throbber
4:18-34
`
`, 4:35 to 5:22
`
`5:23-34 - Blank
`
`5:25 "SUMMARY OF THE INVENTTO/'4"
`
`5:26-34
`
`5:35 to 6:9
`
`6:10 - Blank
`
`6:1T "DETAILED DESCR1PTTOW'
`
`6:12 -to 7:18
`
`7:19-36
`
`8:1-24
`
`8:25 to 9:21
`
`9:22 to 10:6
`
`10:7-11:8
`
`11:9,24
`
`11:25-34
`
`11:35 to 12:2
`
`12:3-35
`
`12:36 to 13:22
`
`13:23-30
`
`13:31 to 14:34
`
`14:35 to 15:17
`
`15:18-26
`(DiscLosuRE ENDS AT 15:26)
`
`1V.
`
`Jurat
`
`2:64 to 3:12
`
`3:13-36
`
`7:22-29
`
`7:30-49
`
`11:17-55
`
`11:56 to 12:4
`
`12:545
`
`12:26-55
`
`12:56 to 13:8
`
`13:9-44
`
`13:45-59
`
`13:60-67
`
`14:1-6
`
`14:7-34
`
` 14:35-56
`
`14:57-64
`
`14:65 to 15:35
`
`15:36-53
`
`i 5;54-61
`
`.
`
`.
`
`..
`
`-............
`
`1 have been warned that-willful false statements and the like are punishable by firm or
`22.
`imprisonment, or both (18 U.S.C. 1001) and may jeopardize the validity of the application or any
`
`Page 15 of 16
`
`Attachment 11 Page 15 of 16
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0301
`
`

`

`patent. i5suing thereon. AI staternenk; n make in the declaration 1 either know to be true or on
`information fInd belief f believe them to be true.
`
`4');
`
`SCOTI:M. PiKOW 117,
`•
`
`a
`
`5 of 16
`
`Attachment 11 Page 16 of 16
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0302
`
`

`

`U.S. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`
`PATENT APPLICATION TRANSMITTAL LETTER
`
`ATTORNEY DOCKET NUMBER:
`1607,6
`
`istant Commissioner for Patents.
`hington D.C. 20231
`
`unsmitted herewith for filing is the patent application of
`
`Invent° s.
`
`Scott A. Moskowitz
`
`o 1.4
`
`to
`4"!
`
`For
`
`METHOD FOR COMBINING TRANSFER FUNCTIONS WITH PREDETERMINED KEY
`CREATION
`
`Enclosed are:
`
`1. 17 sheets of specification, 8 sheets adclairns, and I sheet of abstract
`
`2.
`
`1 sheet(s) of drawings.
`
`3. Executed Declaration/Power of Attorney.
`
`4, Executed Verified Statement (Declaration) Claiming Small. Entity Status -Independent Inventor.
`
`The filing fee has been calculated as shown below:
`
`NUMBER FILED
`
`NUMBER
`EXTRA'
`
`RATE (8)
`
`FEE (S)
`
`BASIC FEE
`
`TOTAL CLAIMS
`
`INDEPENDENT CLAIMS
`
`6
`
`MULTIPLE DEPENDENT CLAIM
`PRESENT
`
`FEE FOR RECORDATION OF ASSIGNMENT
`
`Number extra must be zero or larger
`
`20
`
`9
`
`3
`
`790.00
`
`22..00
`
`82.00
`
`270.00
`
`40.00
`
`TOTAL
`
`If applicant is a small entity under :37 C.F.R. § 1.9
`and 1.27, then divide total fee by 2, and enter amount here.
`
`SMALL ENTITY
`TOTAL
`
`5 790.00
`
`S 198.00
`
`246.00
`
`1,234.00
`
`5 617.00
`
`The Office is authorized to charge the filing fee of $ 617,00 to Deposit Account No. 11-0600. The Office is
`further authorized to charge any additional fees or credit any overpayments to the above deposit account number.
`A copy of this letter is being submitted to facilitate processing of this application.
`
`at,641
`
`eig.101/
`
`Patrick J. Buckley (Reg. No. 40,928)
`
`Dated: March 24, 1998
`
`KENYON & KENYON
`1025 Connecticut Avenue, N. W_
`Suite 600
`Washington, D.C. 20036-5405.
`(202) 429-1776 (202)429-0796 (fax)
`
`Attachment 13 Page 1 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0303
`
`

`

`Docket No.: 1607/6
`
`METHOD FOR COMBINING TRANSFER FUNCTIONS
`WITH PREDETERMINED KEY CREATION
`
`FIELD OF THE .INVENTION
`
`The invention relates to the protection of digital information. More particularly, the
`
`invention relates to a method for combining transter. functions with predetermined key creation.
`
`COS
`
`E
`
`'E TO R
`
`D
`
` PLICATIONS
`
`This application claims the benefit of U.S. patent application Serial No. 08/587,943, filed
`
`January 17, 1996, entitled "Method for Stega-Cipher Protection of Computer Code," the entire
`
`disclosure of which is hereby incorporated by reference.
`
`lo
`
`is
`
`BA I.t Rt3I_ 1C3 t?'TIiI INVENTION
`
`increasingly, commercially vvaluable information is being created and stored in "digital"
`
`form. For example, music, photographs and video can all be stored and transmitted as a series of
`
`20
`
`numbers, such as is and O's. Digital. techniques let the original information be recreated in a
`
`very accurate manner. Untbrtunately„ digital techniques also let the infommtion be easily copied
`
`without the infortnati
`
`owner's permission.
`
`it',32C0
`
`Attachment 13 Page 2 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0304
`
`

`

`Docket No.: 1607/6
`
`Because unauthorized copying is clearly a disincentive to the digital distribution of
`
`valuable information, it is important to establish responsibility for copies and derivative copies of
`
`such works. For example, if each authorized digital copy of a popular song is identified with a
`
`unique number, any unauthorized copy of the song would also contain the number. This would
`
`allow the owner of the information, such as a song publisher, to i
`
`-stigate who made the
`
`unauthorized copy. Unfortunately, it is possible. that the unique number could be erased or
`
`altered if it is simply tacked on
`
`he beginning or end of the digital information.
`
`As will be described, known digital "watermark" techniques give creators and publishe
`
`of digitized multimedia content localized, secured identification and authentication of that
`
`content. In considering the various forms of multimedia content, such as "master." stereo,
`
`National Television Standards Committee (NTSC) video, audio tape or compact disc, tolerance
`
`of quality will vary with individuals and affect the underlying commercial and aesthetic value of
`
`the content. For example, if a digital version of a popular song sounds distorted, it will be less
`
`valuable to users. It is therefore desirable to embed copyright, rwwnership or purchaser
`
`15
`
`information, or some. combination of these and related data, into the content in a way that will
`
`damage the content if the watermark is removed without authorization.
`
`To achieve these goals, digital watermark systems insert ownership information in a way
`
`that causes little or no noticeable effects, or "artifacts, in the underlying content signal. For
`
`example,
`
`digital watermark is inserted into a digital version of a song, it is important that a
`
`20
`
`listener not be bothered by the slight changes introduced by the watermark. It is also important
`
`for the watermark technique to maximize the encoding level and "location sensitivity" in the
`
`Attachment 13 Page 3 0 1
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0305
`
`

`

`Docket No.: 160716
`
`signal to force damage to the content signal when removal is attempted. Digital watermarks
`
`address many of these concerns, and research in the field has provided e ctreritely robust z . )d
`
`secure implementations.
`
`What has been overlooked in many applications described in the art, however, are
`
`5
`
`systems which closely mimic distribution of content as it occurs in the real world. For instance,
`
`many watermarking systems require the original un-watermarked content signal to enable
`
`detection r decode operations. These include highly publicized efforts by NEC, Digimarc and
`
`others. Such techniques are problematic because, in the real world, original master copies reside
`
`in a rights holders vaults and are not readily available to the public.
`
`With much activity overly focused on wateimark. survivability, the security of a digital
`
`watermark is suspect. Any simple linear operation for encoding info
`
`n into a signal may be
`
`used to erase the embedded signal by inverting the process. This is not a difficult task, especially
`
`when detection software is a plug-in freely available to the public, such as with Digimarc. in
`
`general, these systems seek to embed cryptographic information, not cryptographically embed
`
`15
`
`information into target media content.
`
`Other methods embed ownership information that is plainly visible n the media signal,
`
`such as the method described in US Patent No. 5,530,739 to Braudaway et al. The system
`
`described in Braudaway protects a digitized image by encoding a visible w ateimark to deter
`
`piracy. Such an implementation creates an immediate weakness in securing the embedded
`
`20
`
`information because the watermark is plainly visible. Thus, no search for the embedded signal is
`
`necessary and the watermark can be more easily removed or altered. For example, while
`
`3
`Attachment 13 Page 4 o 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0306
`
`

`

`Docket No.: 1607/6
`
`certainly useful to some rights owners, simply placing the symbol "0" in the digital information
`
`would only provide limited protection. Removal by adjusting the brightness of the pixels
`
`forming the V" would not be difficult with respect to the co p rational resources required.
`
`Other relevant prior art includes US Patents No. 4,979,210 and 5,073,925 to Nagata et
`
`which encodes information by modulating an audio signal. in the mplitudeltime domain. The
`
`modulations introduced in the Nagata process arry a "copy/don't copy" message, whiCh is easily
`
`found and circumvented by one skilled in the art. The granularity of encoding is fixed by the
`
`amplitude and frequency modulation limits required to maintain inaudibility. These limits are
`
`relatively low, making it impractical to encode more information using the Nagata process.
`
`Although US Patent No, 5,664,018 to Leighton describes a means to prevent collusion
`
`attacks in digital watermarks, the disclosed method may not actually provide the security
`
`described. For example, in cases Where the watermarking technique is linear, the"insertion
`
`envelope" or 'watermarking space" is well-defined and thus susceptible to attacks less
`
`sophisticated than collusion by unauthorized parties. Over-encoding at the watermarking
`
`15
`
`encoding level is but one simple attack itt such linear implementations. Another consideration
`
`not made by Leighton is that commercially-valuable content may already exist in a un-
`
`watermarked fonn somewhere, easily accessible to potential pirates, gutting the need for any type
`
`of collusive activity. Digitally signing the embedded signal with preprocessing of watermark
`
`data is more likely to prevent successful collusion. Furthermore, a "baselinewatermark as
`
`20
`
`disclosed is quite subjective. It is simply described elsewhere in the art as the "perceptually
`
`significant" regions of a signal. Making a watermarking function less linear or inverting the
`
`tf,<I1n,e)
`
`4
`Attachment 13 Page 5 o 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0307
`
`

`

`Docket No.: 1607/6
`
`insertion of watermarks would seem to provide the same benefit without the additional work
`
`required to create a "baseline" watermark. Indeed, watermarking algorithms should already be
`
`capable of detinim, a target insertion envelope or region with nit additional steps, What is
`
`evident is the Leighton patent does not allow for initial prevention of attacks on an embedded
`
`watermark as the content is visibly or audibly unchanged.
`
`It is also important. that any method for providing security also function with broadcasting
`
`media over networks such as the Internet, which is also referred to as `'streaming." Commercial
`
`"plug-in" products such as RealAudio and RealVideo, as well as applications by vendors
`
`VDONet and Xtreme, are common in such network environments. Most digital watermark
`
`implementations focus on common file base signals and fail to anticipate the security of streamed
`
`signals. It is desirable that any protection scheme be able to function with a plug-in player
`
`a
`
`without advanced knowledge of the encoded media stream.
`
`Other technologies focus solely on file-based security. These technologies illustrate the
`
`varying applications for security that must be evaluated for different media and distribution
`
`15
`
`environments. Use of cryptolopes or cryptographic containers,as proposed by IBM in its
`
`CryTtolope product, and InterTrust, as described in U.S. Patents No. 4,827,508, 4,977,594,
`
`5,050,213 and 5,410,598, may discourage certain forms of .piracy. Cryptographic containers,
`
`however, require a user to subscribe to particular decryption software to decrypt data. IBM's
`
`InfoMarket and InterTrusts DigiBox, among other implementations, provide a generalized
`
`20
`
`model and need prop
`
`architt-tt - to function. Every user must have a subscription or
`
`registration with the party which encrypts the data. Again, ass a form of general encryption, the
`
`5
`Attachment 3 Page 6 o 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0308
`
`

`

`Docket No.: 160716
`
`data is scrambled or encrypted without regard to the media and its formatting. Finally, control
`
`over copyrights or other neighboring rights is left with the implementing party, in this case, IBM,
`
`lnterTrust or a similar provider.
`
`Methods similar to these "trusted systems" exist, and Cerberus Central. Limited and
`
`Liquid Audio, among a number of companies, offer systems which may functionally be thought
`
`of as subsets of IBM and Inter T'rust's more generalized security offerings. Both Cerberus and
`
`Liquid Audio propose proprietary 1 y software which is registered to the user and "locked" in
`
`a manner parallel to the locking of content that is distributed via a cryptographic container. The
`
`economic trade-off in this iriodel is that users arc required to use each respective companies'
`
`proprietary player to play or otherwise anipulate content that is downloaded. If, as is the case
`
`presently, most music or other media is not available via these proprietary players amid more
`
`companies propose non-compatible player formats, the proliferation of players will continue.
`
`Cerberus and Liquid Audio also by way of extension of their ambit -tures provide for "near-CIS
`
`quality" but proprietary compression. This requirement stems from the necessity not to allow
`
`4
`
`pis
`
`15
`
`content that has near-identical data make-up to an existing consumer electronic standard, in
`
`Cerberus and Liquid Audio's case the so-called Red Book audio CD standard oft 6 bit 44.1 kHz,
`
`so that comparisons with the proprietary file may not yield how the player
`
`secured..
`
`Knowledge of the player's file format renders its security ineffictive as a file may he replicated
`
`and played on any common player, not the intended proprietary player of the provider of
`
`20
`
`previously secured and uniquely formatted content. This is the parallel
`
`akness to public key
`
`1 32
`
`6
`Attachment 3 Page 7 o 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0309
`
`

`

`Docker No.: 1607/6
`
`crypto-systems Which have gutted security if enough plain text and cipher ext comparisons
`
`enable a pirate to determine the user's private key.
`
`Many approaches to digital watermarking leave detection and decoding control with the
`
`implementing party of the digital watermark, not the creator of the work to be protected. A set of
`
`secure digital watermark implementations address this fundamental control issue forming the
`
`basis of key-based approaches. These are covered by the following patents and pending
`
`applications, the entire disclosures of which are hereby incorporated by reference: US Patent No.
`
`5,613, 004 entitled "Steganographic Method and Device" and its derivative US patent application
`
`Serial No. 08/775,216, US patent application Serial No. 08/587,944 entitled "Human Assisted
`
`Random Key Generation and Application for Digital Watermark. System," US Patent Application
`
`Serial No. 08/587,943 entitled "Method for Stega-Cipher Protection of Computer Code," US
`
`patent application Serial No. 08/677,435 entitled "Optim.iz non Methods for the Insertion,
`
`Protection, and Detection of Digital Watermarks in Digitized Data," and US Patent Application
`
`Serial No. 08/772,222 entitled "I-TranstbrmImplementation of Digital Watermarks." Public
`
`I5
`
`key ernto-systems are described in US Patents No. 4,200,770, 4,218,582, 4,405,829 and
`
`4,424,414, the entire disclosures of which are also hereby incorporated by reference.
`
`in particular, an improved protection scheme is described in "Method for Stega-Cipher
`
`Protection of Computer Code," US patent application Serial No. 08/587,943. This technique
`
`uses the key-based insertion of binary executable computer code within a content signal that is
`
`20
`
`subsequently, and necessarily, used to play or otherwise manipulate the signal in which it is
`
`encoded. With this system, however, certain coi ptrtatronal requirements, such as one digital
`
`7
`Attachment 1 Page 8 o 1
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0310
`
`

`

`Docket No.: 1607/6
`
`player per digital copy of content, may be necessitated. For instance, a consumer may download
`
`many copies of watermarked content. With this technique, the user would also be downloading
`
`as many copies of the digital player program. While this form of security a, be desirable for
`
`some applications, it is not appropriate in many circumstances.
`
`Finally, even when digital information is distributed in encoded form, it may be desirable
`
`to allow unauthorized users to play the information with a digital player, perhaps with a reduced
`
`level of quality. For example, a popular song may be encoded and freely distributed in encoded.
`
`form to the public. The public, perhaps • sing commonly available plug-in digital players, could
`
`play the encoded content and hear the music in sorrae degraded form. The music may sound
`
`choppy, or fuzzy or he degraded in some other way. This lets the public decide, based on the
`
`available lower quality version of the song, if they want to purchase a key from the publisher to
`
`decode, or "clean-cap," the content. Similar approaches could be used to distribute blurry pictures
`
`or low quality video. Or even "degraded" text, in the sense that .only authenticated portions of
`
`the text can be determined with the predetermined key or a validated digital signature For he
`
`15
`
`intended message.
`
`In view of the foregoing, it can be appreciated that a substantial need exists for a method
`
`allowing encoded content to be played, with degraded quality, by a plug-in digital player, and
`
`solving the other problems discussed above.
`
`1532t0
`
`8
`Attachment 13 Page 9 o 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0311
`
`

`

`SUMMARY OF THE Rsi " NT
`
`Docket No.: 1607/6
`
`The disadvantages of the art are alleviated o a great extent by a method for combining
`
`transfer functions with predetermined key creation. In one embodiment, digital information,
`
`including a digital sample and format information, is protected by identifying and encoding a
`
`portion of the format information. Encoded digital information, including the digital sample and
`
`the encoded format information, is generated to protect the original digital information.
`
`In another embodiment, a digital signal., including digital samples in a file format having
`
`an inherent granularity, is protected by creating a predetermined key. The predetermined key is
`
`comprised of a .tr.: .sfer function-based mask set to manipulate data at the inherent granularity of
`
`the tile format If the underlying digitized samples.
`
`With these and other advantages and features of the invention that will be o,
`
`hereinafter apparent, the nature of the invention may be more clearly understood by reference to
`
`the f011owing detailed description of the invention, the appended claims and to the several
`
`5
`
`drawings attached herein.
`
`BRIEF DESCRIDION_ F THE DRA
`
`FIG. 1 is a block flow diagram of a method for copy protection or authentication of
`
`digital information
`
`ccording
`
`an embodiment of the present
`
`,ention,
`
`1$7,nr$
`
`Attachment
`
`9
`Page 10 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0312
`
`

`

`DETAILED DESCRIPTION
`
`Docket No.: 1607/6
`
`In accordance with an embodiment of the present invention, a method combines transfer
`
`functions with predetermined key creation. Increased security is achieved in the method by
`
`5
`
`combining elements of "public-key steganography" with cryptographic protocols, which keep
`
`in-transit data secure by scrambling the data with "keys
`
`r
`
`r that is not apparent to those
`
`with access to the content to be distributed. Because different forms of randomness are
`
`combined to oiler robust, distributed security, the present invention addresses an architectural
`
`gray space" between two important areas of security: digital watermarks, a subset of the more
`
`general art of steganography, and cryptography. One form of randomness exists in the mask sets
`
`that are randomly cicated to map watermark data into an otherwise unrelated digital signal. The
`
`second fo of random mess is the random permutations of data formats -ed with digital players
`
`to manipulate the content with the predetermined keys. These forms can be thought of as the
`
`transfer function versus the mapping function inherent to digital watermarking processes.
`
`15
`
`According to an embodiment of the present nvvention, a predetermined, or andomly
`
`generated, key is used to scramble digital information in a way that is unlike known "digital
`
`watermark" techniques and public key crypto-systems. As used herein, a key is also referred to
`
`as a "mask set" which includes one or more random or pseudo-random series of hits. Prior to
`
`encoding, a mask can be generated by any cryptographically secure random generation process.
`
`20
`
`A block cipher, such as a Data Encryption Standard (DES) algorithm, in combination with a
`
`sufficiently random seed value, such as one created using a Message Digest 5 (MD5) algorithm,
`
`Ms"ZOO
`
`10
`Attachment 3 Page 11 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0313
`
`

`

`Docket No.: 1607/6
`
`emulates a cryptographically secure random hit generator. The keys are saved in a database,
`
`along with information matching them to the digital signal, for use in descrambling and
`
`subsequent viewing or playback. Additional file format or transfer property information is
`
`prepared arld made available to the encoder, in a bit addressable manner„ks well, any
`
`5
`
`authenticating function can be combined, such as Digital Signature Standard (DSS) or Secure
`
`Flash Algorithm (SHA).
`
`Using the predetermined key comprised of a transfer function-based mask set, the data
`
`representing the original content is manipulated at the inherent granularity of the file format of
`
`the underlying digitized samples. Instead of providing, or otherwise distributing, watermarked
`
`content that is not noticeably altered, a partially "scrambled" copy of the content is distributed.
`
`The key is necessary both to register the ought-afte content and to descramble the content into
`
`its original form_
`
`The present invention uses methods disclosed in "Method for Stega-Cipher Protection of
`
`Computer :ode," US Patent. Application Serial No. 08/587,943, with respect to transfer
`
`functions related to the common file formats, such as NCT, TIFF, AIFF, WAV, etc,
`
`Additionally, in cases where the content has not been altered beyond being encoded with such
`
`functional data, it is possible for a digital player to still play the c ontent because the file format
`
`has not been altered. Thus, the encoded content could still be played by a plug-in digital player
`
`as discrete, digitally sampled signals, watermarked or not. That is, the structure of the file can
`
`20
`
`remain basically unchanged by the watermarking process, letti
`
`g
`
`tc n file format based
`
`players work with the "scrambled" comer
`
`153200
`
`Attachment
`
`11
`Page 12 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0314
`
`

`

`Docket No.: 1607/6
`
`For example, the Compact Disc-Digital Audio (CD-DA) format stores audio information
`
`as a series of frames. Each frame contains a number of digital s mples representing, for
`
`example. music, and a header that contains Ile format information. As shown in FIG. 1,
`
`according to an embodiment of the present invention some of the header information can be
`
`identified and "scrambled" using the predetermined key at steps 110 to 130. The music samples
`
`can remain unchanged. Using this technique, a traditional CD-DA player will be able to play a.
`
`distorted version of the music in the sample. The amount of distortion wi11 depend on the way,
`
`and extent, that the header, or file format, information h s been scrambled. It would also be
`
`possible to instead scramble some of the digital samples while leaving the header information
`
`alone. In general, the digital signal would be protected by manipulating data at the inherent
`
`granularity, or "frames," of the CD-DA file format: To decode the inforrttation, a predetermined
`
`key is used before playing the digital information at steps 140 and 150.
`
`A key-based decoder can act as a "plug-in" digital player of broadcast signal streams
`
`without foreknowledge of the encoded media stream. Moreover, the data format orientation is
`
`15
`
`used to partially scramble data in transit to prevent unauthorized descrambled access by decoders
`
`that lack authorized keys. A distributed key can be used to unscramble the scrambled content
`
`because a decoder would understand how to process the key. Similar to on-the-fly decryption
`
`operations, the benefits inherent in this embodiment include the fact that the combination of
`
`watermarked content security, which is key-based, and the &scrambling of the data, can be
`
`20
`
`performed by the saute key which can be a plurality of mask sets. The mask sets may include
`
`primary, convolution and message del€miter masks with file format data included.
`
`12
`Attachment 3 Page 13 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0315
`
`

`

`Docket No.: 1607/6
`
`The creation of an optimized "envelope" for insertion of watermarks provides the basis of
`
`much watermark security, but is also a complementary goal of the present invention. The
`
`predetermined or random key that is generated is not only an essential map to access the hidden
`
`information signal, but is also the descrambler of the previously scrambled signal's format for
`
`playback or viewing.
`
`In a system requiring keys for watermarking content and validating the distribution of the
`
`content, different keys may be used to encode different information while secure one way hash
`
`functions or one-time pads may be incorporated to secure the eimbedded signal. The same keys
`
`can be used to later validate the embedded digital signature, or even fully decode the digital
`
`9
`
`watermark if desired. Publishers can easily stipulate that content not only be digitally
`
`watermarked but that distributors must check the validity of the watermmmarks by perforrmtiztg
`
`digital signature checks with keys that lack any other fun tionality. The system can extend to
`
`simple authentication of text in other emmmbodimmments.
`
`Before such a market is economically feasd le, there are other methods for deploying
`
`15
`
`key-based watermarking coupled with transfer functions to partially scramble the content to be
`
`distributed without performing full public key encryption, i.e., a key pair is not necessarily
`
`generated, simply, a predetermined key's function is created to re-map the data of the content file
`
`in a lossless process. Moreover, the scrambling performed by the present invention may be more
`
`dependent on the file in question. Dissimilarly, encryption is not specific to army particular media
`
`20
`
`but is performed on data. The file format remains unchanged, rendering the file .useable by any
`
`conventional
`
`r:player, but the signal quality can be intentionally degraded in the absence of
`
`;no
`13
`Attachment 3 Page 14 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0316
`
`

`

`Docket No.: 160716
`
`the proper player and key. Public-key encryption seeks to completely obscure the sensitive
`
`"plaintext" to prevent comparisons with the "ciphertext" to determine a users private keys.
`
`encryption and
`Centralized encryption only differs iri the utilization of a single key for both encry
`
`decryption making the key even more hig ly vulnerable to attacks to defeat the encryption
`
`process. With the present invention, a highly sought after photograph may be hazy to the viewer
`
`using any number of commonly available, nonproprietary software or hardware, without the
`
`authorized key. Similarly, a commercially valuable song may sound poor.
`
`The benefit of • me form of cryptography is not lost in the present invention. In fact,
`
`some piracy can be deterred when the target signal may be known but is clearly being protected
`
`through scrambling. What is not anticipated by known techniques, is an ala carte method to
`
`change various aspects of file formatting to enable various "scrambled states" for content to be
`
`subsequently distributed. An image may lack all red pixels or may not have any of the most
`
`significant bits activated.
`
`audio sample can similarly he scrambled to render it
`
`less-than-commercially viable.
`
`15
`
`The present invention also provides improvements over known network-based methods,
`
`such as those used for the streaming of media data over the Internet. By manipulating file
`
`formats, the broadcast media, which has been altered to "fit" within electronic distribution
`
`parameters, such as bandwidth availability and error correction considerations, can be more
`
`effectively utilized to restrict the subsequent use of the content while in transit as well as
`
`20
`
`real-time viewing or playing.
`
`14
`Attachment 3 Page 15 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0317
`
`

`

`Docket No.: 1607/6
`
`The mask set providing the transfer function can be read on a per-use basis by issuing an
`
`authorized or authenticating "key" for descrambling the signal that is apparent to a viewer or a
`
`player or possessor of the authenticating key. The mask set cafe be read on a per-computer basis
`
`by issuing the authorized key that is afore generalized for the computer that receives the
`
`5
`
`broadcast signals. Metering and subscription models become viable advantages over known
`
`digital watermark systems which assist in designating the ownership of a copy of digitized media
`
`content, but do not prevent or restrict the copying or manipulation of the sampled signal in
`
`question,. For broadcast or streamed media, this is especially the case. Message authentication is
`
`also possible, though not guaranteeing the same security as an encrypted file as with general
`
`crypto systems.
`
`The present invention thus benefits from the proprietary player model without relying on
`
`proprietary players. No new players will be necessary and existing multimedia file formats can
`
`be altered to exact a measure of security which is further increased when coupled with digital
`
`watermarks. As with most consumer arkets for media content, predominant file formats exist,
`
`15
`
`de facto, and corresponding formats for computers likewise exist. For a commercial compact
`
`disc. quality audio recording, or 16 bit 44.1 kHz, corresponding file formats include: Audio
`
`Interchange File Format (RIFF), Microsoft WAV, Sound Designer II, Sun's .au, Apple's
`
`Quicktime, etc. For still image media, formats are sirriilarly abundant: TIFF, PICT, SPEG,
`
`etc. Requiring the use of additional proprietary players, and their complementary file .formats,
`
`20
`
`for limited benefits in security is wastefitl. Moreover, almost all computers today are
`
`multimedia-capable, and this is increasingly so with the popularity of Intel's MMX chip
`
`15
`is ma
`Attachment 3 Page 16 of 31
`
`DISH-Blue Spike-602
`Exhibit 1005, Page 0318
`
`

`

`Docket No.: 1607/6
`
`architecture and the PowerPC line of microchips. Because file formatting is fundamental in the
`
`playback of the underlying data, the predetermined key can act both as a map, for information to
`
`be encoded as watermark data regarding ownership and a descrambler of the file that has been
`
`distributed. Limitations will only exist in how large the key must be retrofitted for a given
`
`5
`
`application, but any manipulation of file format information is not likely to exceed the size of
`
`data required versus that for an entire proprietary player.
`
`As with previous disclosures by the inventor on digita
`
`terinarking techniques, the
`
`present invention may be implemented with a variety of cryptographic protocols to increase both
`
`confidence and security in the underlying system. A predetermined key is described as a set of
`
`masks. These masks may include primary, convolution and message delimiter mask. ht
`
`previous disclosures, the functionality of these masks is defined solely for mapping. The present
`
`invention includes a mask set which is also controlled by the distributing party of a copy of a
`
`given media signal. This mask set is a transfer function which is limited only by the parameters
`
`of the tile format in question. To increase the uniqueness or security of each key used to
`
`15
`
`scramble a given i mi edia file copy, a secure one way hash function can be used subsequent to
`
`transfer properties that are initiated to present the forging of a particular key. Public and priva

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket