throbber

`0000000834paAN
`
`
`
`as) United States
`a2) Patent Application Publication 0) Pub. No.: US 2008/0140433 Al
`Levy et al.
`(43) Pub. Date:
`Jun. 12, 2008
`
`(54) RIGHTS MANAGEMENTSYSTEMS AND
`METHODS USING CONTENT IDENTIFIERS
`
`(76)
`
`Inventors:
`
`Kenneth L. Levy, Stevenson, WA
`(US); Joel R. Meyer, Lake Oswego,
`OR (US)
`rer
`j
`i
`orrespondence Address:
`DIGIMARC CORPORATION
`9405 SW GEMINI DRIVE
`BEAVERTON, OR 97008
`
`(60) Provisional application No. 60/285,514, filed on Apr.
`20, 2001, provisional application No. 60/315,569,
`filed on Aug. 28, 2001.
`_. es
`Publication Classification
`
`(51)
`
`Int.ClL
`(2006.01)
`G06Q 10/00
`ae
`C521 USSG, ccemcecansaranncxsenanenesepnneemnnemnaziesenassn exncevenses PALOE
`(57)
`ABSTRACT
`
`(21) Appl. No.:
`
`11/865,557
`
`(22)
`
`Filed:
`
`Oct. 1, 2007
`
`Related U.S. Application Data
`
`The present invention relates to a variety ofcontent identifiers
`(e.g., fingerprinting and watermarking) and related methods.
`One methodrecites: associating a digital rights management
`(DRM)identifier with content; populating a first rights reg-
`istry with usage rights associated with the content, wherein
`the usagerights are indexed inthefirst rights registry accord-
`ing to the DRM identifier, and populating a second rights
`(63) Continuationof application No. 11/208,441, filed on_registry with at least someofthe usage rights, whereintheat
`Aug. 19, 2005, which is a continuation-in-part of
`least some ofthe usagerights are indexed in the secondrights
`application No. 10/126,921, filed on Apr. 18, 2002,
`registry according to a content identifier extracted or derived
`now Pat. No. 7,266,704.
`fromthe content. Other combinations are provided as well.
`
` Content Owner ID|Content ID
`
`
`
`Distributor ID VOD Operator ID|Retailer ID
`
`EX1006
`Roku V. Media Chain
`U.S. Patent No. 10,489,560
`
`EX1006
`Roku V. Media Chain
`U.S. Patent No. 10,489,560
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 1 of 20
`
`US 2008/0140433 Al
`
`Fig. 1
`
`Determine
`Usage Rights
`from Content
`Identifiers and
`Database
`
`Track Usage
`and/orBilling
`based on
`Identifiers
`
` Identify Content $1
`
`Repackage
`Content based
`on Identifiers, if
`Needed
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 2 of 20
`
`US 2008/0140433 Al
`
`| eea
`|
`40
`|
`|
`
`(
`Rendering
`PC 1
`*
`
`Rendering
`STBI/TV 1
`
`Internet or Other Network
`
`20
`
`
`Central Database
`Contains usage rules
`Contains usage dala
`
`*
`.
`
`v
`
` Central Billing Agency
`
`
`
`
`|
`
`|
`I
`
`s
`
`50
`
`|
`
`
`
`Rendering
`Portable Player |
`ov
`
`42
`
`J
`
`Home Content Server
`
`Provides usage rules
`*
`Monitors usage
`¢«
`
`
`wt
`or
`
`30
`
`!
`
`
`
`Recording
`Device
`
`
`
`45
`
`10
`
`FIG. 2
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 3 of 20
`
`US 2008/0140433 Al
`
`Fig. 3
`
` VOD Service Provider
`ID System
`
`\
`Retailer
`Rights
`
`/
`Consumer
`Rights
`
`Unique 1D
`q
`
`\
`Distributor
`Rights
`
`|
`Operator
`Rights
`
`
` gu
`
`
`Content Owner ID_| VOD Operator ID|Retailer IDContent ID Distributor ID
`
`
`
`Fig. 4
`
`
`
`
`ontent Owner
` ontent
`
`
`
`
`
`
`Content ID
`VOD Operator ID
`Content Owner ID
`Content Owner ID
`Content ID
`Retailer ID
`
`
`Consumer Usage Rules
`Content Owner ID
`
`
`
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 4 of 20
`
`US 2008/0140433 Al
`
` Distributor
`
`Distributor
`Database
`
`VOD Operator
`
`VOD Operator
`Database
`
`A
`
`.
`
`A
`
`Retailer
`
`Retailer
`Database
`
`.
`
`Consumer
`
`Consumer
`Database
`
`h
`
`Central Router
`
`Central Router
`Database
`
`|
`
`Content Owner C
`
`Y
`Content Owner A
`
`Content Owner A
`Database
`
`Y
`Content Owner B
`
`Content Owner B
`Database
`
`Ys
`
`
`Content Owner C
`Database
`
`FIG. 7
`
`Unique ID Distributor|Operator Relailer|Consumer
`
`q
`Billing
`Billing
`Billing
`Billing
`
`Billing System
`
`
`
`VODService Provider
`
`Consumer
`
`iv:
`
`,
`
`Distributor a
`
`Content Owner
`
`
`
`\
`
`
`
`=
`
`-.
`
`T
`
`i
`
`Pag -
`
`Unique ID Distributor|Operator|Retailer|Consumer
`Reporting|Reporting|Reporting|Reporting
`
`
`
`Reporting System
`
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 5 of 20
`
`US 2008/0140433 Al
`
`
`
`
`Operator
`
`
`Content Owner ID|ContentID|VOD Operator|VOD Operator Usage|Price to Retailer
`
`
`ID
`Rules
`
`
`
`
`Content Owner ID|ContentID|Retailer ID Retailer Usage Rules|Price to Consumer
`
`
`
`
`Content Owner ID|Content ID Consumer Usage Price to Distributor
`
`
`Rules
`
`
`
`
`
`Fig. 9
`
`
` Router
`Datab
`
`Content Owner
`Content OwnerA IP
`
`AID
`address
`VOD Operator B|VOD Operator B IP
`iD Address
`
`
`ID
`
`ID
`
` $5
`
`ID
`
`Usage Rules
`
`Rules
`
`Operator
`
`FA]
`
`Content Owner|Video DID VOD Operator
`
`ID
`Usage Rules
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 6 of 20
`
`US 2008/0140433 Al
`
` Band or
`
`
`
`
`
`Musician
`Records Music
`(Draft Content)
`
`
`
`S10
`
`Distribute Draft
`Content
`
`Receive
`Comments and
`Modify Draft
`Content,if
`needed
`
`Redistribute
`Modified Draft
`Content
`(focus Groups,
`etc.)
`
`Receive
`Comments and
`Create and
`Distribute Pre-
`Release Master
`
`Band Touch-
`
`Ups and Create
`Production
`Production
`Master
`Master
`
`
`Fig. 10
`
`| | | | | | | | |
`
`|
`
`| | | | | | | | | | | |
`
`S15
`
`Internal Security
`System
`(“private” DRM
`system)
`
`100
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 7 of 20
`
`US 2008/0140433 Al
`
`
`Digital
`Watermarked
`
`Production
`Watermark
`Production
`
`
`Embedder
`Master
`
`Master
`
` DWM Content ID
`
`Fig. 11
`
`Usage Rights
`
`
`
`
`
`
`Watermarked
`Public DRM
`Production
`System
`ea
`(including GUI)
`
`
`
`DRM Usage Rights Registry
`
`RMIDN|Rights or File Location
`
`DRM Content ID
`DRM 1D 1
`
`Usage Rights
`
`mmonentnneaaes P|
`
`DRM ID 2
`
`DRM-Protected ss
`Version (DRM ID 2) —
`
`||D
`
`Fig. 12
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 8 of 20
`
`US 2008/0140433 Al
`
`DRM Content ID
`DRM ID 1
`DRM ID 2
`
`Usage Rights
`
`[LeccePoe
`es
`kee <=
`ES
`PORN
`
`
`[DRWIDN[RigsoFeLocation
`
`[DwMioNa|S
`
`Public DRM
`System
`(including GUI)
`
`
` DWM Content ID}
`
`Usage Rights
`
`DWM ID 1
`DWM ID 2
`
`seed
`:
`DWM Usage Highs: Regity=[—_ss=~ds=sasaaa
`
`Fig. 13
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 9 of 20
`
`US 2008/0140433 Al
`
`Usage Rights
`
`
`
`
`DWM Content ID
`(via GUI or
`interface)
`
`Registry
`Creator
`
`DWM UsageRights Registry
`
`Public DRM
`System
`
`
`
`DWM
`Digital
`Watermarked
`
`Content ID
`Production
`Watermark
`
`Master
`Detector
`?
`
`
`
`Populate DRM
`Registry with
`Usage Rights
`according to
`DRM ContentID
`
`
`
`
`
`
`
`Populate both
`DRM and DWM
`Registries with
`Usage Rights
`
`DRM Content ID
`Usage Rights
`
`DWM Content ID
`UsageRights
`
`DRM UsageRights Registry
`
`DWM Usage Rights Registry
`
`| i i | | | i
`
`i
`|
`
`i i i i i | |
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 100f20
`
`US 2008/0140433 Al
`
`Fig. 16
`
`Public DRM
`System
`(including GUI)
`
`DWM Content 10
`
`
`
`DRM ID 52
`eSeS
`rsES
`r-se
`a
`
`8aoantReet DAW ID 1
`
`
`
`
`_—
`
`
`
`
`
`DRM Usage Rights Registry
`
`
`
`
`
`
`DRM ContentID
`
`UsageRights
`
`
`
`
`
`
`DRM D7
`
`
`
`DRM ID 12|Rights or File Location
`
`
`
`DRM ID 25
`
`
`
`
`
`
`
`
`DRM 1D 92
`
`
`
`
`
`DRM Content ID
`
`Usage Rights
`
`DRM System A Registry
`
`DRM System B Registry
`
`DRM System C Registry
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 11 of20
`
`US 2008/0140433 Al
`
`
`
`Media Server
`
`2. Detect Content ID
`
`
`3. Does Content
`
`
`No
`Yes
`
`
`
`acieiiacrentailed
`
`Client Player
`
`1. Select Raw Content
`and Request play or
`Transfer
`
`6. Display Copyright,
`Usage Rights and
`Related Action
`
`ID Exist?
`Rights to Player
`Appropriate)
`
`4a. Stream or Transfer
`Raw Content(go to
`block 10)
`
`
`
`4b. Do Usage
`Rights Exist?
`
`Yes
`
`5a. Neither Stream nor
`Transfer Raw Content
`
`5b. Send Usage
`
`
` 7. Accept
`Usage Rights?
`
`
`
`No
`
`Yes
`
`8a. Cancel Request
`
`10. Receve sngicy
`Play Content (and
`Display Copyrightif
`
`8b. Stream or Transfer
`Raw Contentto Player
`
`9. Enter DRM
`
`
`
`

`

`Patent Application Publication
`
`Jun. 12, 2008 Sheet 12 of 20
`
`US 2008/0140433 Al
`
`Client Player
`
`1
`
`. Select Raw Content
`and Requestplay or
`Transfer
`
`6. Display Copyright,
`
`Usage Rights and
`Related Action
`
`
` 7. Accept
`
`
`Usage Rights?
`
`Yes
`No
`
`8a. Cancel Request
`
`
`
`10. Receive and/or
`Play Content (and
`Display Copyrightif
`Appropriate)
`
`
`
`I1I|1I|1|IIII
`
`||
`
`|1IIIIII1|I
`
`Media Server A
`
`2. Detect Content ID
`
`
`
`
`3. Does Content
`ID Exist?
`
`
` No
`Yes
`
`4a. Stream or Transfer
`Raw Content (go to
`block 10)
`
`Transfer Raw Content
`
`5a. Neither Stream nor
`
`
`
`4b. Do Usage
`Rights Exist?
`
`Yes
`
`5b. Send Usage
`Rights to Player (or to
`a Player on a different
`Server)
`
`Raw Contentto Player
`
`8b. Stream or Transfer
`
`9. Enter DRM
`
`
`
`Fig. 17b
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 13 0f20
`
`US 2008/0140433 Al
`
`Client Player
`
`1. Select Raw Content
`and Requestplay or
`Transfer
`
`| |I
`
`r--
`
`sires
`
`in
`
`Media Server
`
`aie
`
`aoe
`
`2. Detect Content ID
`
`
`
`
`3. Does Content
`ID Exist?
`
`
`Content
`
`Yes
`
`14. Communicate
`DWM Content ID to
`online content store
`
`block 10)
`
`4a. Stream or Transfer
`Raw Content (go to
`
`Yes
`
`8a. Cancel Request
`
`10. Receive and/or
`Play Content according
`to DRM-packaging
`
`16. Receive New
`DRM-Packaged
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 140f20
`
`US 2008/0140433 Al
`
`
`
`Media Server
`
`2. Detect Content ID
`
`
`
`3. Does Content
`ID Exist?
`
`No
`
`Client Player
`
`1. Select Raw Content
`and Request play or
`Transfer
`
`14. Communicate
`DWM ContentID to
`online content store
`
`
`
`
`
`4a. Stream or Transfer
`Raw Content(go to
`
`black 10)
`
`Yes
`
`
`4b. Do Usage
`Rights Exist?
`
`
`15. Accept
`Terms?
`
`
`17. Do Usage
`Rights allow
`
`rendering?
`Play Content
`
`No
`
`8a. Cancel Request
`
`10. Receive and/or
`
`16. Receive New
`DRM-Packaged
`Content
`
`9. Enter DRM
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 15 of 20
`
`US 2008/0140433 Al
`
`Fig. 17e
`
`Online
`Content
`
`Store
`
`
`
`
`DWM Content ID
`+
`
`Forensic Tracking ID1
`
`DWM Content ID
`+
`
`Forensic Tracking ID2
`
`
`
` Media Server 3
`
`
`
`DWM Content ID
`+
`
`
`Forensic Tracking ID1
`
`Media Server 2
`
`Media Server 1
`
`DWM Content ID
`+
`
`DWM ContentID
`+
`
`Forensic Tracking ID2
`
`Forensic Tracking ID1
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 16 of 20
`
`US 2008/0140433 Al
`
`eteeo eo a eteree ‘
`Consumer Environment
`I
`
`
`
`| | i | l
`
`: | | i i |
`
`|
`
`|
`
`|| |
`
`Media Server
`
`Content ID DWM
`
`Client Player
`
`ContentFile
`Content ID DWM
`
`Rights Registry
`Usage Rights for contentin
`ConsumerEquipment
`
`C
`
`Internet or Consumer Environment
`
`
`
`Raw Content
`
`I
`;
`
`Reference Model
`
`Capture digital buffer
`Hacking the link encryption
`Hacking the DRM
`encryption
`Re-digitizing the analog
`output (a.k.a. analog hole)
`Downloadingfiles, such as
`from P2P
`Ripping CDs
`Using DeCSS to rip DVDs
`
`i
`a
`|
`!
`
`'
`
`1. Select raw
`content
`
`i
`:
`'
`
`i
`
`:
`j
`|
`
`Import Content
`Encryption
`Package
`
`Usage
`Rights
`
`
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 170f20
`
`US 2008/0140433 Al
`
`
`
`Media Server
`
`3. Does Content
`
`Client Player
`
`1. Select Raw Content
`and Request play or
`Transfer
`
`6. Display Copyright,
`Usage Rights and
`Related Action
`
`
`4b. Do Usage
`Rights Exist?
`
` 7. Accept
`Usage Rights?
`
`4a. Detect CCI bits
`
`8a. Cancel Request
`
`5b. Send Usage
`Rights to Player(or to
`a Player on a different
`Server)
`
`8b. Stream or Transfer
`Raw Content to Player
`
`ee
`ID Exist?
`2, Detect Content ID
`
`
`
` 13a. Stream or
`
`11. Do GCI bits Exist?
`
`10. Receive and/or
`
`
`Play Content (and
`9. Enter DRM
`Display Copyright if
`Appropriate)
`
`12a, Does CCI
`12b. Did Content
`ID Exist?
`State Allow Action?
`
`
`13b. Neither Stream
`nor Transfer Raw
`Content
`
`Transfer Raw Content
`to Player or to Another
`Server
`
`iIIIII\iIIIiIIIIIIiIIIIIIIIIII|IIIIIII
`
`I
`I
`!
`
`IIII||IIIIIII\IIIIIIIIII|IIIIII!IIIIIII
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 18 of 20
`
`US 2008/0140433 Al
`
`Package
`
`Export Content
`
`Encryption
`
`Usage
`Rights
`
`;
`
`i
`i
`|
`:
`
`Reference Model
`
`1. Select raw
`content
`
`7
`
`|
`
`|
`
`\
`
`Import Content
`
`Encryption
`
`Usage
`Rights
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 19 of 20
`
`US 2008/0140433 Al
`
`Media Server
`
`(DRM-B)
`
`Fig. 22a
`
`Media Server
`
`(DRM-B) DRM-A Registry
`
`Media Server
`
`(DRM-B)
`
`DRM-B Registry
`
`

`

`Patent Application Publication
`
`Jun. 12,2008 Sheet 200f20
`
`US 2008/0140433 Al
`
`Media Server
`
`(DRM-B)
`
`DRM-B Registry
`
`
`
`Watermarked
`Production
`Master
`
`
`
`
`
`
`(Content ID1)
`UsageRights
` Content
`
`
`
`Watermarked
`Public DRM
`
`Watermark
`Watermark
`Production
`System
`Detector
`Embedder
`Master
`(ID1 + ID2)
`(including GUI)
`
`
`
`;
`
`F IQ * 23
`
`DRM-Protected
`
`Version
`
`

`

`US 2008/0140433 Al
`
`Jun. 12, 2008
`
`RIGHTS MANAGEMENT SYSTEMS AND
`METHODS USING CONTENT IDENTIFIERS
`
`RELATED APPLICATION DATA
`
`[0001] This application is a continuation of U.S. patent
`application Ser. No. 11/208,441, filed Aug. 19, 2005 (pub-
`lished as US 2006-0062426 A1), which is a continuationin
`part of U.S. patent application Ser. No. 10/126,921, filed Apr.
`18, 2002 (published as US 2002-0186844 Al). The Ser. No.
`10/126,921 application also claims the benefit of U.S. Patent
`Application Nos. 60/285,514, filed Apr. 20, 2001 and 60/315,
`569,filed Aug. 28, 2001. Each of the above-mentioned patent
`documents is hereby incorporated by reference.
`[0002] This applicationis also related to the present assizn-
`ee’s U.S. Pat. No. 6,505,160, published U.S. Patent Applica-
`tion Nos. US 2002-0052885 Al and US 2003-0056103 Al,
`and provisional patent application No. 60/256,628. Each of
`the above-mentioned patent documents is hereby incorpo-
`rated by reference.
`
`TECHNICALFIELD
`
`[0003] The present invention relates to integrating content
`identifiers with digital rights management systems. The
`present inventionalsorelates to multimedia signal process-
`ing, such as steganographically encoding auxiliary informa-
`tion into media signals, and decoding the auxiliary informa-
`tion from the media signals.
`
`BACKGROUND AND SUMMARYOF THE
`INVENTION
`
`[0004] Managementofdigital assets becomes an increas-
`ingly difficult challenge as digital content proliferates. The
`term “content” is broadly defined herein and may include
`audio, video, images, electronic data, biometric information,
`graphics and designs, electronic documents, copyrighted
`materials, software, multimedia content,etc., etc. Sometimes
`weinterchangeably use the term “media”for “content” in this
`document. Enhancements in computer networking and data-
`base technology allow companies to manage large content
`collections and to make the content available tothird parties.
`While network communication provides a powerful tool to
`enable a database manager to share content with others, it
`makes it more difficult to control and track how the contentis
`being used.
`[0005]
`For example, some companies maintain extensive
`content databases to promote their products. Customers or
`service providers such as advertising and marketing firms can
`access this content remotely via an internet, extranet, web
`site, intranet, LAN, WAN, wireless network orfile transfer
`transactions. Although computer networking telecommuni-
`cation technology facilitates access, it makes it difficult to
`ensure that customers and services providers are getting the
`latest content, and that they are getting accurate and helpful
`informationrelating to the content.
`[0006] There is a need to enable digital rights management
`systems to reliably link content with additional, related
`data—includingrelated content. The terms “link” and “link-
`ing” are defined broadly herein to include associating, point-
`ing to, facilitating the access of, linking, connecting or con-
`necting to, revealing a storage address of, and/or facilitating
`database interrogation, etc. There is also a need for a digital
`rights management system to reliably link content with
`related usagebilling information. One way to associate con-
`
`tent with information about the contentis to place the infor-
`mation in a file header or footer (we interchangeably use the
`terms “header” and “footer” in this application). This
`approachis notterribly attractive because the added informa-
`tion often does not survivefile format changes, conversion to
`the analog domain, andis susceptible to being stripped away,
`etc. We believe that an improved approach to associate con-
`tent with related data is to steganographically hide identifying
`information within the content. One example of steganogra-
`phy is digital watermarking.
`[0007] Digital watermarking is the science of encoding
`physical and electronic objects with plural-bit digital data, in
`such a manner that the data is essentially hidden from human
`perception, yet can be recovered by computer analysis. Most
`commonly, digital watermarking is applied to media such as
`images, audio signals, and video signals. However, it may
`also be applied to other types ofdata, including documents
`(e.g., through line, word or character shifting), software,
`multi-dimensional graphics models, and surface textures of
`objects. In physical objects, the data may be encodedin the
`form ofsurface texturing, or printing. Such marking can be
`detected fromoptical scan data, e.g., from a scanner, optical
`reader, input device, digital camera, or web cam. In electronic
`media (e.g., digital audio or imagery—including video), the
`data may be encodedas slight variations in sample values. Or
`if the media is represented in a so-called orthogonal domain
`(also termed “non-perceptual,” e.g., MPEG, DCT, wavelet,
`etc.), the data may be encodedas slight variations in quanti-
`zation values or levels. The assignee’s U.S. Pat. Nos. 5,862,
`260, 6,122,403 and 6,614,914 are illustrative ofcertain digital
`watermarking technologies and are each hereby incorporated
`by reference. A great many other approaches are familiar to
`those skilled in the art. The artisan is presumed to be familiar
`with the full range of literature about steganography, data
`hiding and digital watermarking.
`[0008] Digital watermarking systems typically have two
`primary components: an encoder that embeds the watermark
`ina host media signal, anda decoderthatdetects and reads the
`embedded watermark froma signal suspected of containing a
`watermark (e.g., a suspect signal). The encoder embeds a
`watermarkby altering the host media signal. For example, the
`encoder (or embedder) component embeds a watermark by
`altering data samples of the media content in the spatial,
`temporal or someother transform domain (e.g., Fourier, Dis-
`crete Cosine, Wavelet Transform domains). The decoder
`component analyzes a suspect signal to detect whether a
`watermark is present. In applications where the watermark
`encodes information, the decoder extracts this information
`from the detected watermark.
`
`[0009] The analysis of the detected data can be accom-
`plished in various known ways. Presently, most stegano-
`graphic decoding relies on general-purpose microprocessors
`that are programmed by suitable software instructions to per-
`form the necessary analysis. Other arrangements, such as
`using dedicated hardware, reprogrammable gate arrays, or
`other techniques, can of course be used.
`[0010] According to one aspect ofour invention, a digital
`watermarking system includes (or communicates with) a sec-
`ondary component—a database. Such a database preferably
`includes data related to content. The related data may include,
`e.g., content owneror copyright information, metadata, usage
`rights, enhanced or interactive content, and billing informa-
`tion, etc. (The terms “usage rights” (or interchangeably:
`“usage rules”) are broadly intended in this application. Usage
`
`

`

`US 2008/0140433 Al
`
`Jun. 12, 2008
`
`enables the content owners to be properly paid, and users to
`share content, instead of merely prohibiting use of the con-
`tent.
`
`rights identify permissible (or restricted) actionsor uses asso-
`ciated with content. A few of the many examples include play
`control, encryption requirements,
`rendering restrictions,
`required permissions, etc.) The above related data is prefer-
`ably organized or linked according to respective content iden-
`tifiers. For example, if the content includes a song and the
`related data includes usagerules, then the usage rules can be
`associated with the song via a contentidentifier that is unique
`to the song or to a class ofrelated songs. The database can be
`stored locally, remotely, or both. The database can also be
`distributed, with different databases stored in different net-
`worksor locations, such as a complete central and mirrored
`database and local databases including only subsets of the
`related data on a local computer. Of course our usage of the
`term database throughout this document is broad enoughto
`include software-based databases, data structures, data
`records, etc., etc.
`
`[0013] Oneaspect ofthe present invention provides content
`owners with copy protection security and royalty tracking,
`and end-users with an easy-to-use systemthat improves cur-
`rent content distribution methods, such as CD, DVD and
`VHS. A combination of watermarking and DRM techniques
`can be employed. where a watermark allows content to leave
`and be found outside an associated DRM package without
`harming the security of the system, The watermarkidentifi-
`cation canlink the contentto the usagerules, and, optionally,
`the usage rules can dictate whether the content should be
`re-packagedinto the DRM packageif found outsideofit. This
`means that content found outside the DRM package can be
`purchased and used, as well as re-secured, as opposed to that
`content being considered illegal and perhaps destroyed. This
`inventive feature increases the revenue generated from the
`[0011] User-friendly digital rights management systems
`content.A DRM packageis broadly defined and may include
`are preferred in our evolving digital and connected world.
`an encryption-based format, ora container in which contentis
`securely maintained, etc, Artisans know many DRM packag-
`Many digital rights management systems fail because they
`ing techniques, which may be suitably interchanged with the
`focus solely on the content owner’s security desires and not
`packaging aspect ofthe present invention. DRM systemshelp
`on consumer usage. As such, these rights management sys-
`publishers or content owners prevent unauthorized copying,
`temsare not acceptable to consumers. A historical example is
`replication, usage or distribution oftheir software products,
`taken from the software industry in the 1980’s, when that
`either via CD-ROM, via the Internet, transfer, etc. Other
`industry abandoned copy protection. We have solved some of
`DRM systems incorporate encryption, digital signature and
`the failing associated withtraditional digital rights manage-
`license manager technologies, and enable authentication
`ment systems. Ourinventive user-friendly digital rights man-
`fromeither a disc, online database, or from a PC hard drive.
`agement system provides transparent usage models to con-
`These technologies can be applied to secure CD-ROM or
`sumers while protecting the content. In one implementation,
`computer executable files, and to maintain desired control
`auser-friendly rights management system enables consumers
`over the distribution of content during its life cycle.A DRM
`to easily purchase content that they want to play or use, as
`packagethat allows licensing and reporting provides an ideal
`opposed to stopping consumers from using the content. One
`rights management systemfor audio, video and images.
`benefit of our inventive systemis that it is now easier for a
`[0014]
`Stull another aspect of the present
`invention is
`mass market to purchase content, rather than use illegiti-
`method of associating content with usage rights.The content
`mately obtained content.
`includes a digital watermark embedded therein. The digital
`[0012]
`In one embodiment of the present invention, a digi-
`watermark (DWM) includes a DWM content identifier. The
`tal watermark embedded within a content item is used to
`method includes: associating a digital rights management
`convey a content identifier(s). In a second embodiment, file
`headers associated with a content item include a content
`(DRM) content
`identifier with the watermarked content:
`populatingafirst rights registry with usage rights associated
`identifier(s). In still another embodiment, both digital water-
`with the content, wherein the usage rights are indexed in the
`marks and file headers are used to carry content identifiers.
`first rights registry with the DRM content identifier; and
`Content identifiers can be linked to related data, such as
`populating a secondrights registry with at least some ofthe
`“usage rights” (or “usage rules”) common in some digital
`usage rights, wherein the at least some ofthe usage rights are
`rights management (DRM) systems. (Theartisan is presumed.
`indexed in the second rights registry with the DWM content
`familiar with the many DRM systems, a few of which are
`identifier.
`described in U.S. Pat. Nos, 5,765,152, 5,410,598, 5,943,422,
`6,363,488 and 6,330,670, which are each hereby incorpo-
`rated by reference. Of course there are many other DRM
`systems and DRM-packaging that can be enhanced by the
`present invention.). These rules typically define the scope of
`permissible content use, e.g., such as regulating printing,
`viewing, copying, altering, distributing, selling, etc. Digital
`watermarks—including a content identifier—canbe used for
`content tracking and data management. In another embodi-
`ment, digital watermarks are used in connection with DRM
`content containers. Another aspect of the invention is a
`method ofperforming digital asset management of media
`content. In even another embodiment the copy protection
`state (also known as copy control information including copy
`freely, copy no more, copy never, and/or copy once) can be
`overridden through linkingthe identifier to usagerules, if the
`usage rules allow copy protection informationto be overrid-
`den, e.g., to enable the sale or distribution of the content. This
`
`[0015] Yet anotheraspectofthe present invention provides
`a method of associating content with usage rights. The con-
`tent includes a digital watermark (DWM) having a DWM
`content identifier. The method includes: associating a digital
`rights management (DRM) content identifier with the water-
`marked content; populating a first rights registry with usage
`rights associated with the content, wherein the usage rights
`are indexed in thefirst rights registry according to theDRM
`content identifier; and populating a second rights registry
`with the DRM content identifier, wherein the DRM content
`identifier is indexed according to the DWM contentidentifier.
`[0016]
`Still another aspectofthe presentinvention provides
`a method comprising: receiving raw content exported from a
`first digital rights management (DRM) system; detecting a
`content identifier steganographically embedded in the raw
`content: using the content identifier and information associ-
`ated with a second, different DRM system to obtain usage
`
`

`

`US 2008/0140433 Al
`
`Jun. 12, 2008
`
`rights that are compatible with the second, different DRM
`system; receiving the usage rights; and providing the raw
`content and the usage rights to the second, different DRM
`system.
`Still other aspects ofthe present invention provide a
`[0017]
`method to control a media server. The method includes, upon
`receiving a request to access raw content, searching the raw
`content fora contentidentifier steganographically embedded
`therein. Ifa contentidentifier is found: the method accesses a
`
`rights registry for usage rights associated with the content
`identifier; receives the usage rights from the rights registry:
`presents the usagerights for user acceptance; and upon accep-
`tance ofthe usage rights, provides the usage rights and raw
`contentto a resident digital rights management (DRM) sys-
`tem to control access ofthe content.
`[0018]
`Further
`features, aspects and advantages will
`become even more apparent with reference to the following
`detailed description and drawings.
`
`FIG. 19 illustrates a hierarchical process to handle
`[0037]
`content including both copy control information (CCI) and
`embedded DWM Content Identifiers (ID).
`[0038]
`FIG. 20 illustrates a process to repackage raw con-
`tent.
`
`FIG. 21 illustrates a process to transport content
`[0039]
`from a first DRM system to second, different DRM system.
`[0040]
`FIGS. 22a-22d illustrate communication routes to
`receive compatible Usage Rights.
`[0041]
`FIG. 23 illustrates a transmarking example, where a
`watermark from a production master is decoded and another
`watermark is added to content prior to DRM-packaging.
`
`DETAILED DESCRIPTION
`
`Rights Management System
`[0042] With reference to FIG, 1, a rights managementsys-
`tem preferably includes four steps. In step 51, content,
`whether within an encryption package or not, is identified
`before rendering. (“Rendering”here hasits familiar meaning
`ofpresenting for visual and/or audible inspection, e.g., ona
`FIG. 1 illustrates a flow diagram of a content man-
`[0019]
`TV, audio player, etc. Ouruse ofthe term “rendering”is broad
`agement process according to one embodimentof the present
`invention.
`enough to include transferring, copying and distributing.).
`Contentis preferably identified by steganographically encod-
`[0020]
`FIG. 2 illustrates a system for enhancing digital
`ing data within the content, such as in the form of a digital
`content management by identifying content, and linking the
`watermark. The digital watermark preferably includes a
`content with usage rules or permissions.
`unique content identifier. Content can be alternatively iden-
`[0021]
`FIG. 3 illustrates an inventive content distribution
`chain.
`tified via frame and/or segment headers.
`FIG. 4 illustrates a content identifier format.
`[0022]
`[0043] Usage rights are determined in step S2 via linking
`
`[0023] FIG.5illustrates a database structure for the distri-
`the content identifier to external data (e.g., data defining the
`bution chainillustrated in FIG. 3.
`usage rules). In general, usage rules define the scope of per-
`mitted use for respective content. Examples of usage rules
`include the scope of permissible copying, rendering, trans-
`ferring, altering, playing, viewing, printing, distributing,
`using, etc. Content identifiers can be used to organize a data-
`base that is maintained locally or remotely (e.g., a central
`usage system). Onceextracted fromcontent, an identifier can
`be thenusedto interrogate the database toretrieve the usage
`rules. Content usage is regulated based onits corresponding
`usage rules.
`[0044] Content usage can be tracked via anidentifier in step
`53. This usage tracking can be used, e.g., for proper billing to
`the consumer and payment to content owners and providers.
`Tracking can be incremental or per content item. In one
`embodiment, each video frame or every nth frame (or audio
`segment) is uniquely or redundantly identified. Tracking
`identifiers per frame (or audio segment)allows for a “pay-as-
`you-go” system, in that a consumercan be billed for only the
`amount of content they view, access or listen to. In another
`embodiment, billing is based on a one-time access fee.
`[0045] Asa fourth and optional step (step $4), if contentis
`found outside of its respective DRM, andit should be in the
`DRM packageas dictated by related usage rules, the content
`identifier can help facilitate repackaging of the content in a
`DRMcontainer. Initially, the identifier will help identify the
`content. The identifier can also identify or point to a specific
`package or packaging protocol, or the identifier can link to
`repackaging requirements. An identifier can also be linked to
`usage rules, which can regulate content usage, even for con-
`tent outside of a package. Examples ofcontent being located
`outside of a container include transferring the content to a
`different medium, or converting froma digital format to an
`analog format. Since the contentidentifier is content specific,
`e€.g.,
`it is associated with the content and not the container,it
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 6 illustrates anintelligent content distribution
`[0024]
`system, including linking databases via a central router to
`enhanceefficiency and privacy of metadata.
`[0025]
`FIG. 7illustrates a content distribution chain includ-
`ing a reporting system anda billing system.
`[0026]
`FIG. 8 illustrates the structure of FIG. 5, including
`billing information.
`[0027]
`FIG. 9 demonstrates a distributed database exem-
`plar system.
`[0028]
`FIG. 10 illustrates a content creation example.
`[0029]
`FIG. 11 illustrates digital watermarking a Content
`Identifier (ID) in a production master.
`[0030]
`FIG. 12 illustrates DRM packaging and DRM reg-
`istry population.
`[0031]
`FIG. 13 illustrates a digital watermark (DWM)
`Rights Registry.
`[0032]
`FIG. 14 illustrates a registry creator.
`[0033]
`FIG. 15 illustrates a public DRM systemincluding a
`digital watermark detector.
`[0034]
`FIG.
`16 illustrates another digital watermark
`(DWM)Rights Registry.
`[0035]
`FIG. 17aillustrates a process to detect and respect a
`DWMContent ID in a Media Server; FIG. 176 illustrates a
`process to detect and respect aDWM Content ID ina Media
`Server for Media Server to Media Server content transfers:
`FIG, 17illustrates a process to detect a DWM Content ID
`andlink to an online contentstoreor distributor from a Media
`Server; FIG.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket