. [Z] Applimtbn om Sheet. See 37 CFR't .76
`
`7. E] CD-ROM or CD-R in duplicate, Iarge table or
`outer Program (Appendix)
`Landsmpe Table on CD
`
`8. Nucleotide and/or Amino Acid Sequence Submission
`(i! ap licable, items a. — c. are required)
`a.
`Computer Readable Form (CRF)
`b.
`Specification Sequence Listing on:
`
`13.
`
`Preliminary Amendment
`
`14. I Return Receipt Postcard (MPEP 503)
`(Should be specifically item/zed)
`
`Certified Copy of Priority Document(s)
`0f foreign priority is claimed)
`
`16.
`
`Nonpublication Request under 35 U.S.C. 122(b)(2)(B)(i).
`Applicant must attach form PTO/SBI35 or equivalent.
`
`. CI CD—ROMorCD—R(2oopies); or
`ii. E]
`Paper
`
`17. D Other:
`
`c, D Statements verifying identity of above copies
`18. If a CONTINUING APPLICATION. check appropriate box, and supply the requisite infon‘nation below and in the first sentence of the
`specification follom'ng fire title, or in an Application Data Sheet under 37 CFR 1.76:
`
`D Continuation
`Prior appfrmtion inhnnation:
`
`- Divisional
`I: Continuation-Import (CIP)
`Examiner Laurel MSHQ I
`19. CORRESPONDENCE ADDRESS
`
`of prior application No;
`Art Unit:
`2
`
`DThe address assoolated withCustomer NumberE OR I correspondenceaddress below
`w Scamsmwm
`16711 Collins Avenue #2505
`
`_ Sunnymeam m_ zncane
`__ ennnnen
`2059569041
`-
`'7".
`_—:"r'
`Print/T p —
`This coliedion of Information Is required by 37 CFR 1.53m). The information Is required to obtain or retain a benefit by the public which is to file (and by the
`USPTO to pm) an appliwtion. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 12 minutu to
`complete, including gathering. preparing. and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any
`comments on the amount of time you require to complete this form and/or suogestions for reducing this burden, should be sent to the Chief lnfonnation Officer,
`U.S. Patent and Trademark Office, U.S. Department of Commerce, PO. Box 1450, Alexandria. VA 22313-1450. DO NOT SEND FEES OR COMPLETED
`FORMS TO THIS ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1451), Alexandria, VA 22313-1450.
`ifyou need assistance in completing the form, call l-800-PTO—9199 and select option 2.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0001
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0001
`
`

`

`
`
`PTO/SB!" (07—07)
`Approved for use through 06/30/2010. 0MB 0651-0032
`U.S. Patent and Trademark Oflice; U.S. DEPARTMENT OF COMMERCE
`'
`, nder the Pa-enuork Reduction Act at 1995 no -ersons are re - uired to resend to a collection of information unless it dis-la s a valid OMB control number
`
`Complete if Known
`
`
`
`,
`
`
`
`
`
`
`
`Eifectivo on 12/ow2004.
`.
`'
`
`Eras pursuant to the Consolidated Appropriations Act, 2005 (H.R. 4818).
`O |
`.. FEE TRANSMITTAL—m
`
`For FY 2007
`ScottAMOSKOWITZ
`
`__
`
`n
`Art U It _
`Applicant claims small entity status. See 37 CFR 1.27
`Tom AMOUNT 0.: PAYMENTm 80391000300er
`METHOD OF PAYMENT check all that a: I
`
`
`
`Credit Card l:lMoney Order D None D Other (please identity):
`l:l Cheek
`
`I: Deposit Accomt Daposit Account Number:
`Deposit Account Name:
`For the above-identified deposit account, the Director is hereby authorized to: (check all that apply)
`
`[I Charge fee(s) indicated below, except for the filing fee
`EIGharge fee(S) Indicated below
`Charge any additional fee(s) or underpayments of fee(s) D Credit any overpayments
`under 37 CFR 1.16 and 1.17
`WARNING: Information on this form may become public. Credit card information should not be included on this form. Provide credit card
`Information and authorization on PTO-2038.
`FEE CALCULATION
`
`1. BASIC FILING, SEARCH, AND EXAMINATION FEES
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`EXAMINATION FEES
`SEARCH FEES
`FILINGSFEE|S ti
`t1
`Sm II Emit!
`Sm I| Eng]!
`In IE1]
`fee |§I Elfin M Faee Iii M @151
`300
`150
`500
`250
`200
`100
`200
`100
`100
`50
`130
`65
`200
`100
`300
`150
`160
`80
`300
`150
`500
`250
`600
`300
`200
`100
`0
`0
`0
`0
`
`Mpl‘rcagon Tm;
`Utility
`Design
`Plant
`Reissue
`Provisional
`2. EXCESS CLAIM FEES
`Mauritian
`Each claim over 20 (including Reissues)
`Each independent claim over 3 (including Reissues)
`Multiple dependent claims
`
`Fee
`Extra Claims
`Total Claims
`x
`I I
`2 I
`- 20 or HP:
`HP = highest number of total claims paid tor. if greater than 20.
`
`lFee Pald (fl
`23:5 -
`
`Fees Eaig (51
`gm
`
`MEI]!!!
`Betti m
`50
`25
`200
`100
`360
`180
`
`Multiple Degndent Claims
`Fee 1;]
`Fee Paid 1;]
`
`Th qq'Sg—D-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4. OTHER FEE(S)
`
`
`$130 fee (no small entity discount)
`Non-English Specification,
`
`
`Other (e.g., late filing surcharge):
`
`SUBMITTED 1 Y
`,
`
`
`‘
`.—
`.
`Registration No.
`_-£LM Amine /A_ent
`Telephone 30_ 956 904‘
`_
`mm... s mosxowwz
`«2007 24
`This collection of information is required by 37 CFR 1.136. The information is required to obtain or retain a benefit by the public which is to file (and by the
`USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 30 minutes to complete,
`including gathering, preparing. and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments
`on the amount at time you require to complete this form and/or suggestions for reducing this burden. should be sent to the Chiet lntormation Otficer. U.S. Patent
`and Trademark Office. U.S. Department of Commerce. PO. Box 1450. Alexandria. VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS
`ADDRESS. SEND TO: Commissioner for Patents, PO. Box 1450, Alexandria. VA 22313-1450.
`Ifyou need assistance In completing the form, call 1-800-PTO-9199 and select option 2.
`
`"Ides
`
`a.m-siiorHP = wX fl= jfim
`
`r. r greater than 3.
`
`to
`
`HP = highest number of independent claims paid
`3. APPLICATION SIZE FEE .
`If the specification and drawmgs exceed [00 sheets of paper (excluding electronically filed sequence or computer
`listings under 37 CFR l.52(e)), the application size fee due is $250 ($125 for small entity) for each additional 50
`sheets or fi’action thereof. Sec 35 U.S.C. 41:3)(1)(G) and 37 CFR 1.16:5).
`t e eo
`Total Sheets W e o e c
`ddI
`al
`0
`at
`- 100 =
`lat) =
`(round up to a whole number)
`x
`
`fee [5]
`
`Eee Paid l§l
`
`
`
`Fees paid (Q
`
`
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0002
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0002
`
`

`

`DATA PROTECTION METHOD AND DEVICE
`
`CROSS-REFERENCE TO RELATED APPLICATIONS
`
`[0001] This application is a divisional of U.S. Patent Application Serial No. 10/602,777, which
`
`is a continuation application of U.S. Patent Application Serial No. 09/046,627 (which
`
`issued July 22, 2003, as U.S. Patent No. 6,598,162), which is a continuation-in-part of
`
`U.S. Patent Application Serial No. 08/587,943, filed Jan. 17, 1996, (which issued April
`28, 1998, asiU.S. Patent No. 5,745,943). The entire disclosure of U.S. Patent Application
`
`No. 09/046,627 (which issued July 22, 2003, as U.S. Patent No. 6,598,162) and U.S.
`
`Patent Application Serial No. 08/587,943, filed Jan. 17, 1996, (which issued April 28,
`
`1998, as U.S. Patent No. 5,745,943) are hereby incorporated by reference in their
`
`entireties.
`
`FIELD OF THE INVENTION
`
`[0002] The invention relates to the protection of digital
`
`information. More particularly, the
`
`invention relates to a method and device for data protection.
`
`[0003] With the advent of computer networks and digital multimedia, protection of intellectual
`
`property has become a prime concern for creators and publishers of digitized copies of
`
`copyrightable works, such‘as musical recordings, movies, video games, and computer.‘
`software. One method of protecting copyrights in the digital domain is to use "digital
`watermarks. "
`
`[0004] The prior art
`
`includes copy protection systems attempted at many stages in, the
`
`development of the software industry. These may be various methods by which a
`
`software engineer can write the software in a clever manner to determine if it has been
`
`copied, and if so to deactivate itself. Also included are undocumented changes to the
`
`storage format of the content. Copy protection was generally abandoned by the software
`
`industry, since pirates were generally just as clever as the software engineers and figured
`
`out ways to modify the software and deactivate the protection. The cost of developing
`
`such protection was not justified considering the level of piracy which occurred despite
`
`the copy protection.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0003
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0003
`
`

`

`[0005] Other methods for protection of computer software include the requirement of entering
`
`certain nummrs or facts that may be included in a packaged software's manual, when
`
`prompted at start-up. These may be overcome if copies of the manual are distributed to
`
`unintended users, or by patching the code to bypass these measures. Other methods
`
`include requiring a user to contact
`
`the software vendor and to receive "keys" for
`
`unlocking software after registration attached to some payment scheme, such as credit
`
`card authorization. Further methods include network-based searches of a user's hard drive
`
`and comparisons between what is registered to that user and what is actually installed on
`
`the user's general computing device. Other proposals, by such parties as AT&T's Bell
`
`Laboratories, use "kerning" or actual distance in pixels,
`
`in the rendering of text
`
`documents, rather than a varied number of ASCII characters. However, this approach can
`
`often be defeated by graphics processing analogous to sound processing, which
`
`randomizes that information. All of these methods require outside determination and
`
`verification of the validity of the software license.
`
`[0006] Digital watermarks can be used to mark each individual copy of a digitized work with
`
`information identifying the title, copyright holder, and even the licensed owner of a
`
`particular copy. When marked with licensing and ownership information, responsibility is
`
`created for individual copies where before there was none. Computer application
`
`programs can be watermarked by watermarking digital content resources used in
`
`conjunction with images or audio data Digital watermarks can be encoded with random
`
`or pseudo random keys, which act as secret maps for locating the watermarks. These keys
`
`make it impossible for a party to find the watermark without having the key. In addition,
`
`the encoding method can be enhanced to force a party to cause damage to a watermarked
`
`data stream when trying to erase a random-key watermark. Other information is disclosed
`
`in "Technology: Digital Commerce", Denise Caruso, New York Times, Aug. 7, 1995;
`
`and "Copyrightingj in the Information Age", Harley Ungar, ONLINE MARKETPLACE,
`
`September 1995, Jupiter Communications.
`
`[0007] Additionally, other methods for hiding information signals in content signals, are
`
`disclosed in US. Pat. No. 5,319,735--Preuss et a]. and US. Pat. No. 5,379,345--
`
`Greenberg.
`
`[0008] It is desirable to use a "stega-cipher" or watermarking process to hide the necessary parts
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0004
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0004
`
`

`

`or resources of the executable object code in the digitized sample resources. It is also
`
`desirable to further modify the underlying structure of an executable computer
`
`application such that it is more resistant to attempts at patching and analysis by memory
`
`capture. A computer application seeks to provide a user with certain utilities or tools, that
`
`is, users interact with a computer or similar device to accomplish various tasks and
`
`applications provide the relevant interface. Thus, a level of authentication can also be
`
`introduced into software, or "digital products," that include digital content, such as audio,
`
`video, pictures or multimedia, with digital watermarks. Security is maximized because
`
`erasing this code watermark without a key results in the destruction of one or more
`
`essential parts of the underlying application, rendering the "program" useless to the
`
`unintended user who lacks the appropriate key. Further, if the key is linked to a license
`
`code by means of a mathematical function, a mechanism for identifying the licensed
`
`owner of an application is created.
`
`[0009] It is also desirable to randomly reorganize program memory structure intermittently
`
`during program run time, to prevent attempts at memory capture or object code analysis
`
`aimed at eliminating licensing or ownership information, or otherwise modifying, in an
`
`unintended manner, the functioning of the application.
`
`[0010] In this way, attempts to capture memory to determine underlying functionality or provide
`
`a "patc "
`
`to facilitate unauthorized use of the "application," or computer program,
`
`without destroying the functionality and thus usefiilness of a copyrightable computer
`
`program can be made difficult or impossible.
`
`[0011] It is thus the goal of the present invention to provide a higher level of copyright security
`
`to object code on par with methods described in digital watermarking systems for
`
`digitized media content such as pictures, audio, video and multimedia content in its
`
`multifarious forms, as described in previous disclosures, "Steganographic Method and
`
`Device" Ser. No. 08/489,172, filed Jun. 7, 1995, now US. Pat. No. 5,613,004, and
`
`"Human Assisted! Random Key Generation and Application for Digital Watermark
`
`System", Ser. No. 08/587,944, filed on Jan. 17, 1996, the disclosure of which is hereby
`
`incorporated by reference.
`
`[0012] It is a further goal of the present invention to establish methods of copyright protection
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0005
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0005
`
`

`

`that can be combined with such schemes as software metering, network distribution of
`
`code and specialized protection of software that is designed to work over a network, such
`
`as that proposed by Sun Microsystems in their HotJava browser and Java programming
`
`language, and manipulation of application code in proposed distribution of documents
`
`that can be exchanged with resources or the look and feel of the document being
`
`preserved over a network. Such systems are currently being offered by companies
`
`including Adobe, with their Acrobat software. This latter goal is accomplished primarily
`
`by means of the watermarking of font, or typeface, resources included in applications or
`
`documents, which determine how a bitmap representation of the document is ultimately
`
`drawn on a presentation device.
`
`[0013] The present invention includes an application of the technology of "digital watermarks."
`
`As described in previous disclosures, "Steganographic Method and Device" and "Human
`
`Assisted Random Key Generation and Application for Digital Watermark System,"
`
`watermarks are particularly suitable to the identification, metering, distributing and
`
`authenticating digitized content such as pictures, audio, video and derivatives thereof
`
`under the description of "multimedia content." Methods have been described for
`
`combining both cryptographic methods, and steganography, or hiding something in plain
`
`view. Discussions of these technologies can be found in Applied Cryptography by Bruce
`
`Schneier and The Code Breakers by David Kahn. For more information on prior art
`public-key cryptosystems see U.S. Pat. No. 4,200,770 Diffle-ilellman, U.S. Pat. No.
`
`4,218,582 Hellman, U.S. Pat. No. 4,405,829 RSA, U.S. Pat. No. 4,424,414 Hellman
`
`Pohlig. Computer code, or machine language instructions, which are not digitized and
`
`have zero tolerance for error, must be protected by derivative or alternative methods,
`
`such as those disclosed in this invention, which focuses on watermarking with "keys"
`
`derived from license codes or other ownership identification information, and using the
`
`watermarks encoded with such keys to hide an essential subset of the application code
`resources.
`
`BACKGROUND OF THE INVENTION
`
`[0014] Increasingly, commercially valuable information is being created and stored in "digital"
`
`form. For example, music, photographs and video can all be stored and transmitted as a
`
`series of numbers, such as 1's and 0's. Digital techniques let the original information be
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0006
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0006
`
`

`

`recreated in a very accurate manner. Unfortunately, digital
`
`techniques also let
`
`the
`
`information be easily copied without the information owner‘s permission.
`
`[0015] Because unauthorized copying is clearly a disincentive to the digital distribution of
`
`valuable information, it is important to establish responsibility for copies and derivative
`copies ‘of such works. For example, if each authorized digital copy of a popular song is
`
`identified with a unique number, any unauthorized copy of the song would also contain
`
`the number. This would allow the owner of the information, such as a song publisher, to
`
`investigate who made the unauthorized copy. Unfortunately, it is possible that the unique
`
`number could be erased or altered if it is simply tacked on at the beginning or end of the
`
`digital information.
`
`[0016] As will be described, known digital "watermark" techniques give creators and publishers
`
`of digitized multimedia content localized, secured identification and authentication of
`
`that content. In considering the various forms of multimedia content, such as "master,"
`
`stereo, National Television Standards Committee (NTSC) video, audio tape or compact
`
`disc, tolerance of quality will vary with individuals and affect the underlying commercial
`
`and aesthetic value of the content. For example, if adigital version of a popular song
`
`sounds distorted,
`
`it will be less valuable to users. It is therefore desirable to embed
`
`copyright, ownership or purchaser information, or some combination of these and related
`
`data, into the content in a way that will damage the content if the watermark is removed
`
`without authorization.
`
`[0017] To achieve these goals, digital watermark systems insert ownership information in a way
`
`that causes little or no noticeable effects, or "artifacts," in the underlying content signal.
`
`For example, if a digital watermark is inserted into a digital version of a song, it is '
`
`important that a listener not be bothered by the slight changes introduced by the
`
`watermark. It is also important for the watermark technique to maximize the encoding
`
`level and "location sensitivity" in the signal to force damage to the content signal when
`
`removal is attempted. Digital watermarks address many of these concerns, and research
`
`in the field has provided extremely robust and secure implementations.
`
`[0018] What has been overlooked in many applications described in the art, however, are
`
`systems which closely mimic distribution of content as it occurs in the real world. For
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0007
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0007
`
`

`

`instance, many watermarking systems require the original un-watermarked content signal
`
`to enable detection or decode operations. These include highly publicized efforts by
`
`NEC, Digimarc and others. Such techniques are problematic because, in the real world,
`
`original master copies reside in a rights holders vaults and are not readily available to the
`
`public.
`
`[0019] With much activity overly focused on watermark survivability, the security of a digital
`
`watermark is suspect. Any simple linear operation for encoding information into a signal
`
`may be used to erase the embedded signal by inverting the process. This is not a difficult
`
`task, especially when detection software is a plug-in freely available to the public, such as
`
`with Digimarc. In general, these systems seek to embed cryptographic information, not
`
`cryptographically embed information into target .media content.
`
`[0020] Other methods embed ownership information that is plainly visible in the media signal,
`
`such as the method described in U.S. Pat. No. 5,530,739 to Braudaway et al. The system
`
`described in Braudaway protects a digitized image by encoding a visible watermark to
`
`deter piracy. Such an implementation creates an immediate weakness in securing the
`
`embedded information because the watermark is plainly visible. Thus, no search for the
`
`embedded signal is necessary and the watermark can be more easily removed or altered.
`
`For example, while certainly useful to some rights owners, simply placing the symbol
`
`“©" in the digital
`
`information would only provide limited protection. Removal by
`
`adjusting the brightness of the pixels forming the "©" would not be difficult with respect
`
`to the computational resources required.
`
`[0021] Other relevant prior art includes U.S. Pat. No. 4,979,210 and 5,073,925 to Nagata et al.,
`
`which encodes information by modulating an audio signal in the amplitude/time domain.
`
`The modulations introduced in the Nagata process carry a "copy/don't copy" message,
`
`which is easily found and circumvented by one skilled in the art. The granularity of
`
`encoding is fixed by the amplitude and frequency modulation limits required to maintain
`
`inaudibility. These limits are relatively low, making it impractical
`
`to encode more
`
`information using the Nagata process.
`
`[0022] Although U.S. Pat. No. 5,661,018 to Leighton describes a means to prevent collusion
`
`attacks in digital watermarks, the disclosed method may not actually provide the security
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0008
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0008
`
`

`

`described. For-example,
`
`in cases where the watermarking technique is linear,
`
`the
`
`"insertion envelope" or "watermarking space" is well-defined and thus susceptible to
`
`attacks less sophisticated than collusion by unauthorized parties. Over-encoding at the
`
`watermarking encoding level is but one simple attack in such linear implementations.
`
`Another consideration not made by Leighton is that commercially—valuable content may
`
`already exist in a un-watermarked form somewhere, easily accessible to potential pirates,
`
`gutting the need for any type of collusive activity. Digitally signing the embedded signal
`
`with preprocessing of watermark data is more likely to prevent successful collusion.
`
`Furthermore, a "baseline" watermark as disclosed is quite subjective. It
`
`is simply
`
`described elsewhere in the art as the "perceptually significan " regions of a signal.
`
`Making a watermarking function less linear or inverting the insertion of watermarks
`
`would seem to provide the same benefit without the additional work required to create a
`
`"baseline" watermark. Indeed, watermarking algorithms should already be capable of
`
`defining a target insertion envelope or region without additional steps. What is evident is
`
`the Leighton patent does not allow for initial prevention of attacks on an embedded
`
`watermark as the content is visibly or audibly unchanged.
`
`[0023] It is also important that any method for providing security also fimction with broadcasting
`
`media over networks such as the Internet, which is also referred to as "streaming."
`
`Commercial
`
`"plug-in" products
`
`such as RealAudio and RealVideo, as well as
`
`applications by vendors VDONet and Xtreme,
`
`are common in such network
`
`environments. Most digital watermark implementations focus on common file base
`
`signals and fail to anticipate the security of streamed signals. It is desirable that any
`
`protection scheme be able to function with a plug-in player without advanced knowledge
`
`of the encoded media stream.
`
`[0024] Other technologies focus solely on file-based security. These technologies illustrate the
`
`varying applications for security that must be evaluated for different media and
`
`distribution environments. Use of cryptolopes or cryptographic containers, as proposed
`by IBM in its Cryptolope product, and InterTrust, as described in U.S. Pat. Nos.
`
`4,827,508, 4,977,594, 5,050,213 and 5,410,598, may discourage certain forms of piracy.
`
`Cryptographic containers, however, require a user to subscribe to particular decryption
`
`software to decrypt data. IBM's InfoMarket and InterTrust‘s DigiBox, among other
`
`implementations, provide a generalized model and need proprietary architecture to
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0009
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0009
`
`

`

`function. Every user must have a subscription or registration with the party which
`
`encrypts the data. Again, as a form of general encryption, the data is scrambled or
`
`encrypted without regard to the media and its formatting. Finally, control over copyrights
`
`or other neighboring rights is left with the implementing party,
`
`in this case, IBM,
`
`InterTrust or a similar provider.
`
`[0025] Methods similar to these "trusted systems" exist, and Cerberus Central. Limited and
`
`Liquid Audio, among a number of companies, offer systems which may functionally be
`
`thought of as subsets of IBM and InterTrust's more generalized security offerings. Both
`
`Cerberus and Liquid Audio propose proprietary player software which is registered to the
`
`user and "locked" in a manner parallel to the locking of content that is distributed via a
`
`cryptographic container. The economic trade-off in this model is that users are required to
`
`use each respective companies' proprietary player to play or otherwise manipulate content
`that is downloaded. If, as is the case presently, most music or other media is not available
`
`via these proprietary players and more companies propose non-compatible player
`
`formats, the proliferation of players will continue. Cerberus and Liquid Audio also by
`
`way of extension of their architectures provide for "near-CD quality" but proprietary
`
`compression. This requirement stems from the necessity not to allow content that has
`
`near-identical data make-up to an existing consumer electronic standard, in Cerberus and
`
`Liquid Audio's case the so-called Red Book audio CD standard of 16 bit 44.1 kHz, so
`
`that comparisons with the proprietary file may not yield how the player is secured.
`
`Knowledge of the player's file format renders its security ineffective as a file may be
`
`replicated and played on any common player, not the intended proprietary player of the
`
`provider of previously secured and uniquely formatted content. This is the parallel
`
`weakness to public key crypto-systems which have gutted security if enough plain text
`
`and cipher text comparisons enable a pirate to determine the user's private key.
`
`[0026] Many approaches to digital watermarking leave detection and decoding control with the
`
`implementing party of the digital watermark, not the creator of the work to be protected.
`
`A set of secure digital watermark implementations address this fimdamental control issue
`
`forming the basis of key-based approaches. These are covered by the following patents
`
`and pending applications, the entire disclosures of 'which are hereby incorporated by
`
`reference: US. Pat. No. 5,613, 004 entitled "Steganographic Method and Device" and its
`
`derivative US. patent application Ser. No. 08/775,216 (which issued November 11, 1997,
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0010
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0010
`
`

`

`as U.S. Patent No. 5,687,236), U.S. patent application Ser. No. 08/587,944 entitled
`
`"Human Assisted Random Key Generation and Application for Digital Watermark
`
`System"(which issued October 13, 1998, as U.S. Patent No. 5,822,432), U.S. patent
`
`application Ser. No. 08/587,943 entitled "Method for Stega-Cipher Protection of
`
`Computer Code"(which issued April 28, 1998, as U.S. Patent No. 5,748,569), U.S.
`
`patent application Ser. No. 08/677,435 entitled "Optimization Methods for the Insertion,
`
`Protection, and Detection of Digital Watermarks in Digitized Data"(which issued March
`
`30, 1999, as U.S. Patent No. 5,889,868) and U.S. patent application Ser. No. 08/772,222
`
`entitled "Z-Transform Implementation of Digital Watermarks"(which issued June 20,
`
`2000, as U.S. Patent No. 6,078,664). Public key crypto-systems are described in U.S. Pat.
`
`No. 4,200,770, 4,218,582, 4,405,829 and 4,424,414, the entire disclosures of which are
`
`also hereby incorporated by reference.
`
`[0027] In particular, an improved protection scheme is described in "Method for Stega—Cipher
`
`Protection of Computer Code," U.S. patent application Ser. No. 08/587,943 (which issued
`
`April 28, 1998, as U.S. Patent No. 5,748,569). This technique uses the key—based
`
`insertion of binary executable computer code within a content signal that is subsequently,
`
`and necessarily, used to play or otherwise manipulate the signal in which it is encoded.
`
`With this system, however, certain computational requirements, such as one digital player
`
`per digital copy of content, may be necessitated. For instance, a consumer may download
`
`many copies of watermarked content. With this technique,
`
`the user would also be
`
`downloading as many copies of the digital player program. While this form of security
`
`may be desirable for some applications, it is not appropriate in many circumstances.
`
`[0028] Finally, even when digital information is distributed in encoded form, it may be desirable
`
`to allow unauthorized users to play the information with a digital player, perhaps with a
`
`reduced level of quality. For example, a popular song may be encoded and freely
`
`distributed in encoded form to the public. The public, perhaps using commonly available
`
`plug-in digital players, could play the encoded content and hear the music in some
`
`degraded form. The music may-sound choppy, or fuzzy or be degraded in some other
`
`way. This lets the public decide, based on the available lower quality version of the song,
`
`if they want to purchase a key from the publisher to decode, or "clean—up," the content.
`
`Similar approaches could be used to distribute blurry pictures or low quality video. Or
`
`even "degraded" text, in the sense that only authenticated portions of the text can be
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 0011
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 0011
`
`

`

`determined with the predetermined key or a validated digital signature for the intended
`
`message.
`
`[0029] In view of the foregoing, it can be appreciated that a substantial need exists for a method
`
`allowing encoded content to be played, with degraded quality, by a plug-in digital player,
`
`and solving the other problems discussed above.
`
`SUMMARY OF THE INVENTION
`
`[0030] The disadvantages of the art are alleviated to a great extent by a method for combining
`
`transfer
`
`functions with predetermined key creation.
`
`In one embodiment, digital
`
`information,
`
`including a digital
`
`sample and format
`
`information,
`
`is protected by
`
`identifying and encoding a portion of the format
`
`information. Encoded digital
`
`information,
`
`including the digital sample and the encoded format
`
`information,
`
`is
`
`generated to protect the original digital information.
`
`[0031] In another embodiment, a digital signal, including digital samples in a file format having
`
`an inherent granularity, is protected by creating a predetermined key. The predetermined
`
`key is comprised of a transfer function—based mask set to manipulate data at the inherent
`
`granularity of the file format of the underlying digitized samples.
`
`[0032] It is thus a goal of the present invention, to provide a level of security for executable code
`
`on similar grounds a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket