throbber
W0 98/02864
`
`PCT/U897” 1 455
`
`17.
`
`A method of dithering watermark quantizations such that the
`
`dither changes an absolute quantization value, but does not change a
`
`U
`
`quantization level or information carried in the quantization.
`
`18.
`
`A method of encoding watermarks comprising steps of:
`
`inverting at least one instance of the watermark bit stream; and
`
`encoding at least one instance of the watermark using said inverted
`
`instance of the watermark bit stream.
`
`19.
`
`A method of decoding watermarks comprising steps of:
`
`considering an original watermark synchronization marker, an inverted
`
`watermark synchronization marker, and inverted watermarks; and
`
`decoding based on the considering step.
`
`20.
`
`A method of encoding and decoding watermarks in a signal
`
`using a spread spectrum technique to encode or decode where information is
`
`encoded or decoded at audible levels and the encoding and decoding
`
`methods are pseudo-random over frequency.
`
`
`
`
`
`hunt-4sumphuNl—t
`
`hUNl—J
`
`H
`
`21.
`
`A method of encoding and decoding watermarks in a signal
`
`using a spread spectrum technique to encode or decode where information is
`
`encoded or decoded at audible levels and the encoding and decoding
`
`methods are pseudo-random over time.
`
`22.
`
`The method of claim 21, wherein the information is encoded or
`
`decoded at audible levels and the encoding and decoding methods are
`
`pseudo—random, over both frequency and time.
`
`23.
`
`A method of analyzing composite digitized signals for
`
`watermarks comprising steps of:
`
`37
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1399
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1399
`
`

`

`WO 98/02864
`
`PCT/11897111455
`
`\DNQOtUI-bw
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`\DODQONU'l-hUNl-‘l
`HHHl-‘Hpump-Io
`
`obtaining a composite signal;
`
`obtaining an unwatermarked sample signal;
`
`time aligning the unwatermarked sample signal to the
`
`composite signal;
`
`gain adjusting the time aligned unwatermarked sample signal to
`
`a corresponding segment of the composite signal, determined in the
`
`time aligning step;
`
`estimating a pre-composite signal using the composite signal
`
`and the gain adjusted unwatermarked sample signal;
`
`estimating a watermarked sample signal by subtracting the
`
`estimated pre-composite signal from the composite signal; and
`
`scanning the estimated watermarked sample signal for
`
`watermarks.
`
`24.
`
`A method for varying watermark encode/decode algorithms
`
`automatically during the encoding or decoding of a watermark comprising
`
`steps of:
`
`a)
`
`assigning a list of desired CODECs to a list of corresponding
`
`signal characteristics which indicate use of particular CODECs;
`
`b)
`
`during encoding/decoding, analyzing characteristics of the
`
`current sample frame in the signal stream, prior to delivering the frame to a
`
`CODEC;
`
`c)
`
`looking up the corresponding CODEC from the list of CODECs
`
`in step (a) which matches the observed signal characteristics from step (b);
`
`d)
`
`e)
`
`and
`
`loading and/or preparing the desired CODEC;
`
`passing the sample frame to the CODEC selected in step (c);
`
`f)
`
`receiving the output samples from step (e).
`
`25.
`
`The method according to claim 24, wherein watermark signal
`
`characteristics or a watermark certificate can be compressed.
`
`38
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1400
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1400
`
`

`

`WO 98/02864
`
`I
`
`PCT/U89 7/1 1455
`
`26.
`
`A method for varying watermark encode/decode algorithms
`
`automatically during the encoding or decoding of a watermark comprising
`
`steps of:
`
`a)
`
`assigning a list of desired CODECs to a list of index values
`
`which correspond to values computed as a function of the pseudo—random
`
`watermark key and the state of the processing framework;
`
`b)
`
`during encoding/decoding, computing the pseudo-random key
`
`index value for the current sample frame in the signal stream, prior to
`
`delivering the frame to a CODEC;
`
`c)
`
`looking up the corresponding CODEC from the list of CODECs
`
`in step (a) which matches the index value from step (b);
`
`d)
`
`e)
`
`and
`
`loading and/or preparing the desired CODEC;
`
`passing the sample frame to the CODEC selected in step (c);
`
`f)
`
`receiving the output samples from step (e).
`
`tometUl-wal-J
`I-IHHHHpump-o
`
`H U1
`
`27.
`
`The method according to claim 26, wherein watermark signal
`
`characteristics or a watermark certificate can be compressed.
`
`39
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1401
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1401
`
`

`

`INTERNATIONAL SEARCH REPORT
`
`lntcmational application No,
`
`PCT/U897/11455
`
`CLASSIFICATION OF SUBJECT MATTER
`A.
`lPC(6}
`:GO9C 5/00 H04L 9/00
`US CL
`2380/54, 3, 4, 23, 55; 283/73, 113. 17
`According to International Patent Classification (lPC) or to both national classification and IPC
`B.
`FIELDS SEARCHED
`
`
`
`Minimum documentation searched (classification system followed by classification symbols)
`US,
`:
`380/54, 3. 4. 23, 55, 49, Si, 59; 283/73. H3. 17
`
`Documentation searched other than minimum documentation to the extent that such documents are included in the fields searched
`
`
`
`Electronic data base consulted during the intemetional search (name of data base and, where practicable. search terms used)
`
`C.
`
`DOCUMENTS CONSIDERED TO BE RELEVANT
`
`Citation of document. with indication. where appropriate. of the relevant passages
`
`Relevant to claim No.
`
`US 5,664,018 A (LEIGHTON) 02 SEPTEMBER 1997
`
`
`
`US 5,617,119 A (BRIGGS ET AL.) 01 APRIL 1997
`
`US 5,568,570 A (RABBANI) 22 OCTOBER 1996
`
`US 5,530,759 A (BRAUDAWAY, ET AL.) 25 JUNE 1996
`
`US 5,493,677 A (BALOGH, ET AL.) 20 FEBRUARY 1996
`
` US, 5,636,292 A (RHOADS) 03 JUNE 1997
`
`
`
`'A'
`_
`_
`E
`'L'
`
`'0'
`
`document defining the general state of the art which in not considered
`to be of particular relevance
`.
`.
`V
`.
`.
`“m" document publuhed on or In" the international film; an.
`document which may throw doubt- on priority claim(e) or which is
`cited to establish the publication date of another citation or other
`apeeial reason (as apemfied)
`document referring to an oral disclosure. use. exhibition or other
`[HG-Ill
`
`
`
`
`
`
`
`
`
`
`
`
`
`’P'
`document published prior to the international filing date but later than
`-.'-
`dogma.“ numb" of the “m. patent (“my
`the pnenty data elauned
`
`Date of the actual completion of the international search
` Date of mailing of the intemational search report
`
`23 OCTOBER 1997
`
`2 3 DEC 1997
`
`
`Auth-rized officer
`Home and meiling address of the ISA/US
`
`
`Commissioner of Patents and Trademarks
`Box PCT
`
`
`
`Washington. DC. 2023]
`
`Facsimile No.
`(703) 305-3230
`
`
`
`Form PCT/ISA/2l0 (second shoetXJuly I992)!v
`
`D Further documents are listed in the continuation of Box C. D See patent family annex.
`Special categories of oiled doeumenta:
`
`
`later document published after the international filing data or priority
`data and not in conflict with the application but citad to understand
`the principle or theory “mum; the invention
`document of particular relevance; the claimed invention cannot be
`considered novel or cannot be considered to involve an inventive step
`when the document is taken alone
`
`'X'
`
`'Y'
`
`document of particular relevance; the claimed invention cannot be
`considered to involve an inventive step when the document
`is
`combined with one or more other such doeumenta. such combination
`being obvtoua to a pcraon skilled in the art
`
`DAVID CAIN
`l/
`
`/
`elephone No.
`
`(703) 305-1836
`
`"
`
`/
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1402
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1402
`
`

`

`~
`
`PCT
`
`International Bureau
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`
`
`
`A1
`
`(11) International Publication Number:
`
`WO 00/57643
`
`
`(43) International Publication Date:
`
`28 September 2000 (28.09.00)
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`(51) International Patent Classification 7 :
`
`
`H04N 7/167
`
`
`
`
`(21) International Application Number:
`
`PCT/USOO/06522
`
`(22) International Filing Date:
`
`14 March 2000 (14.03.00)
`
`(81) Designated States: JP, US, European patent (AT, BE, CH, CY,
`DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, MC, NL, PT,
`SE).
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`
`(30) Priority Data:
`60/125,990
`
`24 March 1999 (24.03.99)
`
`US
`
`(71) Applicant (for all designated States except US): BLUE SPIKE,
`INC. [US/US]; 16711 Collins Avenue, Miami, FL 33160
`(US).
`
`(72) Inventors; and
`(75) Inventors/Applicants (for US only): MOSKOWITZ, Scott,
`A.
`[US/US]; 1671] Collins Avenue, Miami, FL 33160
`(US). BERRY, Michael [US/US]; 12401 Princess Jeanne,
`Albuquerque, NM 87112 (US).
`
`(74) Agents: CHAPMAN, Floyd, B. et 211.; Baker Botts, L.L.P., 1299
`Pennsylvania Avenue, N.W., Washington, DC 20004 (US).
`
`
`(54) Title: UTILIZING DATA REDUCTION IN STEGANOGRAPHIC AND CRYPTOGRAPHIC SYSTEMS
`
`(57) Abstract
`
`The present invention is a method for protecting a
`data signal where the method comprises the following steps:
`applying a data reduction technique (200) to the signal to
`produce a reduced signal, subtracting (60) the reduced data
`signal from the original signal to produce a remainder signal
`(39), embedding (300) a first watermark into the reduced
`data signal to produce a watermarked redued data signal,
`and adding (50) the watermarked reduced signal
`to the
`remainder signal to produce an output signal (90). A second
`watermark (301) may be embedded into the remainder
`signal (39) before the final addition (50) step. Cryptographic
`techniques may be employed to encrypt the remainder signal
`and/or the reduced signal prior to the addition step (50).
`
`ORIGINAL
`316”“-
`
`10
`
`30
`
`Q
`
`tsTREMAINDER
`
` 20
`
`
`157 DATAREDUCED
`SIGNAL
`
`
`
`
`
`2°
`
`'9 SUBTRACTION
`-
`
`2NDREMAINDER
`
`
`
`
`101
`
`2NDDATAREDUC110N
`21
`2ND DATA REDUCED
`SlGNAL
`
`28
`
`SUBTRACTION
`109
`
`nTH REMAINDER
`
`
`
`TH DATAREDUEIION
`
`nTH DATA REDUCED SIGNAL
`
`
`
`
`
`
`'83
`
`
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1403
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1403
`
`

`

`
`
`
`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`
`AL
`AM
`AT
`AU
`AZ
`BA
`BB
`BE
`BF
`BG
`B.)
`BR
`BY
`CA
`CF
`CG
`CH
`CI
`CM
`CN
`CU
`CZ
`DE
`DK
`EE
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Belarus
`Canada
`Cemral African Republic
`Congo
`Switzerland
`cote d’Ivoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`ES
`FI
`FR
`GA
`GB
`GE
`GH
`GN
`GR
`HU
`IE
`IL
`IS
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Ireland
`Israel
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyzstan
`Democratic People’s
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`N0
`NZ
`PL
`PT
`R0
`RU
`SD
`SE
`SG
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`SI
`SK
`SN
`SZ
`TD
`TG
`TJ
`TM
`TR
`TT
`UA
`UG
`US
`UZ
`VN
`YU
`ZW
`
`Slovenia
`Slovakia
`Senegal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United States of America
`Uzbekistan
`Viet Nam
`Yugoslavia
`Zimbabwe
`
`
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1404
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1404
`
`

`

`WO 00/57643
`
`PCT/USOO/06522
`
`UTILIZING DATA REDUCTION IN STEGANOGRAPHIC
`AND CRYPTOGRAPHIC SYSTEMS
`
`FIELD OF INVENTION
`
`This invention relates to digital signal processing, and more particularly to a
`
`method and a system for encoding at least one digital watermark into a signal as a
`
`means of conveying information relating to the signal and also protecting against
`
`unauthorized manipulation of the signal.
`
`BACKGROUND OF INVENTION
`
`Digital watermarks help to authenticate the content of digitized multimedia
`
`information, and can also discourage piracy. Because piracy is clearly a disincentive
`
`to the digital distribution of copyrighted content, establishment of responsibility for
`
`copies and derivative copies of such works is invaluable. In considering the various
`
`forms of multimedia content, whether "master,” stereo, NTSC video, audio tape or
`
`compact disc, tolerance of quality will vary with individuals and affect the underlying
`
`commercial and aesthetic value of the content.
`
`It is desirable to tie copyrights,
`
`ownership rights, purchaser information or some combination of these and related data
`
`into the content in such a manner that the content must undergo damage, and therefore
`
`reduction of its value, with subsequent, unauthorized distribution, commercial or
`
`otherwise. Digital watermarks address many of these concerns.
`
`A matter of general weakness in digital watermark technology relates directly
`
`to the manner of implementation of the watermark. Many approaches to digital
`
`watermarking leave detection and decode control with the implementing party of the
`
`digital watermark, not the creator of the work to be protected. This weakness removes
`
`proper economic incentives for improvement of the technology. One specific form of
`
`exploitation mostly regards efforts to obscure subsequent watermark detection. Others
`
`regard successful over encoding using the same watermarking process at a subsequent
`
`time. Yet another way to perform secure digital watermark implementation is through
`
`"key-based" approaches.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1405
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1405
`
`

`

`WO 00/57643
`
`PCT/USDO/06522
`
`Ix)
`
`This paper draws a di
`
`provabl
`
`intended to be low
`
`stinetion between a “forensic watermark,” based on
`"copy control” or “universal” watermark which is
`neral computing or
`
`y-sccure methods, and a
`cost and easily implemented into any ge
`rrnark can be forensic if it can identify the source
`For example, assume that digital data are
`
`unauth
`
`watermark, if presen
`
`A“ (the “A disk”). Company A makes an
`“E disk”). A forensic
`
`ompany B” (the
`
`“A disk,” would identify the “B
`
`consumer electronic device. A wate
`of the data from which a copy was made.
`stored on a disk and provided to “Company
`orized copy and delivers the copy to “C
`t in the digital data stored on the
`c “A disk.”
`disk” as having been copied from th
`On the other hand, a copy control or universal watermark is an embedded signal
`which is governed by a
`”) to increase
`“key” which may be changed (a “session key
`to devices that may offer less than strict
`s
`ecurity, or one that is easily accessible
`“universal” nature of the watermark
`cryptographic security. The
`inexpensive means for accessing or other associating the watermark with operations that
`elude playback, recording or manipulations ofthe media in which it is embedded.
`A fundamental difference is that the universality of a copy cont
`which must be redundant enough to survive many signal manipulations to eliminate
`establishing responsibility
`is at odds with the far greater problem of
`ore
`pected copying of a copyrighted media work. The m
`for a given instance of a sus
`dedicated pirates must be dealt with by encouraging 3rd party authentication with
`“forensic watermarks” or those that constitute “transactional watermarks” (which are
`encoded in a given copy of said content to be watermarked as per the given transaction).
`rt a given information signal
`The goal of a digital watermark system is to inse
`er as to leave little or no evidence of the presence of the
`or signals in such a mann
`information signal in the underlying content signal. A separate but equal goal is
`maximizing the digital watermark’s encoding level and "location sensitivity" in the
`underlying content signal such that the watermark cannot be removed without damage
`
`is the computationally
`
`rol mechanism,
`
`can in
`
`most casual piracy,
`
`to the content signal.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1406
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1406
`
`

`

`WO 00/57643
`
`‘
`
`PCT/USOO/06522
`
`One means of implementing a digital watermark is to use key-based security.
`A predetermined or random key can be generated as a map to access the hidden
`information signal. A key pair may also be used. With a typical key pair, a party
`possesses a public and a private key. The private key is maintained in confidence by
`the owner of the key, while the owner’s public key is disseminated to those persons in
`h whom the owner would regularly communicate. Messages being
`the public wit
`communicated, for example by the owner to another, are encrypted with the private key
`and can only be read by another person who possesses the corresponding public key.
`Similarly, a message encrypted with the person’s public key can only be decrypted with
`the corresponding private key. Of course, the keys or key pairs may be processed in
`separate software or hardware devices handling the watermarked data.
`
`SUMMARY OF THE [N VENTION
`A method of securing a data signal comprises the steps of: applying a data
`reduction technique to reduce the data signal into a reduced data signal; subtracting said
`reduced data signal from the data signal to produce a remainder signal; using a first
`cryptographic technique to encrypt the reduced data signal to produce an encrypted,
`reduced data signal; using a second cryptographic technique to encrypt the remainder
`signal to produce an encrypted remainder signal; and adding said encrypted, reduced
`data signal to said encrypted remainder signal to produce an output signal.
`
`technique to reduce the
`reduced data signal from the data signal to produce a remainder signal; means to apply
`a first cryptographic technique to encrypt the reduced data signal to produce an
`encrypted, reduced data signal; means to apply a second cryptographic technique to
`encrypt the remainder signal to produce an encrypted remainder signal; and means to
`add said encrypted, reduced data signal to said encrypted remainder signal to produce
`
`an output signal.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1407
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1407
`
`

`

`WO 00/57643
`
`‘
`
`PCT/USOO/06522
`
`A method of securing a data signal comprises the steps of: applying a data
`reduction technique to reduce the data signal into a reduced data signal; subtracting said
`reduced data signal from the data signal to produce a remainder signal; embedding a
`first watermark into said reduced data signal to produce a watermarked, reduced data
`signal; embedding a second watermark into said remainder signal to produce a
`watermarked remainder signal; and adding said watennarked, reduced data signal to
`said watermarked remainder signal to produce an output signal.
`A method of protecting a data signal comprises: applying a data reduction
`technique to reduce the data signal into a reduced data signal; subtracting said reduced
`data signal from the data signal to produce a remainder signal; using a first scrambling
`technique to scramble said reduced data signal to produce a scrambled, reduced data
`signal; using a second scrambling technique to scramble said remainder signal to
`produce a scrambled remainder signal; and adding said scrambled, reduced data signal
`to said scrambled remainder signal to produce an output signal.
`There are two design goals in an overall digital watermarking system’s low cost,
`and universality. Ideally, a method for encoding and decoding digital watermarks in
`digitized media for copy control purposes should be inexpensive and universal. This
`is essential in preventing casual piracy. On the other hand, a more secure form of
`protection, such as a “forensic watermarks,” can afford to be computationally intensive
`a copy control watermark.
`to decode, but must be unaffected by repeated re-encoding of
`d for achieving these results would separate the signal into different
`An ideal metho
`areas, each of which can be accessed independently. The embedded signal or may
`simply be “watermark bits” or ”executable binary code,” depending on the application
`and type of security sought. Improvements to separation have been made possible by
`enhancing more of the underlying design to meet a number of clearly problematic
`issues. The present invention interprets the signal as a stream which may be split into
`separate streams of digitized samples or may undergo data reduction (including both
`lossy and lossless compression, such as MPEG lossy compression and Meridian’s
`down sampling, common to many studio operations, or any
`
`lossless compression,
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1408
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1408
`
`

`

`WO 00/57643
`
`‘
`
`PCT/USOO/06522
`
`related data reduction process). The stream of data can be digital in nature, or may also
`be an analog waveform (such as an image, audio, video, or multimedia content). One
`example of digital data is executable binary code. When applied to computer code, the
`present invention allows for more efficient, secure, copyright protection when handling
`functionality and associations with predetermined keys and key pairs in software
`applications or the machine readable versions of such code in microchips and hardware
`devices. Text may also be a candidate for authentication or higher levels of secuiity
`when coupled with secure key exchange or asymmetric key generation between parties.
`The subsets of the data stream combine meaningful and meaningless bits of data which
`may be mapped or transferred depending on the application intended by the
`
`implementing party.
`The present invention utilizes data reduction to allow better performance in
`watermarking as well as cryptographic methods concerning binary executable code, its
`machine readable form, text and other functionality-based or communication—related
`applications. Some differences may simply be in the structure of the key itself, a
`pseudo random or random number string or one which also includes additional security
`ures saved to the key. The key may also be
`with special one way functions or signat
`made into key pairs, as is discussed in other disclosures and patents r
`The present invention contemplates watermarks as a plurality of digitized sample
`even if the digitized streams originate from the analog waveform itself. The
`streams,
`also contemplates that the methods disclosed herein can be applied
`present invention
`to non—digitized content. Universally, data reduction adheres to some means of
`“understanding "the reduction. This disclosure looks at data reduction which may
`include down sampling, lossy compression, summarization or any means of data
`reduction as a novel means to speed up watermarking encode and decode operations.
`Essentially a lossy method for data reduction yields the best results for encode and
`
`eferenced herein.
`
`decode operations.
`It is desirable to have both copy control and forensic watermarks in the same
`signal to address the needs of the hardware, computer, and software industries while
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1409
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1409
`
`

`

`WO 00/57643
`
`“
`
`PCT/USOO/06522
`
`also providing for appropriate security to the owners of the copyrights. This will
`become clearer with further explanation of the sample embodiments discussed herein.
`The present invention also contemplates the use of data reduction for purposes
`of speedier and more tiered forms of security, including combinations of these methods
`with transfer function functions.
`In many applications,
`transfer functions (e.g.,
`scrambling), rather than mapping functions (e.g., watermarking), are preferable or can
`g. With “scrambling,” predetermined keys are
`those skilled
`
`be used in conjunction with mappin
`associated with transfer functions instead of mapping functions, although
`in the art may recognize that a transfer function is simply a subset of mask sets
`encompassing mapping functions.
`It
`is possible that tiered scrambling with data
`reduction or combinations of tiered data reduction with watermarking and scrambling
`
`may indeed increase overall security to many applications.
`The use of data reduction can improve the security of both scrambling and
`watermarking applications. All data reduction methods include coefficients which
`affect the reduction process. For example, when a digital signal with a time or space
`component is down sampled, the coefficient would be the ratio of the new sample rate
`to the original sample rate. Any coefficients that are used in the data reduction can be
`randomized using the key, or key pair, making the system more resistant to analysis.
`Association to a predetermined key or key pair and additional measure of security may
`include biometric devices, tamper proofing of any device utilizing the invention, or
`
`other security measures.
`
`Tests have shown that the use
`
`of data reduction in connection with digital
`
`watermarking schemes significantly reduces the time required to
`
`decode the
`
`watermarks, permitting increases in operational efficiency.
`Particular implementations of the present
`invention, which have yielded
`incredibly fast and inexpensive digital watermarking systems, will now be described.
`These systems may be easily adapted to consumer electronic devices, general purpose
`computers, sofiware and hardware. The exchange of predetermined keys or key pairs
`may facilitate a given level of security. Additionally, the complementary increase in
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1410
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1410
`
`

`

`WO 00/57643
`
`A
`
`PCT/USOO/06522
`
`security for those implementations where transfer functions are used to “scramble" data,
`
`is also disclosed.
`
`a more complete understanding of the invention and some advantages
`thereof, reference is now made to the following descriptions taken in connection with
`the accompanying drawings in which:
`FIG. 1 is a fiinctional block diagram that shows a signal processing system that
`generates “n” remainder signals and “n” data reduced signals.
`FIG. 2 is a functional block diagram for an embodiment of the present invention
`which illustrates the generation of an output signal comprised of a data—reduced,
`watermarked signal and a first remainder signal.
`FIG. 3 is a functional block diagram for an embodiment of the present invention
`neration of an output signal comprised of a data—reduced,
`
`which illustrates the ge
`
`watermarked signal and a wat
`
`errnarkcd, first remainder signal.
`
`FIG. 4 is a functional block diagr
`
`am for decoding the output signal generated
`
`by the system illustrated in FIG. 2.
`FIG. 5 is a functional block diagram for decoding the output signal generated
`
`by the system illustrated in FIG. 3.
`6 is a functional block diagram for an embodiment ofthe present invention
`FIG.
`which illustrates the generation of an output signal comprised of a data-reduced,
`scrambled signal and a first remainder signal.
`FIG. 7 is a functional block diagram for an embodiment of the present invention
`which illustrates the generation of an output signal comprised of a data-—reduccd,
`scrambled signal and a scrambled, first remainder signal.
`FIG. 8 is a functional block diagram for decoding the output signal generated
`
`by the system illustrated in FIG. 6.
`FIG. 9 is a functional block diagram for decoding the output signal generated
`
`by the system illustrated in FIG. 7.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1411
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1411
`
`

`

`WO 00/57643
`
`“
`
`PCT/USOO/06522
`
`DETAILED DESCRIPTION
`The embodiments of the present
`understood by referring to the drawings,
`
`invention and its advantages are best
`like numerals being used for like and
`
`corresponding parts of the various drawings.
`
`An Overview
`A system for achieving multiple levels of data reduction is illustrated in FIG.
`I . An input signal 10 (for example, instructional text, executable binary computer code,
`images, audio, video, multimedia or even virtual reality imaging) is subjected to a first
`data reduction technique 100 to generate a first data reduced signal 20. First data
`reduced signal 20 is then subtracted from input signal 10 to generate a first remainder
`
`signal 30.
`First data reduced signal 20 is subjected to a second data reduction technique
`101 to generate a second data reduced signal 21. Second data reduced signal 21 is then
`subtracted from first data reduced signal 20 to generate a second remainder signal 31.
`Each of the successive data reduced signals is,
`in turn, subjected to data
`reduction techniques to generate a further data reduced signal, which,
`in turn,
`is
`subtracted from its respective parent signal to generate another remainder signal. This
`process is generically described as follows. An (n-l) data reduced signal 28 (Le, a
`signal that has been data reduced n—l times) is subjected to an nth data reduction
`technique 109 to generate an nth data reduced signal 29. The nth data reduced signal
`29 is then subtracted from the (n-l) data reduced signal 28 to produce an n‘“ remainder
`
`1 in
`An output signal can be generated from the system illustrated in FIG.
`numerous ways. For example, each of the n remainder signals (which, through
`represented by reference numerals 30-39, are not intended to be limited to 10 signals)
`and the 11‘“ data signal may optionally subjected to a watermarking technique, or even
`optionally subjected to a encryption technique, and each of the (n+1) signals (whether
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1412
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1412
`
`

`

`W0 (IO/57643
`
`A
`
`PCT/USUO/06522
`
`reduction
`
`watermarked or encrypted, or otherwise untouched) may then be added together to form
`an output signal. By way of more particular examples, each of the (n+1) signals (i.e.,
`the n remainder signals and the n‘“ data reduced signal) can be added together without
`any encryption or watermarking to form an output signal; or one or more of the (n+1)
`signals may
`gether; or one
`be watermarked and then all (n+1) signals may be added to
`gnals may be encrypted and then all (n+1) signals may be added
`or more of the (n+1) si
`It is anticipated that between these three extremes lie numerous hybrid
`together.
`combinations involving one or more encryptions and one or more watermarkings.
`Each level may be used to represent a particular data density. E.g., if the
`method is down—sampling, for a DVD audio signal the first row would
`led at 96 kHz, the second at 44.1 kHz., the third at 6 kHZ., etc.
`represent data samp
`There is only an issue of deciding what performance or security needs are contemplated
`when undertaking the data reduction process and choice of which types of keys or key
`pairs should be associated with the signal or data to be reduced. Further security can
`5, one time stamps or
`ased by including block ciphers, special one way function
`be incre
`evices in the software or hardware devices that can be em
`even biometric d
`Passwords or biometric data are able to assist in the determination of the identity ofthe
`user or owrier of the data, or some relevant identifying information.
`An example of a real world application is helpful here. Given the predominant
`y compression audio
`concern, at present, ofMPEG 1 Layer 3, or MP3, a perceptual loss
`data format, which has contributed to a dramatic re—evaluation of the distribution of
`music, a digital watermark system must be able to handle casual and more dedicated
`piracy in a consistent manner. The present invention contemplates compatibility with
`MP3, as well as any perceptual coding technique that is technically similar. One issue,
`” detect a watermark as quickly as possible
`is to enable a universal copy control “key
`t 96 kHz,
`from a huge range of perceptual quality measures. For instance, DVD 24 bi
`encoded watermarks, should be detected in at least “real time,” even after the signal has
`been down sampled, to say 12 kHz of the 96 kHz originally referenced. By delineating
`and starting with less data, since the data-reduced signal is obviously smaller though
`
`bodied.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1413
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1413
`
`

`

`W0 (JO/57643
`
`‘
`
`10
`
`PCT/USOO/06522
`
`still related perceptually to the original DVD signal, dramatic increases in the speed and
`survival of the universal copy control bits can be achieved. The present invention also
`permits the ability to separate any other bits which may be associated with other more
`secure predetermined keys or key pairs.
`Where the data stream is executable computer code, the present invention
`contemplates breaking the code into objects or similar units of functionality and
`allowing for determination of what is functionally important. This may be more
`apparent to the developer or users of the software or related hardware device. Data
`reduction through the use of a subset of the functional objects related to the overall
`functionality of the software or executable code in hardware or microchips, increase the
`copyright protection or security sought, based on reducing the overall data to be
`associa

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket