`o
`i _
`, _
`, ci.,r ___ _____
`. cm —co
`iv, ,..40
`......01
`.....
`
`
`.-,=:, —.01 NA
`c.sj ............ =—__....—.......
`cV Cr% m•—me.— c'n
`in 1:=1 = aim N ."
`o
`....._
`
`.
`
`, nzt•I
`
`=1......=11•M .0.1
`
`0
`,., 0
`i--
`as
`' r...,"•=•) "-a a .-
`I r•• .. (.) ,_
`.
`Lr. -
`--....H u)
`ai
`5
`C.)
`1.1.1
`U)
`C/)
`
`
`
`U)
`
`u)
`co
`Si
`
`PATENT NUMBER
`
`tl
`
`U.S. UTILITY PATENT APPLICATION
`PATENT DATE
`O.I.P.E.
`2 2003
`JUL
`
`N
`
`ED S
`
`(
`
`SECTOR CLASS
`
`SUBCLASS
`
`ART UNIT
`
`EXAMINER
`
`4
`
`.7 ,
`
`. ---7
`
`FILED WITH: 0 DISK (CRF) 0 FICHE
`(Attached in pocket on right Inside flap)
`
`PREPARED AND APPROVED, FOR ISSUE
`
`ISSUING CLASSIFICATION
`1 CROSS REFERENCE(S)
`
`' SUBCLASS (ONE SUBCLASS PER BLOCK)
`
`„i&
`
`CLASS
`
`3400
`
`'
`1- 0
`
`/
`
`-
`
`I
`
`s
`
`q Continued on Issue Slip Inside File Jacket
`
`
`
`
`
`o
`
`y (71
`
`ORIGINAL
`
`CLASS
`
`SUBCLASS
`
`'7-13
`
`171-
`
`INTERNATIONAL CLASS
`
`FICATION
`
`0I
`
`If 0 ii L
`G 0(F
`06F
`
`.
`
`i/0
`1/02
`7-/gq)
`/
`
`cs
`
`orn)
`
`raw ngs
`
`r---ITERMINAL
`I—I DISCLAIMER
`
`Ell a) The term of this patent
`subsequent to
`has been disclaimed.
`
`(date)
`
`q b)'The term of this patent shall
`not extend beyond the expiration date
`of U.S Patent. No.
`
`DRAWINGS
`
`CLAIMS ALLOWED
`
`Sheets'Drwg.
`
`Figs. Drwg.
`
`Print Fig.
`
`Total Claims
`
`Print Claim for O.G.
`
`(Aso(
`
`ner)
`
`NOTICE OF ALLOWANCE MAILED
`
`/
`
`GILBERTO BARRON
`SUPERVISORY PATENT EXAMINER
`''LOGY CENTER 210Q
`-TEC
`3/4 )3
`(Date)
`
`(Primary Eaminer)
`
`Amount Due
`
`-aid
`
`0
`
`141men
`iSS'JE BATCH NUMBER
`
`is,
`
`month7''of
`q c) The termini
`this patent have been disclaimed.
`
`s '
`
`'ti_egat InstrumentsExaminerr
`
`e)
`
`WARNING:
`The information disclosed herein may be restricted. Unauthorized disclosure may be prohibited by the United States Code Title 35, Sections 122, 181 and 368.
`Possession outside the U.S. Patent & Trademark Office is restricted to authorized employees and contractors only.
`
`Form PTO-436A
`(Rev. 10/97)
`
`it-ounai urawimp
`
`,i,CM) SOT
`
`(LABEL AREA), 4
`
`(FACE)
`
`
`
`
`
`1111111111 ;11-111111111111 111111111111111
`
`
`
`Bib Data Sheet
`
`CONFIRMATION NO. 2376
`
`CLASS
`713
`
`GROUP ART UNIT
`2132
`
`ATTORNEY DOCKET
`NO.
`1607/6
`
`FILING DATE
`03/24/1998
`
`RULE
`
`SERIAL NUMBER
`09/046,627
`
`PPLICANTS
`
`SCOTT A. MOSKOWITZ, MIAMI, FL;
`
`** CONTINUING DATA *************************
`
`** FOREIGN APPLICATIONS *****-**************
`
`IF REQUIRED, FOREIGN FILING LICENSE GRANTED
`04/28/1998
`
`** SMALL ENTITY **
`
`Foreign Priority claimed
`
`
`
`yes
`
`no
`
`35 USC 119 (a-d) conditions met
`
`Verified and Acknowledged
`
`no
`yes
` Examiner's Signature
`
`STATE OR
`
`SHEETS
`
`TOTAL
`
`INDEPENDENT4
`
`Met after Allowance
`
`Initials
`
`COUNTRY
`FL
`
`DRAWING
`1
`
`CLAIMS
`29
`
`CLAIMS
`• 6
`
`ADDRESS
`29693
`WILEY, REIN & FIELDING, LLP
`ATTN: PATENT ADMINISTRATION
`1776 K. STREET N.W.
`WASHINGTON , DC
`20006
`
`TITLE
`METHOD FOR COMBINING TRANSFER FUNCTIONS WITH PREDETERMINED KEY CREATION
`
`FILING FEE
`
`RECEIVED
`617
`
`FEES: Authority has been given in Paper
`to charge/credit DEPOSIT ACCOUNT
`No.
`No.
`for following:
`
` 11.17 Fees ( Processing Ext. of time )1
`
`r 1.18 Fees ( Issue )
`
` All Fees
`
`1.16 Fees ( Filing )
`
`Other
`
`Credit
`
`
`
`Page 1 of 1
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Bib Data Sheet
`
`
`11111111111111111 111111111
`11H 11111111111111
`
`
`11111111 I'll
`FILING DATE
`03/24/1998
`RULE
`
`COMMISSIONER FOR PATENTS
`UNITED STATE; -PATENT AND TRADEMARK OFFICE
`WASHINGTON, D.C. 20231
`www.uspto.gov
`
`/
`GRO PART UNIT
`2132
`
`CONFIRMATION NO. 2376
`ATTORNEY
`DOCKET NO.
`1607/6
`
`CLASS
`
`SERIAL NUMBER
`09/046,627
`APPLICANTS
`
`SCOTT A. MOSKOWITZ, MIAMI, FL;
`** CONTI
`IN DATA *
` ** ** *
`*****
`0 5Til
`0
`? APPLIC
`NS ******
`*** *
`**
`0'
`
`IF REQUIRED, F
`GN FILING LICENSE
`04/28/1998
`GRANTED'""
`0 yes ano
`
`(-1 FORMN
`
`ADDRESS
`WILEY REIN & FIELDING
`Intellectual Property Department
`Floyd B. Chapman
`1776 K Street, NW
`Washington ,DC 20006
`TITLE
`METHOD FOR COMBINING TRANSFER FUNCTIONS WITH PREDETERMINED KEY CREATION
`
`NO
`
`.1 1/1-5 5-0
`
`*SMALL ENTITY **
`,),
`ri /STATE OR
`SHEETS
` COUNTRY
`DRAWING
`FL
`1
`
`,1/2'
`O
`
`TOTAL
`CLAIMS
`,2j2J- 1
`
`—
`INDEPENDENT
`CLAIM §
`1
`
`no . Met after Allowance
`
`iner's Signature
`
`Initials
`
`Foreign Priority claimed
`35 USC 119,(a.d) conditions
`met
`Verified and
`Acknowledged
`
`Exa
`
`min
`
`g
`
`FILING FEE
`RECEIVED
`617
`
`FEES: Authority as been givenlit Paper
`No.
`o charge/credit DEPOSIT ACCOUNT
`for following:
`No.
`
`U All Fees
`I III .1 16 Fees ( Filing )
`• 1.17 Fees ( Processing Ext. of
`time )
`U 1.18 Fees ( Issue )
`U Other
`U Credit
`
`•
`
`
`
`SERIAL NUMBER
`
`FILING DATE
`
`CLASS
`
`GROUP ART UNIT
`
`ATTORNEY DOCKET NO.
`
`09/046,627
`
`03/24/98
`
`380
`
`3642
`
`1607/6
`
`SCOTT A. MOSKOWITZ, MIAMI, FL.
`
`APPLICANT
`
`**CONTINUING DOMESTIC DATA******
`FIED
`
`*f/*711;6***F)
`‘,10)(40-/
`
`anew tiC Mr 9
`
`4 C -56
`
`/
`
`°lin
`(w.
`
`**371 (NAT'L TAGE) DATA*********************
`VER ED
`
`cir2
`
`**FOREIGN APP CATIONS************/
`,Aez ,
`D
`VE
`
`FOREIGN FILING LICENSE GRANTED 04/28/98
`
`***** SMALL ENTITY *****
`
`Foreign Priority claimed
`35 USC 119 (a-d) conditions
`Verified and Acknowledged
`
`❑ye
`yes
`
`o
`
`ElMet after Allowance
`
`maims
`
`
`
`STATE OR
`COUNTRY
`FL
`
`SHEETS
`DRAWING
`1
`
`TOTAL
`CLAIMS -
`
`INDEPENDENT
`CLAIMS
`
`JO C ALT LLER
`to • KENYON
`NYON
`• 1025 CONNE
`UT VENUE NW
`< WASHING ON DC
`6
`
`ci 6::li'ehoitio trar
`d'in
`a rrkr„
`1 oz)---
`'" n
`ci
`. 4_ Obil-,0117100
`
`infileOVE
`
`lv PI
`
`METHOD FOR COMBINING TRAN ER FUNCTIONS WITH PREDETERMINED KEY
`w CREATION
`I-
`
`FILING FEE
`RECEIVED
`
`$617
`
`FEES: Authority has been given in Paper
`No.
`to charge/credit DEPOSIT ACCOUNT
`NO.
`for the following:
`
`0 All Fees
`OUI 1.16 Fees (Filing)
`1.17 Fees (Processing Ext. of tin-
`q 1.18 Fees (Issue)
`q Other
`O Credit
`
`
`
`42 U.S, PTO
`09/046627
`1111191311/111121114/Ill9II1111111111
`
`1. Application
`
`
`
` papers.
`
`PATENT APPLICATION
`1111111111111MIN
`09046627
`
`CONTENT.
`Date rc
`A
`(dm:C. of M.)
`or
`Date Mailed
`
`MAR 3 0 9 8 3 5
`INITIALS
`
`Date recAved
`(Incl. C. of M.)
`or
`Date Mailed
`
`3
`
`• t,J1P''
`
`2 -,211-fr
`
`V --61, %-.0_
`
`-,).14-ovi 5-
`
`6
`
`2
`
`7
`
`vrch'C',
`
`u
`
`L
`
`2.
`
`3.
`
`4.
`
`?37.
`lobe8
`
`13
`
`q
`15
`
`19.
`
`' 20.
`
`t' 22.
`
`\V23.
`
`1'1'24.
`3)`1V--
`26.
`
`27.
`
`28.
`
`29.
`
`30.
`
`31.
`
`
`
`32.
`
`33.
`
`34.
`
`35.
`
`36.
`
`37.
`
`38.
`
`39.
`
`40.
`
`41.
`
`42.
`
`43.
`
`44.
`
`4f
`
`46.
`
`47.
`
`48.
`
`
`
`49.
`
`50.
`
`51.
`
`52.
`
`53.
`
`54.
`
`55.
`
`56.
`
`57.
`
`58.
`
`59.
`
`60.
`
`61.
`
`62.
`
`63.
`
`64.
`
`65.
`
`66.
`
`67.
`
`68.
`
`69.
`
`70.
`
`71.
`
`72.
`
`73.
`
`74.
`
`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`81.
`
`82.
`
`(FRONT)
`
`
`
`(12) United States Patent
`(12) United States Patent
`Moskowitz
`Moskowitz
`
`(54) METHOD FOR COMBINING TRANSFER
`(54) METHOD FOR COMBINING TRANSFER
`FUNCTIONS WITH PREDETERMINED KEY
`FUNCTIONS WITH PREDETERMINED KEY
`CREATION
`CREATION
`
`(76)
`(76)
`
`Notice:
`(*)
`( * ) Notice:
`
`Inventor: Scott A. Moskowitz, 16711 Collins
`Inventor: Scott A. Moskowitz, 16711 Collins
`Ave. #2505, Miami, FL (US) 33160
`Ave. #2505, Miami, FL (US) 33160
`Subject to any disclaimer, the term of this
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`U.S.C. 154(b) by 0 days.
`(21)
`Appl. No.: 09/046,627
`(21) Appl. No.: 09/046,627
`(22)
`Filed:
`Mar. 24, 1998
`(22) Filed:
`Mar. 24, 1998
`Related U.S. Application Data
`Related U.S. Application Data
`Continuation-in-part of application No. 08/587,943, filed on
`(63)
`(63) Continuation-in-part of application No. 08/587,943, filed on
`Jan. 17, 1996, now Pat. No. 5,745,569.
`Jan. 17, 1996, now Pat. No. 5,745,569.
`Int. Cl." ............................. H04L 9/00, G06F 1/02;
`(51)
`(51) Int. C1.7
` HO4L 9/00; GO6F 1/02;
`GO6F 7/58
`G06F 7/58
`(52)
`U.S. Cl. .......................... 713/176; 380/46; 708/254
`(52) U.S. Cl.
` 713/176; 380/46; 708/254
`(58)
`Field of Search ............................ 713/176; 380/53,
`(58) Field of Search
` 713/176; 380/53,
`380/54, 46; 708/254
`380/54, 46; 708/254
`
`(56)
`(56)
`
`References Cited
`References Cited
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`
`4/1980 Hellman et al.
`4,200,770 A
`4,200,770 A 4f1980 Hellman et al.
`4,218,582 A
`8/1980 Hellman et al.
`273/138
`A : s 3. t et al.
` 273/138
`4,339,134 A * 7/1982 Macheel
`4405,829 A SE E. gr f
`4,405,829 A
`9/1983 Rivest et al.
`4.424.414 A 1/1984 Hellman et al
`4,424,414 A
`1/1984 Hellman et al.
`4s.2750s. A 5/1989 Shear
`4,827,508 A
`5/1989 Shear
`4896.275 A
`1/1990 Jackson ...................... 345/668
`4,896,275 A * 1/1990 Jackson
` 345/668
`4977,594. A 12/1990 Shear
`4,977,594 A
`12/1990 Shear
`4,979,210 A 12/1990 Nagata et al.
`4,979,210 A
`12/1990 Nagata et al.
`5,050,213 A 9/1991. Shear
`5,050,213 A
`9/1991 Shear
`5,073,925 A
`12/1991 Nagata et al.
`5,073.925 A : 12/1991 Nagata et al.
` 380/25
`5,369,707 A * 11/1994 Follendore, III
`5,369,707 A * 11/1994 Follendore, III ............. 380/25
`5,406,627 A * 4/1995 Thompson et al. ........... 380/20
`5,406,627 A * 4/1995 Thompson et al.
` 380/20
`5,410,598. A 4/1995 Shear
`5,410,598 A
`4/1995 Shear
`5,469,536 A 11/1995 Blank ......................... 395/131
` 395/131
`5,469,536 A * 11/1995 Blank
`5,497.419 A * 3/1996 Hill
`5,497,419 A * 3/1996 Hill
`
`111111111111111011111111111111f19111i11,1111111111111111111110111111
`
`USOO6598162B1
`(10) Patent No.:
`US 6,598,162 B1
`US 6,598,162 B1
`(to) Patent No.:
`(45) Date of Patent:
`Jul. 22, 2003
`(45) Date of Patent:
`Jul. 22, 2003
`
`
`
`5,513.261. A 4/1996 Maher
`4/1996 Maher
`5,513,261 A
`5,530.739 A 6/1996 Okada et al.
`6/1996 Okada et al.
`5,530,739 A
`5,530,751 A
`6/1996 Morris .......................... 380/4
`380/4
`5,530,751 A * 6/1996 Morris
`5,530,759 A * 6/1996 Braudaway et al. .......... 380/54
`5,530,759 A * 6/1996 Braudaway et al.
`380/54
`5,598,470 A * 1/1997 Cooper et al.
`380/4
`5,598.470 A * 1/1997 Cooper et al. - - - - - - - - - - - - - - - - - 380/4
`(List continued on next page.)
`(List continued on next page.)
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`0649261
`4/1995
`0. 3E /1998
`100523
`9/1998
`9744736
`11/1997
`9744736
`11/1997
`995.2271
`10/1999
`9952271
`10/1999
`9963443
`12/1999
`9963443
`12/1999
`
`EP
`s
`NL
`WO
`WO
`WO
`WO
`WO
`WO
`
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`U.S. Patent Applin Ser. No. 08/587,943, “Method for Ste
`U.S. Patent Appl'n Ser. No. 08/587,943, "Method for Ste-
`ga-Cipher Protection of Computer Code'.
`ga—Cipher Protection of Computer Code".
`U.S. Patent Applin Ser. No. 08/775,216, “Steganographic
`U.S. Patent Appl'n Ser. No. 08/775,216, "Steganographic
`Method and Device".
`Method and Device".
`(List continued on next page.)
`(List continued on next page.)
`
`Primary Examiner-Giberto Barron
`Primary Examiner—Giberto Barron
`Assistant Examiner Douglas J Meislahn
`Assistant Examiner—Douglas J Meislahn
`(74) Attorney, Agent, or Firm Wiley Rein & Fielding LLP
`(74) Attorney, Agent, or Firm—Wiley Rein & Fielding LLP
`(57)
`ABSTRACT
`(57)
`ABSTRACT
`A method for combining transfer functions with predeter
`A method for combining transfer functions with predeter-
`mined key creation. In one embodiment, digital information,
`mined key creation. In one embodiment, digital information,
`including a digital Sample and format information, is pro
`including a digital sample and format information, is pro-
`tected by identifying and encoding a portion of the format
`tected by identifying and encoding a portion of the format
`information. Encoded digital information, including the
`information. Encoded digital information, including the
`digital Sample and the encoded format information, is gen
`digital sample and the encoded format information, is gen-
`erated to protect the original digital information. In another
`erated to protect the original digital information. In another
`embodiment, a digital Signal, including digital Samples in a
`embodiment, a digital signal, including digital samples in a
`file format having an inherent granularity, is protected by
`file format having an inherent granularity, is protected by
`creating a predetermined key. The predetermined key is
`creating a predetermined key. The predetermined key is
`comprised of a transfer function-based mask Set to manipu
`comprised of a transfer function-based mask set to manipu-
`late data at the inherent granularity of the file format of the
`late data at the inherent granularity of the file format of the
`derlving digitized
`1
`underlying digitized samples.
`underlying diglu Zed Samples.
`
`1 Claim, 1 Drawing Sheet
`1 Claim, 1 Drawing Sheet
`
`START )
`
`ENCOO
`ENCODE
`DIGITAL
`DIGITAL
`NFORMATIN
`INFORMATION
`
`110
`110
`
`ID Portion of Format
`iD Portion of Format
`Informatton to be
`information to be
`Encoded
`Encoded
`
`120
`120
`
`130
`30
`
`Generate
`Generate
`Encoded
`Encode:
`Format
`Format
`Information
`Information
`
`Generate
`Generate
`Encoded Digital
`Encoded Digital
`information
`Information
`
`BECODE
`DECODE
`DIGITAL
`DIGITAL
`NFORMATICN
`INFORMATION
`
`Decode With
`Decode With
`Predetermined Key
`Predetermined Key
`
`140
`140
`
`150
`50
`
`Play Digital
`Play Digital
`Information
`Information
`
`V
`( END
`
`)
`
`DISH-Blue Spike-842
`Exhibit 1006, Page 0006
`
`
`
`US 6,598,162 B1
`US 6,598,162 B1
`Page 2
`Page 2
`
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`
`- - - - - - - - - - - - 380/4
`
`- - - - - - - - - - - 380/25
`
`380/4
`380/25
`
`ss
`
`U.S. Patent Applin Ser. No. 08/587,944, “Human Assisted
`U.S. Patent Appl'n Ser. No. 08/587,944, "Human Assisted
`Random Key Generation . . .”.
`Random Key Generation . . .".
`U.S. Patent Applin Ser. No. 08/677,435, “Optimization
`U.S. Patent Appl'n Ser. No. 08/677,435, "Optimization
`Methods for the Insertion, Protection and . . .”.
`380/28 Methods for the Insertion, Protection and . . .".
`U.S. Patent Applin Ser. No. 08/772,222, “Z Transform
`U.S. Patent Appl'n Ser. No. 08/772,222, "Z—Transform
`380/4
`380/4
`Implementation of Digital Watermarks”.
`380/4
`Implementation of Digital Watermarks".
`Schneier, Bruce, Applied Cryptography, 2nd ed., pp:
`Schneier, Bruce, Applied Cryptography, 2nd ed., pp:
`311-313.
`311-313.*
`Schneier, Bruce, Applied Cryptography, 1996, pp. 270-273,
`Schneier, Bruce, Applied Cryptography, 1996, pp. 270-273,
`53, 33, 38.*
`53, 33, 38.*
`Horowitz, Paul and Winfield Hill, The Art of Electronics,
`Horowitz, Paul and Winfield Hill, The Art of Electronics,
`1989, p. 7.*
`1989, p. 7.*
`Schneier, Bruce, Applied Cryptography 1996, John Wiley &
`Schneier, Bruce, Applied Cryptography 1996, John Wiley &
`Sons, Inc. 2" ed., p. 41.*
`Sons, Inc. 2,d ed., p. 41.*
`International Search Report in corresoponding PCT/US00/
`International Search Report in corresoponding PCT/US00/
`18411.
`18411.
`PCT Invitation to Pay Additional Fees in International
`PCT Invitation to Pay Additional Fees in International
`Application No. PCT/US00/18411.
`Application No. PCT/US00/18411.
`Bender, et al., “Techniques for data hiding” IBM Systems
`Bender, et al., "Techniques for data hiding" IBM Systems
`Journal, vol. 35, Nos. 3&4, 1996.
`Journal, vol. 35, Nos. 3&4, 1996.
`* cited by examiner
`* cited by examiner
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`Cooperman et al.
`5,613,004
`3/1997
`3/1997 Cooperman et al.
`5,613,004 A
`5,625,690
`Michel et al.
`* 4/1997
`5,625,690 A * 4/1997 Michel et al.
`5,633,932
`* 5/1997
`Davis et al. .......
`5,633,932 A * 5/1997 Davis et al.
`Leighton
`5,664,018
`9/1997
`5,664,018 A
`9/1997 Leighton
`5,687,236
`Moskowitz et al.
`* 11/1997
`5,687,236 A * 11/1997 Moskowitz et al.
`5,719.937
`Warren et al.
`* 2/1998
`5,719,937 A * 2/1998 Warren et al.
`Cooper et al. .....
`5,737.416
`* 4/1998
`5,737,416 A * 4/1998 Cooper et al.
`Moskowitz et al.
`5,745,569
`Moskowitz et al.
`4/1998
`5,745,569 A
`4/1998
`5,765,152
`Erickson ............
`* 6/1998
`5,765,152 A *
`6/1998
`Erickson
`5,799,083
`Brothers et al. ...
`* 8/1998
`5,799,083 A *
`8/1998
`Brothers et al.
`10/1998 Moskowitz et al.
`5,822.432
`Moskowitz et al.
`10/1998
`5,822,432 A
`Daly et al. .........
`5,859920
`* 1/1999
`5,859,920 A * 1/1999 Daly et al.
`5,870.474
`Wasilewski et al.
`2/1999
`5,870,474 A * 2/1999 Wasilewski et al.
`5,889,868
`Moskowitz et al.
`3/1999
`5,889,868 A
`3/1999 Moskowitz et al.
`Conley ..............
`5,894,521
`* 4/1999
`5,894,521 A *
`4/1999
`Conley
`Moskowitz et al.
`5,905,800
`5/1999
`Moskowitz et al.
`5,905,800 A
`5/1999
`5,912,972
`6/1999
`Barton ..............
`5,912,972 A * 6/1999 Barton
`5,930,369
`Cox et al. ...
`7/1999
`5,930,369 A * 7/1999 Cox et al.
`5,930,377
`Powell et al. ..
`7/1999
`5,930,377 A * 7/1999 Powell et al.
`5,963,909
`Warren et al. .
`10/1999
`5,963,909 A * 10/1999 Warren et al.
`5,973,731
`Schwab .............
`10/1999
`5,973,731 A * 10/1999 Schwab
`5,974,141
`Saito
`10/1999
`5,974,141 A
`10/1999 Saito
`5.999.217
`12/1999
`Berners-Lee .......
`5,999,217 A * 12/1999 Berners-Lee
`6,041,316
`Allen ................
`3/2000
`6,041,316 A * 3/2000 Allen
`6,081,251
`Sakai et al. .
`6/2000
`6,081,251 A * 6/2000 Sakai et al.
`6.278,780
`Shimada ............
`8/2001
`1.
`6,278,780 B1 * 8/2001 Shimada
`
`- - - - - - - - - - 380/28
`
`- - - - - - - - - - - - 380/4
`
`- - - - - - - - - - - - 707/9
`
`707/9
`380/200
`
`- - - - - - - - - 380/200
`
`- - - - - - - - - 382/115
`
`382/115
`380/211
`
`- - - - - - - - 380/211
`
`- - - - - - - - - - 380/54
`
`380/54
`
`- - - - - - - - - - 380/23
`
`380/23
`380/54
`... 382/100
`382/100
`705/1
`348/161
`
`- - - - - - 380/54
`
`- - - - - - - 705/1
`
`- - - - - - - - - 348/161
`
`- - - - - - - - - 348/390
`
`- - - - - - - - - - 705/52
`
`348/390
`705/52
`345/670
`345/670
`380/47
`
`- - - - - - - - - - 380/47
`
`
`
`DISH-Blue Spike-842
`Exhibit 1006, Page 0007
`
`
`
`U.S. Patent
`U.S. Patent
`
`Jul. 22, 2003
`Jul. 22, 2003
`
`US 6,598,162 B1
`US 6,598,162 B1
`
`ENCODE
`ENCODE
`DIGITAL
`DIGITAL
`INFORMATION
`INFORMATION
`
`DECODE
`DECODE
`DIGITAL
`DIGITAL
`INFORMATION
`INFORMATION
`
`
`
`
`
`
`
`
`
`
`
`C START )
`
`110'
`
`ID Portion of Format
`D Portion of Format
`Information to be
`information to be
`Encoded
`Encoded
`
`120
`120
`
`130
`130
`
`
`
`
`
`
`
`Generate
`Generate
`Encoded
`Encoded
`Format
`Format
`Information
`Information
`
`4.
`
`Generate
`Generate
`Encoded Digital
`Encoded Digital
`Information
`Information
`
`/
`
`140
`
`
`
`Decode With
`Decode With
`Predetermined Key
`Predetermined Key
`
`4.
`
`150
`150
`
`Play Digital
`Play Digital
`Information
`Information
`
`FIG. 1
`FIG 1
`
`V
`END
`
`(
`
`DISH-Blue Spike-842
`Exhibit 1006, Page 0008
`
`
`
`1
`1
`METHOD FOR COMBINING TRANSFER
`METHOD FOR COMBINING TRANSFER
`FUNCTIONS WITH PREDETERMINED KEY
`FUNCTIONS WITH PREDETERMINED KEY
`CREATION
`CREATION
`
`CROSS-REFERENCE TO RELATED
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`APPLICATIONS
`This application is a continuation-in-part of U.S. patent
`This application is a continuation-in-part of U.S. patent
`application Ser. No. 08/587,943, filed Jan. 17, 1996, (which
`application Ser. No. 08/587,943, filed Jan. 17, 1996, (which
`issued Apr. 28, 1998, as U.S. Pat. No. 5,745,569) entitled
`issued Apr. 28, 1998, as U.S. Pat. No. 5,745,569) entitled
`“Method for Stega-Cipher Protection of Computer Code',
`"Method for Stega-Cipher Protection of Computer Code",
`the entire disclosure of which is hereby incorporated by
`the entire disclosure of which is hereby incorporated by
`reference.
`reference.
`
`FIELD OF THE INVENTION
`FIELD OF THE INVENTION
`The invention relates to the protection of digital informa
`The invention relates to the protection of digital informa-
`tion. More particularly, the invention relates to a method for
`tion. More particularly, the invention relates to a method for
`combining transfer functions with predetermined key cre
`combining transfer functions with predetermined key cre-
`ation.
`ation.
`
`BACKGROUND OF THE INVENTION
`BACKGROUND OF THE INVENTION
`Increasingly, commercially valuable information is being
`Increasingly, commercially valuable information is being
`created and Stored in “digital” form. For example, music,
`created and stored in "digital" form. For example, music,
`photographs and Video can all be Stored and transmitted as
`photographs and video can all be stored and transmitted as
`a Series of numbers, Such as 1's and 0's. Digital techniques
`a series of numbers, such as l's and 0's. Digital techniques
`let the original information be recreated in a very accurate
`let the original information be recreated in a very accurate
`manner. Unfortunately, digital techniques also let the infor
`manner. Unfortunately, digital techniques also let the infor-
`mation be easily copied without the information owner's
`mation be easily copied without the information owner's
`permission.
`permission.
`Because unauthorized copying is clearly a disincentive to
`Because unauthorized copying is clearly a disincentive to
`the digital distribution of valuable information, it is impor
`the digital distribution of valuable information, it is impor-
`tant to establish responsibility for copies and derivative
`tant to establish responsibility for copies and derivative
`copies of Such works. For example, if each authorized digital
`copies of such works. For example, if each authorized digital
`copy of a popular Song is identified with a unique number,
`copy of a popular song is identified with a unique number,
`any unauthorized copy of the Song would also contain the
`any unauthorized copy of the song would also contain the
`number. This would allow the owner of the information,
`number. This would allow the owner of the information,
`Such as a Song publisher, to investigate who made the
`such as a song publisher, to investigate who made the
`unauthorized copy. Unfortunately, it is possible that the
`unauthorized copy. Unfortunately, it is possible that the
`unique number could be erased or altered if it is simply
`unique number could be erased or altered if it is simply
`tacked on at the beginning or end of the digital information.
`tacked on at the beginning or end of the digital information.
`As will be described, known digital “watermark' tech
`As will be described, known digital "watermark" tech-
`niques give creators and publishers of digitized multimedia
`niques give creators and publishers of digitized multimedia
`content localized, Secured identification and authentication
`content localized, secured identification and authentication
`of that content. In considering the various forms of multi
`of that content. In considering the various forms of multi-
`media content, Such as “master, Stereo, National Television
`media content, such as "master," stereo, National Television
`Standards Committee (NTSC) video, audio tape or compact
`Standards Committee (NTSC) video, audio tape or compact
`disc, tolerance of quality will vary with individuals and
`disc, tolerance of quality will vary with individuals and
`affect the underlying commercial and aesthetic value of the
`affect the underlying commercial and aesthetic value of the
`content. For example, if a digital version of a popular Song
`content. For example, if a digital version of a popular song
`Sounds distorted, it will be less valuable to users. It is
`sounds distorted, it will be less valuable to users. It is
`therefore desirable to embed copyright, ownership or pur
`therefore desirable to embed copyright, ownership or pur-
`chaser information, or Some combination of these and
`chaser information, or some combination of these and
`related data, into the content in a way that will damage the
`related data, into the content in a way that will damage the
`content if the watermark is removed without authorization.
`content if the watermark is removed without authorization.
`To achieve these goals, digital watermark Systems insert
`To achieve these goals, digital watermark systems insert
`ownership information in a way that causes little or no
`ownership information in a way that causes little or no
`noticeable effects, or “artifacts,” in the underlying content
`noticeable effects, or "artifacts," in the underlying content
`Signal. For example, if a digital watermark is inserted into a
`signal. For example, if a digital watermark is inserted into a
`digital version of a Song, it is important that a listener not be
`digital version of a song, it is important that a listener not be
`bothered by the slight changes introduced by the watermark.
`bothered by the slight changes introduced by the watermark.
`It is also important for the watermark technique to maximize
`It is also important for the watermark technique to maximize
`the encoding level and "location Sensitivity” in the Signal to
`the encoding level and "location sensitivity" in the signal to
`force damage to the content Signal when removal is
`force damage to the content signal when removal is
`attempted. Digital watermarks address many of these
`attempted. Digital watermarks address many of these
`concerns, and research in the field has provided extremely
`concerns, and research in the field has provided extremely
`robust and Secure implementations.
`robust and secure implementations.
`
`US 6,598,162 B1
`US 6,598,162 B1
`
`2
`2
`What has been overlooked in many applications described
`What has been overlooked in many applications described
`in the art, however, are Systems which closely mimic dis
`in the art, however, are systems which closely mimic dis-
`tribution of content as it occurs in the real world. For
`tribution of content as it occurs in the real world. For
`instance, many watermarking Systems require the original
`instance, many watermarking systems require the original
`un-watermarked content Signal to enable detection or decode
`5 un-watermarked content signal to enable detection or decode
`operations. These include highly publicized efforts by NEC,
`operations. These include highly publicized efforts by NEC,
`Digimarc and others. Such techniques are problematic
`Digimarc and others. Such techniques are problematic
`because, in the real world, original master copies reside in a
`because, in the real world, original master copies reside in a
`rights holders vaults and are not readily available to the
`rights holders vaults and are not readily available to the
`public.
`10 public.
`With much activity overly focused on watermark
`With much activity overly focused on watermark
`Survivability, the Security of a digital watermark is Suspect.
`survivability, the security of a digital watermark is suspect.
`Any Simple linear operation for encoding information into a
`Any simple linear operation for encoding information into a
`Signal may be used to erase the embedded Signal by invert
`signal may be used to erase the embedded signal by invert-
`ing the process. This is not a difficult task, especially when
`15 ing the process. This is not a difficult task, especially when
`15
`detection Software is a plug-in freely available to the public,
`detection software is a plug-in freely available to the public,
`Such as with Digimarc. In general, these Systems Seek to
`such as with Digimarc. In general, these systems seek to
`embed cryptographic information, not cryptographically
`embed cryptographic information, not cryptographically
`embed information into target media content.
`embed information into target media content.
`Other methods embed ownership information that is
`20 Other methods embed ownership information that is
`plainly visible in the media Signal, Such as the method
`plainly visible in the media signal, such as the method
`described in U.S. Pat. No. 5,530,739 to Braudaway et al. The
`described in U.S. Pat. No. 5,530,739 to Braudaway et al. The
`System described in Braudaway protects a digitized image
`system described in Braudaway protects a digitized image
`by encoding a visible watermark to deter piracy. Such an
`by encoding a visible watermark to deter piracy. Such an
`implementation creates an immediate weakness in Securing
`25 implementation creates an immediate weakness in securing
`25
`the embedded information because the watermark is plainly
`the embedded information because the watermark is plainly
`Visible. Thus, no Search for the embedded signal is necessary
`visible. Thus, no search for the embedded signal is necessary
`and the watermark can be more easily removed or altered.
`and the watermark can be more easily removed or altered.
`For example, while certainly useful to Some rights owners,
`For example, while certainly useful to some rights owners,
`Simply placing the Symbol iO" in the digital information
`30 simply placing the symbol "10" in the digital information
`would only provide limited protection. Removal by adjust
`would only provide limited protection. Removal by adjust-
`ing the brightness of the pixels forming the "O" would not
`ing the brightness of the pixels forming the "10" would not
`be difficult with respect to the computational resources
`be difficult with respect to the computational resources
`required.
`required.
`Other relevant prior art includes U.S. Pat. Nos. 4,979,210
`Other relevant prior art includes U.S. Pat. Nos. 4,979,210
`and 5,073,925 to Nagata et al., which encodes information
`and 5,073,925 to Nagata et al., which encodes information
`by modulating an audio signal in the amplitude/time
`by modulating an audio signal in the amplitude/time
`domain. The modulations introduced in the Nagata process
`domain. The modulations introduced in the Nagata process
`carry a "copy/don’t copy' message, which is easily found
`carry a "copy/don't copy" message, which is easily found
`and circumvented by one skilled in the art. The granularity
`40 and circumvented by one skilled in the art. The granularity
`40
`of encoding is fixed by the amplitude and frequency modu
`of encoding is fixed by the amplitude and frequency modu-
`lation limits required to maintain inaudibility. These limits
`lation limits required to maintain inaudibility. These limits
`are relatively low, making it impractical to encode more
`are relatively low, making it impractical to encode more
`information using the Nagata process.
`information using the Nagata process.
`Although U.S. Pat. No. 5,664,018 to Leighton describes a
`45 Although U.S. Pat. No. 5,664,018 to Leighton describes a
`45
`means to prevent collusion attacks in digital watermarks, the
`means to prevent collusion attacks in digital watermarks, the
`disclosed method may not actually provide the Security
`disclosed method may not actually provide the security
`described. For example, in cases where the watermarking
`described. For example, in cases where the watermarking
`technique is linear, the “insertion envelope” or “watermark
`technique is linear, the "insertion envelope" or "watermark-
`ing Space' is well-defined and thus Susceptible to attacks
`50 ing space" is well-defined and thus susceptible to attacks
`50
`leSS Sophisticated than collusion by unauthorized parties.
`less sophisticated than collusion by unauthorized parties.
`Over-encoding at the watermarking encoding level is but
`Over-encoding at the watermarking encoding level is but
`one simple attack in Such linear implementations. Another
`one simple attack in such linear implementations. Another
`consideration not made by Leighton is that commercially
`consideration not made by Leighton is that commercially-
`valuable content may already exist in a unwatermarked form
`55 valuable content may already exist in a unwatermarked form
`55
`Somewhere, easily accessible to potential pirates, gutting the
`somewhere, easily accessible to potential pirates, gutting the
`need for any type of collusive activity. Digitally signing the
`need for any type of collusive activity. Digitally signing the
`embedded Signal with preprocessing of watermark data is
`embedded signal with preprocessing of watermark data is
`more likely to prevent Successful collusion. Furthermore, a
`more likely to prevent successful collusion. Furthermore, a
`“baseline' watermark as disclosed is quite Subjective. It is
`60 "baseline" watermark as disclosed is quite subjective. It is
`60
`Simply described elsewhere in the art as the “perceptually
`simply described elsewhere in the art as the "perceptually
`Significant” regions of a signal. Making a watermarking
`significant" regions of a signal. Making a watermarking
`function less linear or inverting the insertion of watermarks
`function less linear or inverting the insertion of watermarks
`would seem to provide the same benefit without the addi
`would seem to provide the same benefit without the addi-
`tional work required to create a “baseline' watermark.
`65 tional work required to create a "baseline" watermark.
`65
`Indeed, watermarking algorithms should already be capable
`Indeed, watermarking algorithms should already be capable
`of defining a target insertion envelope or region without
`of defining a target insertion envelope or re