`0000000834paAN
`
`
`
`as) United States
`a2) Patent Application Publication 0) Pub. No.: US 2008/0140433 Al
`Levy et al.
`(43) Pub. Date:
`Jun. 12, 2008
`
`(54) RIGHTS MANAGEMENTSYSTEMS AND
`METHODS USING CONTENT IDENTIFIERS
`
`(76)
`
`Inventors:
`
`Kenneth L. Levy, Stevenson, WA
`(US); Joel R. Meyer, Lake Oswego,
`OR (US)
`rer
`j
`i
`orrespondence Address:
`DIGIMARC CORPORATION
`9405 SW GEMINI DRIVE
`BEAVERTON, OR 97008
`
`(60) Provisional application No. 60/285,514, filed on Apr.
`20, 2001, provisional application No. 60/315,569,
`filed on Aug. 28, 2001.
`_. es
`Publication Classification
`
`(51)
`
`Int.ClL
`(2006.01)
`G06Q 10/00
`ae
`C521 USSG, ccemcecansaranncxsenanenesepnneemnnemnaziesenassn exncevenses PALOE
`(57)
`ABSTRACT
`
`(21) Appl. No.:
`
`11/865,557
`
`(22)
`
`Filed:
`
`Oct. 1, 2007
`
`Related U.S. Application Data
`
`The present invention relates to a variety ofcontent identifiers
`(e.g., fingerprinting and watermarking) and related methods.
`One methodrecites: associating a digital rights management
`(DRM)identifier with content; populating a first rights reg-
`istry with usage rights associated with the content, wherein
`the usagerights are indexed inthefirst rights registry accord-
`ing to the DRM identifier, and populating a second rights
`(63) Continuationof application No. 11/208,441, filed on_registry with at least someofthe usage rights, whereintheat
`Aug. 19, 2005, which is a continuation-in-part of
`least some ofthe usagerights are indexed in the secondrights
`application No. 10/126,921, filed on Apr. 18, 2002,
`registry according to a content identifier extracted or derived
`now Pat. No. 7,266,704.
`fromthe content. Other combinations are provided as well.
`
` Content Owner ID|Content ID
`
`
`
`Distributor ID VOD Operator ID|Retailer ID
`
`EX1006
`Roku V. Media Chain
`U.S. Patent No. 10,489,560
`
`EX1006
`Roku V. Media Chain
`U.S. Patent No. 10,489,560
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 1 of 20
`
`US 2008/0140433 Al
`
`Fig. 1
`
`Determine
`Usage Rights
`from Content
`Identifiers and
`Database
`
`Track Usage
`and/orBilling
`based on
`Identifiers
`
` Identify Content $1
`
`Repackage
`Content based
`on Identifiers, if
`Needed
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 2 of 20
`
`US 2008/0140433 Al
`
`| eea
`|
`40
`|
`|
`
`(
`Rendering
`PC 1
`*
`
`Rendering
`STBI/TV 1
`
`Internet or Other Network
`
`20
`
`
`Central Database
`Contains usage rules
`Contains usage dala
`
`*
`.
`
`v
`
` Central Billing Agency
`
`
`
`
`|
`
`|
`I
`
`s
`
`50
`
`|
`
`
`
`Rendering
`Portable Player |
`ov
`
`42
`
`J
`
`Home Content Server
`
`Provides usage rules
`*
`Monitors usage
`¢«
`
`
`wt
`or
`
`30
`
`!
`
`
`
`Recording
`Device
`
`
`
`45
`
`10
`
`FIG. 2
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 3 of 20
`
`US 2008/0140433 Al
`
`Fig. 3
`
` VOD Service Provider
`ID System
`
`\
`Retailer
`Rights
`
`/
`Consumer
`Rights
`
`Unique 1D
`q
`
`\
`Distributor
`Rights
`
`|
`Operator
`Rights
`
`
` gu
`
`
`Content Owner ID_| VOD Operator ID|Retailer IDContent ID Distributor ID
`
`
`
`Fig. 4
`
`
`
`
`ontent Owner
` ontent
`
`
`
`
`
`
`Content ID
`VOD Operator ID
`Content Owner ID
`Content Owner ID
`Content ID
`Retailer ID
`
`
`Consumer Usage Rules
`Content Owner ID
`
`
`
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 4 of 20
`
`US 2008/0140433 Al
`
` Distributor
`
`Distributor
`Database
`
`VOD Operator
`
`VOD Operator
`Database
`
`A
`
`.
`
`A
`
`Retailer
`
`Retailer
`Database
`
`.
`
`Consumer
`
`Consumer
`Database
`
`h
`
`Central Router
`
`Central Router
`Database
`
`|
`
`Content Owner C
`
`Y
`Content Owner A
`
`Content Owner A
`Database
`
`Y
`Content Owner B
`
`Content Owner B
`Database
`
`Ys
`
`
`Content Owner C
`Database
`
`FIG. 7
`
`Unique ID Distributor|Operator Relailer|Consumer
`
`q
`Billing
`Billing
`Billing
`Billing
`
`Billing System
`
`
`
`VODService Provider
`
`Consumer
`
`iv:
`
`,
`
`Distributor a
`
`Content Owner
`
`
`
`\
`
`
`
`=
`
`-.
`
`T
`
`i
`
`Pag -
`
`Unique ID Distributor|Operator|Retailer|Consumer
`Reporting|Reporting|Reporting|Reporting
`
`
`
`Reporting System
`
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 5 of 20
`
`US 2008/0140433 Al
`
`
`
`
`Operator
`
`
`Content Owner ID|ContentID|VOD Operator|VOD Operator Usage|Price to Retailer
`
`
`ID
`Rules
`
`
`
`
`Content Owner ID|ContentID|Retailer ID Retailer Usage Rules|Price to Consumer
`
`
`
`
`Content Owner ID|Content ID Consumer Usage Price to Distributor
`
`
`Rules
`
`
`
`
`
`Fig. 9
`
`
` Router
`Datab
`
`Content Owner
`Content OwnerA IP
`
`AID
`address
`VOD Operator B|VOD Operator B IP
`iD Address
`
`
`ID
`
`ID
`
` $5
`
`ID
`
`Usage Rules
`
`Rules
`
`Operator
`
`FA]
`
`Content Owner|Video DID VOD Operator
`
`ID
`Usage Rules
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 6 of 20
`
`US 2008/0140433 Al
`
` Band or
`
`
`
`
`
`Musician
`Records Music
`(Draft Content)
`
`
`
`S10
`
`Distribute Draft
`Content
`
`Receive
`Comments and
`Modify Draft
`Content,if
`needed
`
`Redistribute
`Modified Draft
`Content
`(focus Groups,
`etc.)
`
`Receive
`Comments and
`Create and
`Distribute Pre-
`Release Master
`
`Band Touch-
`
`Ups and Create
`Production
`Production
`Master
`Master
`
`
`Fig. 10
`
`| | | | | | | | |
`
`|
`
`| | | | | | | | | | | |
`
`S15
`
`Internal Security
`System
`(“private” DRM
`system)
`
`100
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 7 of 20
`
`US 2008/0140433 Al
`
`
`Digital
`Watermarked
`
`Production
`Watermark
`Production
`
`
`Embedder
`Master
`
`Master
`
` DWM Content ID
`
`Fig. 11
`
`Usage Rights
`
`
`
`
`
`
`Watermarked
`Public DRM
`Production
`System
`ea
`(including GUI)
`
`
`
`DRM Usage Rights Registry
`
`RMIDN|Rights or File Location
`
`DRM Content ID
`DRM 1D 1
`
`Usage Rights
`
`mmonentnneaaes P|
`
`DRM ID 2
`
`DRM-Protected ss
`Version (DRM ID 2) —
`
`||D
`
`Fig. 12
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 8 of 20
`
`US 2008/0140433 Al
`
`DRM Content ID
`DRM ID 1
`DRM ID 2
`
`Usage Rights
`
`[LeccePoe
`es
`kee <=
`ES
`PORN
`
`
`[DRWIDN[RigsoFeLocation
`
`[DwMioNa|S
`
`Public DRM
`System
`(including GUI)
`
`
` DWM Content ID}
`
`Usage Rights
`
`DWM ID 1
`DWM ID 2
`
`seed
`:
`DWM Usage Highs: Regity=[—_ss=~ds=sasaaa
`
`Fig. 13
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 9 of 20
`
`US 2008/0140433 Al
`
`Usage Rights
`
`
`
`
`DWM Content ID
`(via GUI or
`interface)
`
`Registry
`Creator
`
`DWM UsageRights Registry
`
`Public DRM
`System
`
`
`
`DWM
`Digital
`Watermarked
`
`Content ID
`Production
`Watermark
`
`Master
`Detector
`?
`
`
`
`Populate DRM
`Registry with
`Usage Rights
`according to
`DRM ContentID
`
`
`
`
`
`
`
`Populate both
`DRM and DWM
`Registries with
`Usage Rights
`
`DRM Content ID
`Usage Rights
`
`DWM Content ID
`UsageRights
`
`DRM UsageRights Registry
`
`DWM Usage Rights Registry
`
`| i i | | | i
`
`i
`|
`
`i i i i i | |
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 100f20
`
`US 2008/0140433 Al
`
`Fig. 16
`
`Public DRM
`System
`(including GUI)
`
`DWM Content 10
`
`
`
`DRM ID 52
`eSeS
`rsES
`r-se
`a
`
`8aoantReet DAW ID 1
`
`
`
`
`_—
`
`
`
`
`
`DRM Usage Rights Registry
`
`
`
`
`
`
`DRM ContentID
`
`UsageRights
`
`
`
`
`
`
`DRM D7
`
`
`
`DRM ID 12|Rights or File Location
`
`
`
`DRM ID 25
`
`
`
`
`
`
`
`
`DRM 1D 92
`
`
`
`
`
`DRM Content ID
`
`Usage Rights
`
`DRM System A Registry
`
`DRM System B Registry
`
`DRM System C Registry
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 11 of20
`
`US 2008/0140433 Al
`
`
`
`Media Server
`
`2. Detect Content ID
`
`
`3. Does Content
`
`
`No
`Yes
`
`
`
`acieiiacrentailed
`
`Client Player
`
`1. Select Raw Content
`and Request play or
`Transfer
`
`6. Display Copyright,
`Usage Rights and
`Related Action
`
`ID Exist?
`Rights to Player
`Appropriate)
`
`4a. Stream or Transfer
`Raw Content(go to
`block 10)
`
`
`
`4b. Do Usage
`Rights Exist?
`
`Yes
`
`5a. Neither Stream nor
`Transfer Raw Content
`
`5b. Send Usage
`
`
` 7. Accept
`Usage Rights?
`
`
`
`No
`
`Yes
`
`8a. Cancel Request
`
`10. Receve sngicy
`Play Content (and
`Display Copyrightif
`
`8b. Stream or Transfer
`Raw Contentto Player
`
`9. Enter DRM
`
`
`
`
`
`Patent Application Publication
`
`Jun. 12, 2008 Sheet 12 of 20
`
`US 2008/0140433 Al
`
`Client Player
`
`1
`
`. Select Raw Content
`and Requestplay or
`Transfer
`
`6. Display Copyright,
`
`Usage Rights and
`Related Action
`
`
` 7. Accept
`
`
`Usage Rights?
`
`Yes
`No
`
`8a. Cancel Request
`
`
`
`10. Receive and/or
`Play Content (and
`Display Copyrightif
`Appropriate)
`
`
`
`I1I|1I|1|IIII
`
`||
`
`|1IIIIII1|I
`
`Media Server A
`
`2. Detect Content ID
`
`
`
`
`3. Does Content
`ID Exist?
`
`
` No
`Yes
`
`4a. Stream or Transfer
`Raw Content (go to
`block 10)
`
`Transfer Raw Content
`
`5a. Neither Stream nor
`
`
`
`4b. Do Usage
`Rights Exist?
`
`Yes
`
`5b. Send Usage
`Rights to Player (or to
`a Player on a different
`Server)
`
`Raw Contentto Player
`
`8b. Stream or Transfer
`
`9. Enter DRM
`
`
`
`Fig. 17b
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 13 0f20
`
`US 2008/0140433 Al
`
`Client Player
`
`1. Select Raw Content
`and Requestplay or
`Transfer
`
`| |I
`
`r--
`
`sires
`
`in
`
`Media Server
`
`aie
`
`aoe
`
`2. Detect Content ID
`
`
`
`
`3. Does Content
`ID Exist?
`
`
`Content
`
`Yes
`
`14. Communicate
`DWM Content ID to
`online content store
`
`block 10)
`
`4a. Stream or Transfer
`Raw Content (go to
`
`Yes
`
`8a. Cancel Request
`
`10. Receive and/or
`Play Content according
`to DRM-packaging
`
`16. Receive New
`DRM-Packaged
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 140f20
`
`US 2008/0140433 Al
`
`
`
`Media Server
`
`2. Detect Content ID
`
`
`
`3. Does Content
`ID Exist?
`
`No
`
`Client Player
`
`1. Select Raw Content
`and Request play or
`Transfer
`
`14. Communicate
`DWM ContentID to
`online content store
`
`
`
`
`
`4a. Stream or Transfer
`Raw Content(go to
`
`black 10)
`
`Yes
`
`
`4b. Do Usage
`Rights Exist?
`
`
`15. Accept
`Terms?
`
`
`17. Do Usage
`Rights allow
`
`rendering?
`Play Content
`
`No
`
`8a. Cancel Request
`
`10. Receive and/or
`
`16. Receive New
`DRM-Packaged
`Content
`
`9. Enter DRM
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 15 of 20
`
`US 2008/0140433 Al
`
`Fig. 17e
`
`Online
`Content
`
`Store
`
`
`
`
`DWM Content ID
`+
`
`Forensic Tracking ID1
`
`DWM Content ID
`+
`
`Forensic Tracking ID2
`
`
`
` Media Server 3
`
`
`
`DWM Content ID
`+
`
`
`Forensic Tracking ID1
`
`Media Server 2
`
`Media Server 1
`
`DWM Content ID
`+
`
`DWM ContentID
`+
`
`Forensic Tracking ID2
`
`Forensic Tracking ID1
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 16 of 20
`
`US 2008/0140433 Al
`
`eteeo eo a eteree ‘
`Consumer Environment
`I
`
`
`
`| | i | l
`
`: | | i i |
`
`|
`
`|
`
`|| |
`
`Media Server
`
`Content ID DWM
`
`Client Player
`
`ContentFile
`Content ID DWM
`
`Rights Registry
`Usage Rights for contentin
`ConsumerEquipment
`
`C
`
`Internet or Consumer Environment
`
`
`
`Raw Content
`
`I
`;
`
`Reference Model
`
`Capture digital buffer
`Hacking the link encryption
`Hacking the DRM
`encryption
`Re-digitizing the analog
`output (a.k.a. analog hole)
`Downloadingfiles, such as
`from P2P
`Ripping CDs
`Using DeCSS to rip DVDs
`
`i
`a
`|
`!
`
`'
`
`1. Select raw
`content
`
`i
`:
`'
`
`i
`
`:
`j
`|
`
`Import Content
`Encryption
`Package
`
`Usage
`Rights
`
`
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 170f20
`
`US 2008/0140433 Al
`
`
`
`Media Server
`
`3. Does Content
`
`Client Player
`
`1. Select Raw Content
`and Request play or
`Transfer
`
`6. Display Copyright,
`Usage Rights and
`Related Action
`
`
`4b. Do Usage
`Rights Exist?
`
` 7. Accept
`Usage Rights?
`
`4a. Detect CCI bits
`
`8a. Cancel Request
`
`5b. Send Usage
`Rights to Player(or to
`a Player on a different
`Server)
`
`8b. Stream or Transfer
`Raw Content to Player
`
`ee
`ID Exist?
`2, Detect Content ID
`
`
`
` 13a. Stream or
`
`11. Do GCI bits Exist?
`
`10. Receive and/or
`
`
`Play Content (and
`9. Enter DRM
`Display Copyright if
`Appropriate)
`
`12a, Does CCI
`12b. Did Content
`ID Exist?
`State Allow Action?
`
`
`13b. Neither Stream
`nor Transfer Raw
`Content
`
`Transfer Raw Content
`to Player or to Another
`Server
`
`iIIIII\iIIIiIIIIIIiIIIIIIIIIII|IIIIIII
`
`I
`I
`!
`
`IIII||IIIIIII\IIIIIIIIII|IIIIII!IIIIIII
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 18 of 20
`
`US 2008/0140433 Al
`
`Package
`
`Export Content
`
`Encryption
`
`Usage
`Rights
`
`;
`
`i
`i
`|
`:
`
`Reference Model
`
`1. Select raw
`content
`
`7
`
`|
`
`|
`
`\
`
`Import Content
`
`Encryption
`
`Usage
`Rights
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 19 of 20
`
`US 2008/0140433 Al
`
`Media Server
`
`(DRM-B)
`
`Fig. 22a
`
`Media Server
`
`(DRM-B) DRM-A Registry
`
`Media Server
`
`(DRM-B)
`
`DRM-B Registry
`
`
`
`Patent Application Publication
`
`Jun. 12,2008 Sheet 200f20
`
`US 2008/0140433 Al
`
`Media Server
`
`(DRM-B)
`
`DRM-B Registry
`
`
`
`Watermarked
`Production
`Master
`
`
`
`
`
`
`(Content ID1)
`UsageRights
` Content
`
`
`
`Watermarked
`Public DRM
`
`Watermark
`Watermark
`Production
`System
`Detector
`Embedder
`Master
`(ID1 + ID2)
`(including GUI)
`
`
`
`;
`
`F IQ * 23
`
`DRM-Protected
`
`Version
`
`
`
`US 2008/0140433 Al
`
`Jun. 12, 2008
`
`RIGHTS MANAGEMENT SYSTEMS AND
`METHODS USING CONTENT IDENTIFIERS
`
`RELATED APPLICATION DATA
`
`[0001] This application is a continuation of U.S. patent
`application Ser. No. 11/208,441, filed Aug. 19, 2005 (pub-
`lished as US 2006-0062426 A1), which is a continuationin
`part of U.S. patent application Ser. No. 10/126,921, filed Apr.
`18, 2002 (published as US 2002-0186844 Al). The Ser. No.
`10/126,921 application also claims the benefit of U.S. Patent
`Application Nos. 60/285,514, filed Apr. 20, 2001 and 60/315,
`569,filed Aug. 28, 2001. Each of the above-mentioned patent
`documents is hereby incorporated by reference.
`[0002] This applicationis also related to the present assizn-
`ee’s U.S. Pat. No. 6,505,160, published U.S. Patent Applica-
`tion Nos. US 2002-0052885 Al and US 2003-0056103 Al,
`and provisional patent application No. 60/256,628. Each of
`the above-mentioned patent documents is hereby incorpo-
`rated by reference.
`
`TECHNICALFIELD
`
`[0003] The present invention relates to integrating content
`identifiers with digital rights management systems. The
`present inventionalsorelates to multimedia signal process-
`ing, such as steganographically encoding auxiliary informa-
`tion into media signals, and decoding the auxiliary informa-
`tion from the media signals.
`
`BACKGROUND AND SUMMARYOF THE
`INVENTION
`
`[0004] Managementofdigital assets becomes an increas-
`ingly difficult challenge as digital content proliferates. The
`term “content” is broadly defined herein and may include
`audio, video, images, electronic data, biometric information,
`graphics and designs, electronic documents, copyrighted
`materials, software, multimedia content,etc., etc. Sometimes
`weinterchangeably use the term “media”for “content” in this
`document. Enhancements in computer networking and data-
`base technology allow companies to manage large content
`collections and to make the content available tothird parties.
`While network communication provides a powerful tool to
`enable a database manager to share content with others, it
`makes it more difficult to control and track how the contentis
`being used.
`[0005]
`For example, some companies maintain extensive
`content databases to promote their products. Customers or
`service providers such as advertising and marketing firms can
`access this content remotely via an internet, extranet, web
`site, intranet, LAN, WAN, wireless network orfile transfer
`transactions. Although computer networking telecommuni-
`cation technology facilitates access, it makes it difficult to
`ensure that customers and services providers are getting the
`latest content, and that they are getting accurate and helpful
`informationrelating to the content.
`[0006] There is a need to enable digital rights management
`systems to reliably link content with additional, related
`data—includingrelated content. The terms “link” and “link-
`ing” are defined broadly herein to include associating, point-
`ing to, facilitating the access of, linking, connecting or con-
`necting to, revealing a storage address of, and/or facilitating
`database interrogation, etc. There is also a need for a digital
`rights management system to reliably link content with
`related usagebilling information. One way to associate con-
`
`tent with information about the contentis to place the infor-
`mation in a file header or footer (we interchangeably use the
`terms “header” and “footer” in this application). This
`approachis notterribly attractive because the added informa-
`tion often does not survivefile format changes, conversion to
`the analog domain, andis susceptible to being stripped away,
`etc. We believe that an improved approach to associate con-
`tent with related data is to steganographically hide identifying
`information within the content. One example of steganogra-
`phy is digital watermarking.
`[0007] Digital watermarking is the science of encoding
`physical and electronic objects with plural-bit digital data, in
`such a manner that the data is essentially hidden from human
`perception, yet can be recovered by computer analysis. Most
`commonly, digital watermarking is applied to media such as
`images, audio signals, and video signals. However, it may
`also be applied to other types ofdata, including documents
`(e.g., through line, word or character shifting), software,
`multi-dimensional graphics models, and surface textures of
`objects. In physical objects, the data may be encodedin the
`form ofsurface texturing, or printing. Such marking can be
`detected fromoptical scan data, e.g., from a scanner, optical
`reader, input device, digital camera, or web cam. In electronic
`media (e.g., digital audio or imagery—including video), the
`data may be encodedas slight variations in sample values. Or
`if the media is represented in a so-called orthogonal domain
`(also termed “non-perceptual,” e.g., MPEG, DCT, wavelet,
`etc.), the data may be encodedas slight variations in quanti-
`zation values or levels. The assignee’s U.S. Pat. Nos. 5,862,
`260, 6,122,403 and 6,614,914 are illustrative ofcertain digital
`watermarking technologies and are each hereby incorporated
`by reference. A great many other approaches are familiar to
`those skilled in the art. The artisan is presumed to be familiar
`with the full range of literature about steganography, data
`hiding and digital watermarking.
`[0008] Digital watermarking systems typically have two
`primary components: an encoder that embeds the watermark
`ina host media signal, anda decoderthatdetects and reads the
`embedded watermark froma signal suspected of containing a
`watermark (e.g., a suspect signal). The encoder embeds a
`watermarkby altering the host media signal. For example, the
`encoder (or embedder) component embeds a watermark by
`altering data samples of the media content in the spatial,
`temporal or someother transform domain (e.g., Fourier, Dis-
`crete Cosine, Wavelet Transform domains). The decoder
`component analyzes a suspect signal to detect whether a
`watermark is present. In applications where the watermark
`encodes information, the decoder extracts this information
`from the detected watermark.
`
`[0009] The analysis of the detected data can be accom-
`plished in various known ways. Presently, most stegano-
`graphic decoding relies on general-purpose microprocessors
`that are programmed by suitable software instructions to per-
`form the necessary analysis. Other arrangements, such as
`using dedicated hardware, reprogrammable gate arrays, or
`other techniques, can of course be used.
`[0010] According to one aspect ofour invention, a digital
`watermarking system includes (or communicates with) a sec-
`ondary component—a database. Such a database preferably
`includes data related to content. The related data may include,
`e.g., content owneror copyright information, metadata, usage
`rights, enhanced or interactive content, and billing informa-
`tion, etc. (The terms “usage rights” (or interchangeably:
`“usage rules”) are broadly intended in this application. Usage
`
`
`
`US 2008/0140433 Al
`
`Jun. 12, 2008
`
`enables the content owners to be properly paid, and users to
`share content, instead of merely prohibiting use of the con-
`tent.
`
`rights identify permissible (or restricted) actionsor uses asso-
`ciated with content. A few of the many examples include play
`control, encryption requirements,
`rendering restrictions,
`required permissions, etc.) The above related data is prefer-
`ably organized or linked according to respective content iden-
`tifiers. For example, if the content includes a song and the
`related data includes usagerules, then the usage rules can be
`associated with the song via a contentidentifier that is unique
`to the song or to a class ofrelated songs. The database can be
`stored locally, remotely, or both. The database can also be
`distributed, with different databases stored in different net-
`worksor locations, such as a complete central and mirrored
`database and local databases including only subsets of the
`related data on a local computer. Of course our usage of the
`term database throughout this document is broad enoughto
`include software-based databases, data structures, data
`records, etc., etc.
`
`[0013] Oneaspect ofthe present invention provides content
`owners with copy protection security and royalty tracking,
`and end-users with an easy-to-use systemthat improves cur-
`rent content distribution methods, such as CD, DVD and
`VHS. A combination of watermarking and DRM techniques
`can be employed. where a watermark allows content to leave
`and be found outside an associated DRM package without
`harming the security of the system, The watermarkidentifi-
`cation canlink the contentto the usagerules, and, optionally,
`the usage rules can dictate whether the content should be
`re-packagedinto the DRM packageif found outsideofit. This
`means that content found outside the DRM package can be
`purchased and used, as well as re-secured, as opposed to that
`content being considered illegal and perhaps destroyed. This
`inventive feature increases the revenue generated from the
`[0011] User-friendly digital rights management systems
`content.A DRM packageis broadly defined and may include
`are preferred in our evolving digital and connected world.
`an encryption-based format, ora container in which contentis
`securely maintained, etc, Artisans know many DRM packag-
`Many digital rights management systems fail because they
`ing techniques, which may be suitably interchanged with the
`focus solely on the content owner’s security desires and not
`packaging aspect ofthe present invention. DRM systemshelp
`on consumer usage. As such, these rights management sys-
`publishers or content owners prevent unauthorized copying,
`temsare not acceptable to consumers. A historical example is
`replication, usage or distribution oftheir software products,
`taken from the software industry in the 1980’s, when that
`either via CD-ROM, via the Internet, transfer, etc. Other
`industry abandoned copy protection. We have solved some of
`DRM systems incorporate encryption, digital signature and
`the failing associated withtraditional digital rights manage-
`license manager technologies, and enable authentication
`ment systems. Ourinventive user-friendly digital rights man-
`fromeither a disc, online database, or from a PC hard drive.
`agement system provides transparent usage models to con-
`These technologies can be applied to secure CD-ROM or
`sumers while protecting the content. In one implementation,
`computer executable files, and to maintain desired control
`auser-friendly rights management system enables consumers
`over the distribution of content during its life cycle.A DRM
`to easily purchase content that they want to play or use, as
`packagethat allows licensing and reporting provides an ideal
`opposed to stopping consumers from using the content. One
`rights management systemfor audio, video and images.
`benefit of our inventive systemis that it is now easier for a
`[0014]
`Stull another aspect of the present
`invention is
`mass market to purchase content, rather than use illegiti-
`method of associating content with usage rights.The content
`mately obtained content.
`includes a digital watermark embedded therein. The digital
`[0012]
`In one embodiment of the present invention, a digi-
`watermark (DWM) includes a DWM content identifier. The
`tal watermark embedded within a content item is used to
`method includes: associating a digital rights management
`convey a content identifier(s). In a second embodiment, file
`headers associated with a content item include a content
`(DRM) content
`identifier with the watermarked content:
`populatingafirst rights registry with usage rights associated
`identifier(s). In still another embodiment, both digital water-
`with the content, wherein the usage rights are indexed in the
`marks and file headers are used to carry content identifiers.
`first rights registry with the DRM content identifier; and
`Content identifiers can be linked to related data, such as
`populating a secondrights registry with at least some ofthe
`“usage rights” (or “usage rules”) common in some digital
`usage rights, wherein the at least some ofthe usage rights are
`rights management (DRM) systems. (Theartisan is presumed.
`indexed in the second rights registry with the DWM content
`familiar with the many DRM systems, a few of which are
`identifier.
`described in U.S. Pat. Nos, 5,765,152, 5,410,598, 5,943,422,
`6,363,488 and 6,330,670, which are each hereby incorpo-
`rated by reference. Of course there are many other DRM
`systems and DRM-packaging that can be enhanced by the
`present invention.). These rules typically define the scope of
`permissible content use, e.g., such as regulating printing,
`viewing, copying, altering, distributing, selling, etc. Digital
`watermarks—including a content identifier—canbe used for
`content tracking and data management. In another embodi-
`ment, digital watermarks are used in connection with DRM
`content containers. Another aspect of the invention is a
`method ofperforming digital asset management of media
`content. In even another embodiment the copy protection
`state (also known as copy control information including copy
`freely, copy no more, copy never, and/or copy once) can be
`overridden through linkingthe identifier to usagerules, if the
`usage rules allow copy protection informationto be overrid-
`den, e.g., to enable the sale or distribution of the content. This
`
`[0015] Yet anotheraspectofthe present invention provides
`a method of associating content with usage rights. The con-
`tent includes a digital watermark (DWM) having a DWM
`content identifier. The method includes: associating a digital
`rights management (DRM) content identifier with the water-
`marked content; populating a first rights registry with usage
`rights associated with the content, wherein the usage rights
`are indexed in thefirst rights registry according to theDRM
`content identifier; and populating a second rights registry
`with the DRM content identifier, wherein the DRM content
`identifier is indexed according to the DWM contentidentifier.
`[0016]
`Still another aspectofthe presentinvention provides
`a method comprising: receiving raw content exported from a
`first digital rights management (DRM) system; detecting a
`content identifier steganographically embedded in the raw
`content: using the content identifier and information associ-
`ated with a second, different DRM system to obtain usage
`
`
`
`US 2008/0140433 Al
`
`Jun. 12, 2008
`
`rights that are compatible with the second, different DRM
`system; receiving the usage rights; and providing the raw
`content and the usage rights to the second, different DRM
`system.
`Still other aspects ofthe present invention provide a
`[0017]
`method to control a media server. The method includes, upon
`receiving a request to access raw content, searching the raw
`content fora contentidentifier steganographically embedded
`therein. Ifa contentidentifier is found: the method accesses a
`
`rights registry for usage rights associated with the content
`identifier; receives the usage rights from the rights registry:
`presents the usagerights for user acceptance; and upon accep-
`tance ofthe usage rights, provides the usage rights and raw
`contentto a resident digital rights management (DRM) sys-
`tem to control access ofthe content.
`[0018]
`Further
`features, aspects and advantages will
`become even more apparent with reference to the following
`detailed description and drawings.
`
`FIG. 19 illustrates a hierarchical process to handle
`[0037]
`content including both copy control information (CCI) and
`embedded DWM Content Identifiers (ID).
`[0038]
`FIG. 20 illustrates a process to repackage raw con-
`tent.
`
`FIG. 21 illustrates a process to transport content
`[0039]
`from a first DRM system to second, different DRM system.
`[0040]
`FIGS. 22a-22d illustrate communication routes to
`receive compatible Usage Rights.
`[0041]
`FIG. 23 illustrates a transmarking example, where a
`watermark from a production master is decoded and another
`watermark is added to content prior to DRM-packaging.
`
`DETAILED DESCRIPTION
`
`Rights Management System
`[0042] With reference to FIG, 1, a rights managementsys-
`tem preferably includes four steps. In step 51, content,
`whether within an encryption package or not, is identified
`before rendering. (“Rendering”here hasits familiar meaning
`ofpresenting for visual and/or audible inspection, e.g., ona
`FIG. 1 illustrates a flow diagram of a content man-
`[0019]
`TV, audio player, etc. Ouruse ofthe term “rendering”is broad
`agement process according to one embodimentof the present
`invention.
`enough to include transferring, copying and distributing.).
`Contentis preferably identified by steganographically encod-
`[0020]
`FIG. 2 illustrates a system for enhancing digital
`ing data within the content, such as in the form of a digital
`content management by identifying content, and linking the
`watermark. The digital watermark preferably includes a
`content with usage rules or permissions.
`unique content identifier. Content can be alternatively iden-
`[0021]
`FIG. 3 illustrates an inventive content distribution
`chain.
`tified via frame and/or segment headers.
`FIG. 4 illustrates a content identifier format.
`[0022]
`[0043] Usage rights are determined in step S2 via linking
`
`[0023] FIG.5illustrates a database structure for the distri-
`the content identifier to external data (e.g., data defining the
`bution chainillustrated in FIG. 3.
`usage rules). In general, usage rules define the scope of per-
`mitted use for respective content. Examples of usage rules
`include the scope of permissible copying, rendering, trans-
`ferring, altering, playing, viewing, printing, distributing,
`using, etc. Content identifiers can be used to organize a data-
`base that is maintained locally or remotely (e.g., a central
`usage system). Onceextracted fromcontent, an identifier can
`be thenusedto interrogate the database toretrieve the usage
`rules. Content usage is regulated based onits corresponding
`usage rules.
`[0044] Content usage can be tracked via anidentifier in step
`53. This usage tracking can be used, e.g., for proper billing to
`the consumer and payment to content owners and providers.
`Tracking can be incremental or per content item. In one
`embodiment, each video frame or every nth frame (or audio
`segment) is uniquely or redundantly identified. Tracking
`identifiers per frame (or audio segment)allows for a “pay-as-
`you-go” system, in that a consumercan be billed for only the
`amount of content they view, access or listen to. In another
`embodiment, billing is based on a one-time access fee.
`[0045] Asa fourth and optional step (step $4), if contentis
`found outside of its respective DRM, andit should be in the
`DRM packageas dictated by related usage rules, the content
`identifier can help facilitate repackaging of the content in a
`DRMcontainer. Initially, the identifier will help identify the
`content. The identifier can also identify or point to a specific
`package or packaging protocol, or the identifier can link to
`repackaging requirements. An identifier can also be linked to
`usage rules, which can regulate content usage, even for con-
`tent outside of a package. Examples ofcontent being located
`outside of a container include transferring the content to a
`different medium, or converting froma digital format to an
`analog format. Since the contentidentifier is content specific,
`e€.g.,
`it is associated with the content and not the container,it
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 6 illustrates anintelligent content distribution
`[0024]
`system, including linking databases via a central router to
`enhanceefficiency and privacy of metadata.
`[0025]
`FIG. 7illustrates a content distribution chain includ-
`ing a reporting system anda billing system.
`[0026]
`FIG. 8 illustrates the structure of FIG. 5, including
`billing information.
`[0027]
`FIG. 9 demonstrates a distributed database exem-
`plar system.
`[0028]
`FIG. 10 illustrates a content creation example.
`[0029]
`FIG. 11 illustrates digital watermarking a Content
`Identifier (ID) in a production master.
`[0030]
`FIG. 12 illustrates DRM packaging and DRM reg-
`istry population.
`[0031]
`FIG. 13 illustrates a digital watermark (DWM)
`Rights Registry.
`[0032]
`FIG. 14 illustrates a registry creator.
`[0033]
`FIG. 15 illustrates a public DRM systemincluding a
`digital watermark detector.
`[0034]
`FIG.
`16 illustrates another digital watermark
`(DWM)Rights Registry.
`[0035]
`FIG. 17aillustrates a process to detect and respect a
`DWMContent ID in a Media Server; FIG. 176 illustrates a
`process to detect and respect aDWM Content ID ina Media
`Server for Media Server to Media Server content transfers:
`FIG, 17illustrates a process to detect a DWM Content ID
`andlink to an online contentstoreor distributor from a Media
`Server; FIG.