throbber
.. ......-
`o
`i _
`, _
`, ci.,r ___ _____
`. cm —co
`iv, ,..40
`......01
`.....
`
`
`.-,=:, —.01 NA
`c.sj ............ =—__....—.......
`cV Cr% m•—me.— c'n
`in 1:=1 = aim N ."
`o
`....._
`
`.
`
`, nzt•I
`
`=1......=11•M .0.1
`
`0
`,., 0
`i--
`as
`' r...,"•=•) "-a a .-
`I r•• .. (.) ,_
`.
`Lr. -
`--....H u)
`ai
`5
`C.)
`1.1.1
`U)
`C/)
`
`
`
`U)
`
`u)
`co
`Si
`
`PATENT NUMBER
`
`tl
`
`U.S. UTILITY PATENT APPLICATION
`PATENT DATE
`O.I.P.E.
`2 2003
`JUL
`
`N
`
`ED S
`
`(
`
`SECTOR CLASS
`
`SUBCLASS
`
`ART UNIT
`
`EXAMINER
`
`4
`
`.7 ,
`
`. ---7
`
`FILED WITH: 0 DISK (CRF) 0 FICHE
`(Attached in pocket on right Inside flap)
`
`PREPARED AND APPROVED, FOR ISSUE
`
`ISSUING CLASSIFICATION
`1 CROSS REFERENCE(S)
`
`' SUBCLASS (ONE SUBCLASS PER BLOCK)
`
`„i&
`
`CLASS
`
`3 400
`
`'
`1- 0
`
`/
`
`-
`
`I
`
`s
`
`q Continued on Issue Slip Inside File Jacket
`
`
`
`
`
`o
`
`y (71
`
`ORIGINAL
`
`CLASS
`
`SUBCLASS
`
`'7-13
`
`171-
`
`INTERNATIONAL CLASS
`
`FICATION
`
`0I
`
`If 0 ii L
`G 0(F
`06F
`
`.
`
`i/0
`1/02
`7-/gq)
`/
`
`cs
`
`orn)
`
`raw ngs
`
`r---ITERMINAL
`I—I DISCLAIMER
`
`Ell a) The term of this patent
`subsequent to
`has been disclaimed.
`
`(date)
`
`q b)'The term of this patent shall
`not extend beyond the expiration date
`of U.S Patent. No.
`
`DRAWINGS
`
`CLAIMS ALLOWED
`
`Sheets'Drwg.
`
`Figs. Drwg.
`
`Print Fig.
`
`Total Claims
`
`Print Claim for O.G.
`
`(Aso(
`
`ner)
`
`NOTICE OF ALLOWANCE MAILED
`
`/
`
`GILBERTO BARRON
`SUPERVISORY PATENT EXAMINER
`''LOGY CENTER 210Q
`-TEC
`3/4 )3
`(Date)
`
`(Primary Eaminer)
`
`Amount Due
`
`-aid
`
`0
`
`141men
`iSS'JE BATCH NUMBER
`
`is,
`
`month7''of
`q c) The termini
`this patent have been disclaimed.
`
`s '
`
`'ti_egat InstrumentsExaminerr
`
`e)
`
`WARNING:
`The information disclosed herein may be restricted. Unauthorized disclosure may be prohibited by the United States Code Title 35, Sections 122, 181 and 368.
`Possession outside the U.S. Patent & Trademark Office is restricted to authorized employees and contractors only.
`
`Form PTO-436A
`(Rev. 10/97)
`
`it-ounai urawimp
`
`,i,CM) SOT
`
`(LABEL AREA), 4
`
`(FACE)
`
`

`

`
`
`1111111111 ;11-111111111111 111111111111111
`
`
`
`Bib Data Sheet
`
`CONFIRMATION NO. 2376
`
`CLASS
`713
`
`GROUP ART UNIT
`2132
`
`ATTORNEY DOCKET
`NO.
`1607/6
`
`FILING DATE
`03/24/1998
`
`RULE
`
`SERIAL NUMBER
`09/046,627
`
`PPLICANTS
`
`SCOTT A. MOSKOWITZ, MIAMI, FL;
`
`** CONTINUING DATA *************************
`
`** FOREIGN APPLICATIONS *****-**************
`
`IF REQUIRED, FOREIGN FILING LICENSE GRANTED
`04/28/1998
`
`** SMALL ENTITY **
`
`Foreign Priority claimed
`
`
`
`yes
`
`no
`
`35 USC 119 (a-d) conditions met
`
`Verified and Acknowledged
`
`no
`yes
` Examiner's Signature
`
`STATE OR
`
`SHEETS
`
`TOTAL
`
`INDEPENDENT4
`
`Met after Allowance
`
`Initials
`
`COUNTRY
`FL
`
`DRAWING
`1
`
`CLAIMS
`29
`
`CLAIMS
`• 6
`
`ADDRESS
`29693
`WILEY, REIN & FIELDING, LLP
`ATTN: PATENT ADMINISTRATION
`1776 K. STREET N.W.
`WASHINGTON , DC
`20006
`
`TITLE
`METHOD FOR COMBINING TRANSFER FUNCTIONS WITH PREDETERMINED KEY CREATION
`
`FILING FEE
`
`RECEIVED
`617
`
`FEES: Authority has been given in Paper
`to charge/credit DEPOSIT ACCOUNT
`No.
`No.
`for following:
`
` 11.17 Fees ( Processing Ext. of time )1
`
`r 1.18 Fees ( Issue )
`
` All Fees
`
`1.16 Fees ( Filing )
`
`Other
`
`Credit
`
`

`

`Page 1 of 1
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`Bib Data Sheet
`
`
`11111111111111111 111111111
`11H 11111111111111
`
`11111111 I'll
`FILING DATE
`03/24/1998
`RULE
`
`COMMISSIONER FOR PATENTS
`UNITED STATE; -PATENT AND TRADEMARK OFFICE
`WASHINGTON, D.C. 20231
`www.uspto.gov
`
`/
`GRO PART UNIT
`2132
`
`CONFIRMATION NO. 2376
`ATTORNEY
`DOCKET NO.
`1607/6
`
`CLASS
`
`SERIAL NUMBER
`09/046,627
`APPLICANTS
`
`SCOTT A. MOSKOWITZ, MIAMI, FL;
`** CONTI
`IN DATA *
` ** ** *
`*****
`0 5Til
`0
`? APPLIC
`NS ******
`*** *
`**
`0'
`
`IF REQUIRED, F
`GN FILING LICENSE
`04/28/1998
`GRANTED'""
`0 yes ano
`
`(-1 FORMN
`
`ADDRESS
`WILEY REIN & FIELDING
`Intellectual Property Department
`Floyd B. Chapman
`1776 K Street, NW
`Washington ,DC 20006
`TITLE
`METHOD FOR COMBINING TRANSFER FUNCTIONS WITH PREDETERMINED KEY CREATION
`
`NO
`
`.1 1/1-5 5-0
`
`*SMALL ENTITY **
`,),
`ri /STATE OR
`SHEETS
` COUNTRY
`DRAWING
`FL
`1
`
`,1/2'
`O
`
`TOTAL
`CLAIMS
`,2j2J- 1
`
`—
`INDEPENDENT
`CLAIM §
`1
`
`no . Met after Allowance
`
`iner's Signature
`
`Initials
`
`Foreign Priority claimed
`35 USC 119,(a.d) conditions
`met
`Verified and
`Acknowledged
`
`Exa
`
`min
`
`g
`
`FILING FEE
`RECEIVED
`617
`
`FEES: Authority as been givenlit Paper
`No.
`o charge/credit DEPOSIT ACCOUNT
`for following:
`No.
`
`U All Fees
`I III .1 16 Fees ( Filing )
`• 1.17 Fees ( Processing Ext. of
`time )
`U 1.18 Fees ( Issue )
`U Other
`U Credit
`
`•
`
`

`

`SERIAL NUMBER
`
`FILING DATE
`
`CLASS
`
`GROUP ART UNIT
`
`ATTORNEY DOCKET NO.
`
`09/046,627
`
`03/24/98
`
`380
`
`3642
`
`1607/6
`
`SCOTT A. MOSKOWITZ, MIAMI, FL.
`
`APPLICANT
`
`**CONTINUING DOMESTIC DATA******
`FIED
`
`*f/*711;6***F)
`‘,10)(40-/
`
`anew tiC Mr 9
`
`4 C -56
`
`/
`
`°lin
`(w.
`
`**371 (NAT'L TAGE) DATA*********************
`VER ED
`
`cir2
`
`**FOREIGN APP CATIONS************/
`,Aez ,
`D
`VE
`
`FOREIGN FILING LICENSE GRANTED 04/28/98
`
`***** SMALL ENTITY *****
`
`Foreign Priority claimed
`35 USC 119 (a-d) conditions
`Verified and Acknowledged
`
`❑ye
`yes
`
`o
`
`ElMet after Allowance
`
`maims
`
`
`
`STATE OR
`COUNTRY
`FL
`
`SHEETS
`DRAWING
`1
`
`TOTAL
`CLAIMS -
`
`INDEPENDENT
`CLAIMS
`
`JO C ALT LLER
`to • KENYON
`NYON
`• 1025 CONNE
`UT VENUE NW
`< WASHING ON DC
`6
`
`ci 6::li'ehoitio trar
`d'in
`a rrkr„
`1 oz)---
`'" n
`ci
`. 4_ Obil-,0117100
`
`infileOVE
`
`lv PI
`
`METHOD FOR COMBINING TRAN ER FUNCTIONS WITH PREDETERMINED KEY
`w CREATION
`I-
`
`FILING FEE
`RECEIVED
`
`$617
`
`FEES: Authority has been given in Paper
`No.
`to charge/credit DEPOSIT ACCOUNT
`NO.
`for the following:
`
`0 All Fees
`OUI 1.16 Fees (Filing)
`1.17 Fees (Processing Ext. of tin-
`q 1.18 Fees (Issue)
`q Other
`O Credit
`
`

`

`42 U.S, PTO
`09/046627
`1111191311/111121114/Ill9II1111111111
`
`1. Application
`
`
`
` papers.
`
`PATENT APPLICATION
`1111111111111MIN
`09046627
`
`CONTENT.
`Date rc
`A
`(dm:C. of M.)
`or
`Date Mailed
`
`MAR 3 0 9 8 3 5
`INITIALS
`
`Date recAved
`(Incl. C. of M.)
`or
`Date Mailed
`
`3
`
`• t,J1P''
`
`2 -,211- fr
`
`V --61, %-.0_
`
`-,).14-ovi 5-
`
`6
`
`2
`
`7
`
`vrch'C',
`
`u
`
`L
`
`2.
`
`3.
`
`4.
`
`?37.
`lobe8
`
`13
`
`q
`15
`
`19.
`
`' 20.
`
`t' 22.
`
`\V23.
`
`1'1'24.
`3)`1V--
`26.
`
`27.
`
`28.
`
`29.
`
`30.
`
`31.
`
`
`
`32.
`
`33.
`
`34.
`
`35.
`
`36.
`
`37.
`
`38.
`
`39.
`
`40.
`
`41.
`
`42.
`
`43.
`
`44.
`
`4f
`
`46.
`
`47.
`
`48.
`
`
`
`49.
`
`50.
`
`51.
`
`52.
`
`53.
`
`54.
`
`55.
`
`56.
`
`57.
`
`58.
`
`59.
`
`60.
`
`61.
`
`62.
`
`63.
`
`64.
`
`65.
`
`66.
`
`67.
`
`68.
`
`69.
`
`70.
`
`71.
`
`72.
`
`73.
`
`74.
`
`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`81.
`
`82.
`
`(FRONT)
`
`

`

`(12) United States Patent
`(12) United States Patent
`Moskowitz
`Moskowitz
`
`(54) METHOD FOR COMBINING TRANSFER
`(54) METHOD FOR COMBINING TRANSFER
`FUNCTIONS WITH PREDETERMINED KEY
`FUNCTIONS WITH PREDETERMINED KEY
`CREATION
`CREATION
`
`(76)
`(76)
`
`Notice:
`(*)
`( * ) Notice:
`
`Inventor: Scott A. Moskowitz, 16711 Collins
`Inventor: Scott A. Moskowitz, 16711 Collins
`Ave. #2505, Miami, FL (US) 33160
`Ave. #2505, Miami, FL (US) 33160
`Subject to any disclaimer, the term of this
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`U.S.C. 154(b) by 0 days.
`(21)
`Appl. No.: 09/046,627
`(21) Appl. No.: 09/046,627
`(22)
`Filed:
`Mar. 24, 1998
`(22) Filed:
`Mar. 24, 1998
`Related U.S. Application Data
`Related U.S. Application Data
`Continuation-in-part of application No. 08/587,943, filed on
`(63)
`(63) Continuation-in-part of application No. 08/587,943, filed on
`Jan. 17, 1996, now Pat. No. 5,745,569.
`Jan. 17, 1996, now Pat. No. 5,745,569.
`Int. Cl." ............................. H04L 9/00, G06F 1/02;
`(51)
`(51) Int. C1.7
` HO4L 9/00; GO6F 1/02;
`GO6F 7/58
`G06F 7/58
`(52)
`U.S. Cl. .......................... 713/176; 380/46; 708/254
`(52) U.S. Cl.
` 713/176; 380/46; 708/254
`(58)
`Field of Search ............................ 713/176; 380/53,
`(58) Field of Search
` 713/176; 380/53,
`380/54, 46; 708/254
`380/54, 46; 708/254
`
`(56)
`(56)
`
`References Cited
`References Cited
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`
`4/1980 Hellman et al.
`4,200,770 A
`4,200,770 A 4f1980 Hellman et al.
`4,218,582 A
`8/1980 Hellman et al.
`273/138
`A : s 3. t et al.
` 273/138
`4,339,134 A * 7/1982 Macheel
`4405,829 A SE E. gr f
`4,405,829 A
`9/1983 Rivest et al.
`4.424.414 A 1/1984 Hellman et al
`4,424,414 A
`1/1984 Hellman et al.
`4s.2750s. A 5/1989 Shear
`4,827,508 A
`5/1989 Shear
`4896.275 A
`1/1990 Jackson ...................... 345/668
`4,896,275 A * 1/1990 Jackson
` 345/668
`4977,594. A 12/1990 Shear
`4,977,594 A
`12/1990 Shear
`4,979,210 A 12/1990 Nagata et al.
`4,979,210 A
`12/1990 Nagata et al.
`5,050,213 A 9/1991. Shear
`5,050,213 A
`9/1991 Shear
`5,073,925 A
`12/1991 Nagata et al.
`5,073.925 A : 12/1991 Nagata et al.
` 380/25
`5,369,707 A * 11/1994 Follendore, III
`5,369,707 A * 11/1994 Follendore, III ............. 380/25
`5,406,627 A * 4/1995 Thompson et al. ........... 380/20
`5,406,627 A * 4/1995 Thompson et al.
` 380/20
`5,410,598. A 4/1995 Shear
`5,410,598 A
`4/1995 Shear
`5,469,536 A 11/1995 Blank ......................... 395/131
` 395/131
`5,469,536 A * 11/1995 Blank
`5,497.419 A * 3/1996 Hill
`5,497,419 A * 3/1996 Hill
`
`111111111111111011111111111111f19111i11,1111111111111111111110111111
`
`USOO6598162B1
`(10) Patent No.:
`US 6,598,162 B1
`US 6,598,162 B1
`(to) Patent No.:
`(45) Date of Patent:
`Jul. 22, 2003
`(45) Date of Patent:
`Jul. 22, 2003
`
`
`
`5,513.261. A 4/1996 Maher
`4/1996 Maher
`5,513,261 A
`5,530.739 A 6/1996 Okada et al.
`6/1996 Okada et al.
`5,530,739 A
`5,530,751 A
`6/1996 Morris .......................... 380/4
`380/4
`5,530,751 A * 6/1996 Morris
`5,530,759 A * 6/1996 Braudaway et al. .......... 380/54
`5,530,759 A * 6/1996 Braudaway et al.
`380/54
`5,598,470 A * 1/1997 Cooper et al.
`380/4
`5,598.470 A * 1/1997 Cooper et al. - - - - - - - - - - - - - - - - - 380/4
`(List continued on next page.)
`(List continued on next page.)
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`0649261
`4/1995
`0. 3E /1998
`100523
`9/1998
`9744736
`11/1997
`9744736
`11/1997
`995.2271
`10/1999
`9952271
`10/1999
`9963443
`12/1999
`9963443
`12/1999
`
`EP
`s
`NL
`WO
`WO
`WO
`WO
`WO
`WO
`
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`U.S. Patent Applin Ser. No. 08/587,943, “Method for Ste
`U.S. Patent Appl'n Ser. No. 08/587,943, "Method for Ste-
`ga-Cipher Protection of Computer Code'.
`ga—Cipher Protection of Computer Code".
`U.S. Patent Applin Ser. No. 08/775,216, “Steganographic
`U.S. Patent Appl'n Ser. No. 08/775,216, "Steganographic
`Method and Device".
`Method and Device".
`(List continued on next page.)
`(List continued on next page.)
`
`Primary Examiner-Giberto Barron
`Primary Examiner—Giberto Barron
`Assistant Examiner Douglas J Meislahn
`Assistant Examiner—Douglas J Meislahn
`(74) Attorney, Agent, or Firm Wiley Rein & Fielding LLP
`(74) Attorney, Agent, or Firm—Wiley Rein & Fielding LLP
`(57)
`ABSTRACT
`(57)
`ABSTRACT
`A method for combining transfer functions with predeter
`A method for combining transfer functions with predeter-
`mined key creation. In one embodiment, digital information,
`mined key creation. In one embodiment, digital information,
`including a digital Sample and format information, is pro
`including a digital sample and format information, is pro-
`tected by identifying and encoding a portion of the format
`tected by identifying and encoding a portion of the format
`information. Encoded digital information, including the
`information. Encoded digital information, including the
`digital Sample and the encoded format information, is gen
`digital sample and the encoded format information, is gen-
`erated to protect the original digital information. In another
`erated to protect the original digital information. In another
`embodiment, a digital Signal, including digital Samples in a
`embodiment, a digital signal, including digital samples in a
`file format having an inherent granularity, is protected by
`file format having an inherent granularity, is protected by
`creating a predetermined key. The predetermined key is
`creating a predetermined key. The predetermined key is
`comprised of a transfer function-based mask Set to manipu
`comprised of a transfer function-based mask set to manipu-
`late data at the inherent granularity of the file format of the
`late data at the inherent granularity of the file format of the
`derlving digitized
`1
`underlying digitized samples.
`underlying diglu Zed Samples.
`
`1 Claim, 1 Drawing Sheet
`1 Claim, 1 Drawing Sheet
`
`START )
`
`ENCOO
`ENCODE
`DIGITAL
`DIGITAL
`NFORMATIN
`INFORMATION
`
`110
`110
`
`ID Portion of Format
`iD Portion of Format
`Informatton to be
`information to be
`Encoded
`Encoded
`
`120
`120
`
`130
`30
`
`Generate
`Generate
`Encoded
`Encode:
`Format
`Format
`Information
`Information
`
`Generate
`Generate
`Encoded Digital
`Encoded Digital
`information
`Information
`
`BECODE
`DECODE
`DIGITAL
`DIGITAL
`NFORMATICN
`INFORMATION
`
`Decode With
`Decode With
`Predetermined Key
`Predetermined Key
`
`140
`140
`
`150
`50
`
`Play Digital
`Play Digital
`Information
`Information
`
`V
`( END
`
`)
`
`DISH-Blue Spike-602
`Exhibit 1013, Page 0006
`
`

`

`US 6,598,162 B1
`US 6,598,162 B1
`Page 2
`Page 2
`
`OTHER PUBLICATIONS
`OTHER PUBLICATIONS
`
`- - - - - - - - - - - - 380/4
`
`- - - - - - - - - - - 380/25
`
`380/4
`380/25
`
`ss
`
`U.S. Patent Applin Ser. No. 08/587,944, “Human Assisted
`U.S. Patent Appl'n Ser. No. 08/587,944, "Human Assisted
`Random Key Generation . . .”.
`Random Key Generation . . .".
`U.S. Patent Applin Ser. No. 08/677,435, “Optimization
`U.S. Patent Appl'n Ser. No. 08/677,435, "Optimization
`Methods for the Insertion, Protection and . . .”.
`380/28 Methods for the Insertion, Protection and . . .".
`U.S. Patent Applin Ser. No. 08/772,222, “Z Transform
`U.S. Patent Appl'n Ser. No. 08/772,222, "Z—Transform
`380/4
`380/4
`Implementation of Digital Watermarks”.
`380/4
`Implementation of Digital Watermarks".
`Schneier, Bruce, Applied Cryptography, 2nd ed., pp:
`Schneier, Bruce, Applied Cryptography, 2nd ed., pp:
`311-313.
`311-313.*
`Schneier, Bruce, Applied Cryptography, 1996, pp. 270-273,
`Schneier, Bruce, Applied Cryptography, 1996, pp. 270-273,
`53, 33, 38.*
`53, 33, 38.*
`Horowitz, Paul and Winfield Hill, The Art of Electronics,
`Horowitz, Paul and Winfield Hill, The Art of Electronics,
`1989, p. 7.*
`1989, p. 7.*
`Schneier, Bruce, Applied Cryptography 1996, John Wiley &
`Schneier, Bruce, Applied Cryptography 1996, John Wiley &
`Sons, Inc. 2" ed., p. 41.*
`Sons, Inc. 2,d ed., p. 41.*
`International Search Report in corresoponding PCT/US00/
`International Search Report in corresoponding PCT/US00/
`18411.
`18411.
`PCT Invitation to Pay Additional Fees in International
`PCT Invitation to Pay Additional Fees in International
`Application No. PCT/US00/18411.
`Application No. PCT/US00/18411.
`Bender, et al., “Techniques for data hiding” IBM Systems
`Bender, et al., "Techniques for data hiding" IBM Systems
`Journal, vol. 35, Nos. 3&4, 1996.
`Journal, vol. 35, Nos. 3&4, 1996.
`* cited by examiner
`* cited by examiner
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`Cooperman et al.
`5,613,004
`3/1997
`3/1997 Cooperman et al.
`5,613,004 A
`5,625,690
`Michel et al.
`* 4/1997
`5,625,690 A * 4/1997 Michel et al.
`5,633,932
`* 5/1997
`Davis et al. .......
`5,633,932 A * 5/1997 Davis et al.
`Leighton
`5,664,018
`9/1997
`5,664,018 A
`9/1997 Leighton
`5,687,236
`Moskowitz et al.
`* 11/1997
`5,687,236 A * 11/1997 Moskowitz et al.
`5,719.937
`Warren et al.
`* 2/1998
`5,719,937 A * 2/1998 Warren et al.
`Cooper et al. .....
`5,737.416
`* 4/1998
`5,737,416 A * 4/1998 Cooper et al.
`Moskowitz et al.
`5,745,569
`Moskowitz et al.
`4/1998
`5,745,569 A
`4/1998
`5,765,152
`Erickson ............
`* 6/1998
`5,765,152 A *
`6/1998
`Erickson
`5,799,083
`Brothers et al. ...
`* 8/1998
`5,799,083 A *
`8/1998
`Brothers et al.
`10/1998 Moskowitz et al.
`5,822.432
`Moskowitz et al.
`10/1998
`5,822,432 A
`Daly et al. .........
`5,859920
`* 1/1999
`5,859,920 A * 1/1999 Daly et al.
`5,870.474
`Wasilewski et al.
`2/1999
`5,870,474 A * 2/1999 Wasilewski et al.
`5,889,868
`Moskowitz et al.
`3/1999
`5,889,868 A
`3/1999 Moskowitz et al.
`Conley ..............
`5,894,521
`* 4/1999
`5,894,521 A *
`4/1999
`Conley
`Moskowitz et al.
`5,905,800
`5/1999
`Moskowitz et al.
`5,905,800 A
`5/1999
`5,912,972
`6/1999
`Barton ..............
`5,912,972 A * 6/1999 Barton
`5,930,369
`Cox et al. ...
`7/1999
`5,930,369 A * 7/1999 Cox et al.
`5,930,377
`Powell et al. ..
`7/1999
`5,930,377 A * 7/1999 Powell et al.
`5,963,909
`Warren et al. .
`10/1999
`5,963,909 A * 10/1999 Warren et al.
`5,973,731
`Schwab .............
`10/1999
`5,973,731 A * 10/1999 Schwab
`5,974,141
`Saito
`10/1999
`5,974,141 A
`10/1999 Saito
`5.999.217
`12/1999
`Berners-Lee .......
`5,999,217 A * 12/1999 Berners-Lee
`6,041,316
`Allen ................
`3/2000
`6,041,316 A * 3/2000 Allen
`6,081,251
`Sakai et al. .
`6/2000
`6,081,251 A * 6/2000 Sakai et al.
`6.278,780
`Shimada ............
`8/2001
`1.
`6,278,780 B1 * 8/2001 Shimada
`
`- - - - - - - - - - 380/28
`
`- - - - - - - - - - - - 380/4
`
`- - - - - - - - - - - - 707/9
`
`707/9
`380/200
`
`- - - - - - - - - 380/200
`
`- - - - - - - - - 382/115
`
`382/115
`380/211
`
`- - - - - - - - 380/211
`
`- - - - - - - - - - 380/54
`
`380/54
`
`- - - - - - - - - - 380/23
`
`380/23
`380/54
`... 382/100
`382/100
`705/1
`348/161
`
`- - - - - - 380/54
`
`- - - - - - - 705/1
`
`- - - - - - - - - 348/161
`
`- - - - - - - - - 348/390
`
`- - - - - - - - - - 705/52
`
`348/390
`705/52
`345/670
`345/670
`380/47
`
`- - - - - - - - - - 380/47
`
`
`
`DISH-Blue Spike-602
`Exhibit 1013, Page 0007
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jul. 22, 2003
`Jul. 22, 2003
`
`US 6,598,162 B1
`US 6,598,162 B1
`
`ENCODE
`ENCODE
`DIGITAL
`DIGITAL
`INFORMATION
`INFORMATION
`
`DECODE
`DECODE
`DIGITAL
`DIGITAL
`INFORMATION
`INFORMATION
`
`
`
`
`
`
`
`
`
`
`
`C START )
`
`110'
`
`ID Portion of Format
`D Portion of Format
`Information to be
`information to be
`Encoded
`Encoded
`
`120
`120
`
`130
`130
`
`
`
`
`
`
`
`Generate
`Generate
`Encoded
`Encoded
`Format
`Format
`Information
`Information
`
`4.
`
`Generate
`Generate
`Encoded Digital
`Encoded Digital
`Information
`Information
`
`/
`
`140
`
`
`
`Decode With
`Decode With
`Predetermined Key
`Predetermined Key
`
`4.
`
`150
`150
`
`Play Digital
`Play Digital
`Information
`Information
`
`FIG. 1
`FIG 1
`
`V
`END
`
`(
`
`DISH-Blue Spike-602
`Exhibit 1013, Page 0008
`
`

`

`1
`1
`METHOD FOR COMBINING TRANSFER
`METHOD FOR COMBINING TRANSFER
`FUNCTIONS WITH PREDETERMINED KEY
`FUNCTIONS WITH PREDETERMINED KEY
`CREATION
`CREATION
`
`CROSS-REFERENCE TO RELATED
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`APPLICATIONS
`This application is a continuation-in-part of U.S. patent
`This application is a continuation-in-part of U.S. patent
`application Ser. No. 08/587,943, filed Jan. 17, 1996, (which
`application Ser. No. 08/587,943, filed Jan. 17, 1996, (which
`issued Apr. 28, 1998, as U.S. Pat. No. 5,745,569) entitled
`issued Apr. 28, 1998, as U.S. Pat. No. 5,745,569) entitled
`“Method for Stega-Cipher Protection of Computer Code',
`"Method for Stega-Cipher Protection of Computer Code",
`the entire disclosure of which is hereby incorporated by
`the entire disclosure of which is hereby incorporated by
`reference.
`reference.
`
`FIELD OF THE INVENTION
`FIELD OF THE INVENTION
`The invention relates to the protection of digital informa
`The invention relates to the protection of digital informa-
`tion. More particularly, the invention relates to a method for
`tion. More particularly, the invention relates to a method for
`combining transfer functions with predetermined key cre
`combining transfer functions with predetermined key cre-
`ation.
`ation.
`
`BACKGROUND OF THE INVENTION
`BACKGROUND OF THE INVENTION
`Increasingly, commercially valuable information is being
`Increasingly, commercially valuable information is being
`created and Stored in “digital” form. For example, music,
`created and stored in "digital" form. For example, music,
`photographs and Video can all be Stored and transmitted as
`photographs and video can all be stored and transmitted as
`a Series of numbers, Such as 1's and 0's. Digital techniques
`a series of numbers, such as l's and 0's. Digital techniques
`let the original information be recreated in a very accurate
`let the original information be recreated in a very accurate
`manner. Unfortunately, digital techniques also let the infor
`manner. Unfortunately, digital techniques also let the infor-
`mation be easily copied without the information owner's
`mation be easily copied without the information owner's
`permission.
`permission.
`Because unauthorized copying is clearly a disincentive to
`Because unauthorized copying is clearly a disincentive to
`the digital distribution of valuable information, it is impor
`the digital distribution of valuable information, it is impor-
`tant to establish responsibility for copies and derivative
`tant to establish responsibility for copies and derivative
`copies of Such works. For example, if each authorized digital
`copies of such works. For example, if each authorized digital
`copy of a popular Song is identified with a unique number,
`copy of a popular song is identified with a unique number,
`any unauthorized copy of the Song would also contain the
`any unauthorized copy of the song would also contain the
`number. This would allow the owner of the information,
`number. This would allow the owner of the information,
`Such as a Song publisher, to investigate who made the
`such as a song publisher, to investigate who made the
`unauthorized copy. Unfortunately, it is possible that the
`unauthorized copy. Unfortunately, it is possible that the
`unique number could be erased or altered if it is simply
`unique number could be erased or altered if it is simply
`tacked on at the beginning or end of the digital information.
`tacked on at the beginning or end of the digital information.
`As will be described, known digital “watermark' tech
`As will be described, known digital "watermark" tech-
`niques give creators and publishers of digitized multimedia
`niques give creators and publishers of digitized multimedia
`content localized, Secured identification and authentication
`content localized, secured identification and authentication
`of that content. In considering the various forms of multi
`of that content. In considering the various forms of multi-
`media content, Such as “master, Stereo, National Television
`media content, such as "master," stereo, National Television
`Standards Committee (NTSC) video, audio tape or compact
`Standards Committee (NTSC) video, audio tape or compact
`disc, tolerance of quality will vary with individuals and
`disc, tolerance of quality will vary with individuals and
`affect the underlying commercial and aesthetic value of the
`affect the underlying commercial and aesthetic value of the
`content. For example, if a digital version of a popular Song
`content. For example, if a digital version of a popular song
`Sounds distorted, it will be less valuable to users. It is
`sounds distorted, it will be less valuable to users. It is
`therefore desirable to embed copyright, ownership or pur
`therefore desirable to embed copyright, ownership or pur-
`chaser information, or Some combination of these and
`chaser information, or some combination of these and
`related data, into the content in a way that will damage the
`related data, into the content in a way that will damage the
`content if the watermark is removed without authorization.
`content if the watermark is removed without authorization.
`To achieve these goals, digital watermark Systems insert
`To achieve these goals, digital watermark systems insert
`ownership information in a way that causes little or no
`ownership information in a way that causes little or no
`noticeable effects, or “artifacts,” in the underlying content
`noticeable effects, or "artifacts," in the underlying content
`Signal. For example, if a digital watermark is inserted into a
`signal. For example, if a digital watermark is inserted into a
`digital version of a Song, it is important that a listener not be
`digital version of a song, it is important that a listener not be
`bothered by the slight changes introduced by the watermark.
`bothered by the slight changes introduced by the watermark.
`It is also important for the watermark technique to maximize
`It is also important for the watermark technique to maximize
`the encoding level and "location Sensitivity” in the Signal to
`the encoding level and "location sensitivity" in the signal to
`force damage to the content Signal when removal is
`force damage to the content signal when removal is
`attempted. Digital watermarks address many of these
`attempted. Digital watermarks address many of these
`concerns, and research in the field has provided extremely
`concerns, and research in the field has provided extremely
`robust and Secure implementations.
`robust and secure implementations.
`
`US 6,598,162 B1
`US 6,598,162 B1
`
`2
`2
`What has been overlooked in many applications described
`What has been overlooked in many applications described
`in the art, however, are Systems which closely mimic dis
`in the art, however, are systems which closely mimic dis-
`tribution of content as it occurs in the real world. For
`tribution of content as it occurs in the real world. For
`instance, many watermarking Systems require the original
`instance, many watermarking systems require the original
`un-watermarked content Signal to enable detection or decode
`5 un-watermarked content signal to enable detection or decode
`operations. These include highly publicized efforts by NEC,
`operations. These include highly publicized efforts by NEC,
`Digimarc and others. Such techniques are problematic
`Digimarc and others. Such techniques are problematic
`because, in the real world, original master copies reside in a
`because, in the real world, original master copies reside in a
`rights holders vaults and are not readily available to the
`rights holders vaults and are not readily available to the
`public.
`10 public.
`With much activity overly focused on watermark
`With much activity overly focused on watermark
`Survivability, the Security of a digital watermark is Suspect.
`survivability, the security of a digital watermark is suspect.
`Any Simple linear operation for encoding information into a
`Any simple linear operation for encoding information into a
`Signal may be used to erase the embedded Signal by invert
`signal may be used to erase the embedded signal by invert-
`ing the process. This is not a difficult task, especially when
`15 ing the process. This is not a difficult task, especially when
`15
`detection Software is a plug-in freely available to the public,
`detection software is a plug-in freely available to the public,
`Such as with Digimarc. In general, these Systems Seek to
`such as with Digimarc. In general, these systems seek to
`embed cryptographic information, not cryptographically
`embed cryptographic information, not cryptographically
`embed information into target media content.
`embed information into target media content.
`Other methods embed ownership information that is
`20 Other methods embed ownership information that is
`plainly visible in the media Signal, Such as the method
`plainly visible in the media signal, such as the method
`described in U.S. Pat. No. 5,530,739 to Braudaway et al. The
`described in U.S. Pat. No. 5,530,739 to Braudaway et al. The
`System described in Braudaway protects a digitized image
`system described in Braudaway protects a digitized image
`by encoding a visible watermark to deter piracy. Such an
`by encoding a visible watermark to deter piracy. Such an
`implementation creates an immediate weakness in Securing
`25 implementation creates an immediate weakness in securing
`25
`the embedded information because the watermark is plainly
`the embedded information because the watermark is plainly
`Visible. Thus, no Search for the embedded signal is necessary
`visible. Thus, no search for the embedded signal is necessary
`and the watermark can be more easily removed or altered.
`and the watermark can be more easily removed or altered.
`For example, while certainly useful to Some rights owners,
`For example, while certainly useful to some rights owners,
`Simply placing the Symbol iO" in the digital information
`30 simply placing the symbol "10" in the digital information
`would only provide limited protection. Removal by adjust
`would only provide limited protection. Removal by adjust-
`ing the brightness of the pixels forming the "O" would not
`ing the brightness of the pixels forming the "10" would not
`be difficult with respect to the computational resources
`be difficult with respect to the computational resources
`required.
`required.
`Other relevant prior art includes U.S. Pat. Nos. 4,979,210
`Other relevant prior art includes U.S. Pat. Nos. 4,979,210
`and 5,073,925 to Nagata et al., which encodes information
`and 5,073,925 to Nagata et al., which encodes information
`by modulating an audio signal in the amplitude/time
`by modulating an audio signal in the amplitude/time
`domain. The modulations introduced in the Nagata process
`domain. The modulations introduced in the Nagata process
`carry a "copy/don’t copy' message, which is easily found
`carry a "copy/don't copy" message, which is easily found
`and circumvented by one skilled in the art. The granularity
`40 and circumvented by one skilled in the art. The granularity
`40
`of encoding is fixed by the amplitude and frequency modu
`of encoding is fixed by the amplitude and frequency modu-
`lation limits required to maintain inaudibility. These limits
`lation limits required to maintain inaudibility. These limits
`are relatively low, making it impractical to encode more
`are relatively low, making it impractical to encode more
`information using the Nagata process.
`information using the Nagata process.
`Although U.S. Pat. No. 5,664,018 to Leighton describes a
`45 Although U.S. Pat. No. 5,664,018 to Leighton describes a
`45
`means to prevent collusion attacks in digital watermarks, the
`means to prevent collusion attacks in digital watermarks, the
`disclosed method may not actually provide the Security
`disclosed method may not actually provide the security
`described. For example, in cases where the watermarking
`described. For example, in cases where the watermarking
`technique is linear, the “insertion envelope” or “watermark
`technique is linear, the "insertion envelope" or "watermark-
`ing Space' is well-defined and thus Susceptible to attacks
`50 ing space" is well-defined and thus susceptible to attacks
`50
`leSS Sophisticated than collusion by unauthorized parties.
`less sophisticated than collusion by unauthorized parties.
`Over-encoding at the watermarking encoding level is but
`Over-encoding at the watermarking encoding level is but
`one simple attack in Such linear implementations. Another
`one simple attack in such linear implementations. Another
`consideration not made by Leighton is that commercially
`consideration not made by Leighton is that commercially-
`valuable content may already exist in a unwatermarked form
`55 valuable content may already exist in a unwatermarked form
`55
`Somewhere, easily accessible to potential pirates, gutting the
`somewhere, easily accessible to potential pirates, gutting the
`need for any type of collusive activity. Digitally signing the
`need for any type of collusive activity. Digitally signing the
`embedded Signal with preprocessing of watermark data is
`embedded signal with preprocessing of watermark data is
`more likely to prevent Successful collusion. Furthermore, a
`more likely to prevent successful collusion. Furthermore, a
`“baseline' watermark as disclosed is quite Subjective. It is
`60 "baseline" watermark as disclosed is quite subjective. It is
`60
`Simply described elsewhere in the art as the “perceptually
`simply described elsewhere in the art as the "perceptually
`Significant” regions of a signal. Making a watermarking
`significant" regions of a signal. Making a watermarking
`function less linear or inverting the insertion of watermarks
`function less linear or inverting the insertion of watermarks
`would seem to provide the same benefit without the addi
`would seem to provide the same benefit without the addi-
`tional work required to create a “baseline' watermark.
`65 tional work required to create a "baseline" watermark.
`65
`Indeed, watermarking algorithms should already be capable
`Indeed, watermarking algorithms should already be capable
`of defining a target insertion envelope or region without
`of defining a target insertion envelope or

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket