throbber
as) United States
`a2) Patent Application Publication 0) Pub. No.: US 2004/0255139 Al
`(43) Pub. Date:
`Dec. 16, 2004
`Giobbi
`
`US 20040255139A1
`
`(54) DIGITAL CONTENT SECURITY SYSTEM
`
`Publication Classification
`
`(76)
`
`Inventor:
`
`John J. Giobbi, Bend, OR (US)
`
`Correspondence Address:
`Michael J. Blankstein
`2014 Harrison Street
`Evanston, IL 60201 (US)
`
`(21) Appl. No.:
`
`10/847,135
`
`(22)
`
`Filed:
`
`May17, 2004
`
`Related U.S. Application Data
`
`(63) Continuation-in-part of application No. 10/715,035,
`filed on Nov. 17, 2003, which is a continuation-in-part
`of application No. 10/153,979, filed on May 23, 2002,
`which is a continuation-in-part of application No.
`09/750,487, filed on Dec. 27, 2000, and which is a
`continuation-in-part of application No. 10/016,857,
`filed on Dec. 14, 2001.
`
`Ente C17 ceccecccecsecsecsensee GO6F 12/14; HO4L 9/00
`(51)
`(52) US. Ch.
`cecesccsessessesssse 713/193; 380/231; 705/51
`
`(57)
`
`ABSTRACT
`
`A Personal Digital Key Digital Content Security System
`(PDK-DCSS) is used to protect computers from unautho-
`rized use and protect the digital content stored on computers
`from being wrongfully accessed, copied, and/or distributed.
`The basic components of the PDK-DCSSare (1) a standard
`hard drive device, with the addition of a PDK Receiver/
`Decoder Circuit (PDK-RDC) optionally integrated into the
`hard drive’s controller, and (2) a PDK-Key associated with
`the PDK-RDC. The PDK-Key and RDC technology is
`utilized to provide two categories of protection: (1) hard
`drive access control for providing Drive-Level and Sector-
`Level protection and (2) operating system-level independent
`file protection for providing File-Level and Network-Level
`protection.
`
`WITH KEY CODE
`FROM KEY PROVIDER
`
`KEY PROVIDER
`ESTABLISHES NEW
`USER ACCOUNT
`
`
` USER REQUESTS KEY
`
`
`
`
`
`
`
`
`
`KEY PROVIDER
`SENDS KEY
`TO USER
`
`
`
`
`PLAYING DEVICE
`
`
`USER REQUESTS TO
`DECRYPTS AND PLAYS
`
`
`PURCHASE DIGITAL
`DIGITAL CONTENT IF
`
`
`
`CONTENT FROM
`KEY CODE MATCHES
`
`
`
`CONTENT PROVIDER
`UNLOCK CODE
`
`
`
`
`
`
`CONTENT PROVIDER
`
`
`PLAYING DEVICE
`
`
`REQUESTS KEY
`
`READS KEY CODE
`
`AND UNLOCK CODE
`PROVIDER TO
`VALIDATE KEY
`
`
`
`
`
`
`KEY PROVIDER
`USER ENTERS
`VERIFIES KEY
`DIGITAL CONTENT
`
`
`IF VALID
`INTO PLAYING DEVICE
`
`
`
`
`
`
`CONTENT PROVIDER
`CONTENT PROVIDER
`
`
`PULLS AND ENCRYPTS
`DELIVERS ENCRYPTED
`
`
`DIGITAL CONTENT
`DIGITAL CONTENT
`
`
`
`WITH UNLOCK CODE
`TO USER
`
`
`
`
`Page 1 of 25
`
`GOOGLE EXHIBIT 1006
`
`GOOGLE EXHIBIT 1006
`
`Page 1 of 25
`
`

`

`10
`
`2
`
`7
`
`16
`
`18
`
`20
`
`
`
`
`
`
`
`USER REQUESTS TO
`PURCHASE DIGITAL
`
`CONTENT FROM
`
`
`CONTENT PROVIDER
`
`
`
`CONTENT PROVIDER
`REQUESTS KEY
`
`
`PROVIDER TO
`VALIDATE KEY
`
`KEY PROVIDER
`VERIFIES KEY
`IF VALID
`
`
`
`PLAYING DEVICE
`
`DECRYPTS AND PLAYS
`
`DIGITAL CONTENT IF
`
`
`KEY CODE MATCHES
`
`
`
`UNLOCK CODE
`
`PLAYING DEVICE
`READS KEY CODE
`AND UNLOCK CODE
`
`USER ENTERS
`DIGITAL CONTENT
`
`30
`
`—28
`
`26
`
`24
`
`US 2004/0255139 Al
`
`FIG. 1
`
`Patent Application Publication Dec. 16,2004 Sheet 1 of 13
`
`TO USER
`
`USER REQUESTS KEY
`WITH KEY CODE
`FROM KEY PROVIDER
`
`KEY PROVIDER
`ESTABLISHES NEW
`USER ACCOUNT
`
`KEY PROVIDER
`SENDS KEY
`
`
`
`INTO PLAYING DEVICE
`
`
`
`
`CONTENT PROVIDER
`PULLS AND ENCRYPTS
`DIGITAL CONTENT
`
`
`WITH UNLOCK CODE
`
`
`
`--22
`
`
`
`CONTENT PROVIDER
`DELIVERS ENCRYPTED
`
`DIGITAL CONTENT
`
`
`TO USER
`
`
`
`Page 2 of 25
`
`Page 2 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 2 of 13
`
`US 2004/0255139 Al
`
`USER
`ACCOUNTS
`102
`100
`
`
`
`
`STEP 10
`
`
`_—__ PROVIDER
`
`
`
`KEY
`
`
`STEP 12
`
`
`
`
`STEP 14
`
`FIG. 2
`
`104
`
`100.
`
`106
`
`102
`
`STEP 16
`
`
`
`
`
`CONTENT
`
`
`
`CODE} CODE| CODE
`
`
`
`
`
`STEP 30
`
`12
`
`DVD PLAYER
`
`CELL PHONE
`
`STEP 28
`
`tt
`
`Ker]
`N14
`
`Page 3 of 25
`
`Page 3 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 3 of 13
`
`US 2004/0255139 Al
`
`G‘Old
`
`GANYOMLAN
`
`LNSLNOD
`
`ANOTV-GNVLS
`
`IN3LNO9
`
`LNVITIdNOD-ASay
`
`IN3SLNOO
`
`Lsvoqavoug
`
`INALNOD
`
`“dYOLS
`
`LHONOG
`
`AINSLNOO
`
`dgaqgvoINMOG
`
`IN3SLNOO
`
`Page 4 of 25
`
`Page 4 of 25
`
`
`
`
`
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 4 of 13
`
`US 2004/0255139 Al
`
`
`
`
`
`
`DATABASE
`DATABASE
`ACCOUNT
`CONTENT
`
`INVOICES
`
`FIG.6
`
`
`
`
`154
`
`
`
` [ooss]
`140
`
`Page 5 of 25
`
`Page 5 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 5 of 13
`
`US 2004/0255139 Al
`
`Lu
`
`lu
`
`g=
`
`a
`
`Sr
`Pas
`
`Sie
`8-\/<o
`
`of
`a/
`
`Lu.
`
`INVOICES
`
`172
`
`(80)F
`
`174
`
`170
`
`Page 6 of 25
`
`Page 6 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 6 of 13
`
`US 2004/0255139 Al
`
`192
`
`
` 202
`DATABASE
`RSCDATABASE
`ACCOUNT
`
`
`FIG.8
`
`200 INVOICES
`
`Page 7 of 25
`
`Page 7 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 7 of 13
`
`US 2004/0255139 Al
`
`iss}
`ao
`
`o
`LL.
`
`2
`Oo
`
`o
`LL.
`
`
` [aTTP[1ft)
`220,
`
`222
`
`Page 8 of 25
`
`Page 8 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 8 of 13
`
`US 2004/0255139 Al
`
`25 °“=
`Oo
`LL.
`
`a
`
`NN©
`
`TS
`S
`oe
`
`a\\
`E
`
`-
`
`wv-
`o
`
`g
`
`wt
`
`N©
`
`Q
`a
`o
`
`o
`38
`
`¢S
`
`R ean
`| Cl
`
`1
`
`=z
`o
`
`315
`
`~~
`
`wv
`-
`
`“+4
`
`wv
`e-

`
`Ss
`
`(
`
`N=“
`
`7
`
`326
`
`0

`a*o*
`
`|
`.) eee TM
`
`ROTTEN|
`WT LPR)
`
`318
`
`We
`Co
`
`:
`
`Page 9 of 25
`
`Page 9 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 9 of 13
`
`US 2004/0255139 Al
`
`cee
`
`eALGpleH
`
`LL‘Sls
`
`Page 10 of 25
`
`Page 10 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 10 of 13
`
`US 2004/0255139 Al
`
`
`336
`
`;|I
`
`
`
`|aii
`
` 334
`
`
`
` 332
`
` HardDrive
`
`
`
`FIG.12
`
`Page 11 of 25
`
`Page 11 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 11 of 13
`
`US 2004/0255139 Al
`
`‘,',t41''t
`
`
`
`PUBWWOSaJoUub)
`
`pue
`
`
`
`aBessawwmnyes
`
`QPURTSUlBANG,
`
`aqejdwog
`
`uannoaxa
`
`(v)0}BAPJag
`
`pex207-un)
`
`éleubis
`
`yoays-jeubis
`
`'‘i}'ttt''''!SOAON
`
`BIBSUSSGMAipEUT~~"~"Tommomeomeerrnmmnnrnnnenncnnnnnnmnn
`0}BAUJagBAUON\PuBWWwOD
`Pax9072pex907}zenenbul
`
`
`
`ONso,
`
`PHEA
`
`ddwoyad
`
`aaug
`
`EPax207
`
` eAup13S
`
`peys07
`
`SOA
`
`
`
`PUeWLOSYyo}a4
`
`aynoaxy
`
`puewwoo
`
`
`
`JOUJaSeq
`
`eb‘Sls
`
`Page 12 of 25
`
`Page 12 of 25
`
`
`
`
`
`
`
`
`
`
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 12 of 13
`
`US 2004/0255139 Al
`
`x
`
`froaOo
`
`x
`
`332 336
` 338
`HardDrive
`
`Controller
`
`FIG.14
`
`Page 13 of 25
`
`Page 13 of 25
`
`

`

`Patent Application Publication Dec. 16,2004 Sheet 13 of 13
`
`US 2004/0255139 Al
`
`Oo
`wv
`
`#000n
`
`Group
`
`o Group
`#0001
`
`
`
`ControllerSoftwareApplication(DC)
` PDKDocument
`
`
`Wireless
`
`FIG.15
`
`Page 14 of 25
`
`Page 14 of 25
`
`

`

`US 2004/0255139 Al
`
`Dec. 16, 2004
`
`DIGITAL CONTENT SECURITY SYSTEM
`
`REFERENCE TO RELATED APPLICATIONS
`
`[0001] This application is a continuation-in-part of U.S.
`patent application Ser. No. 10/715,035 filed Nov. 17, 2003,
`which is a continuation-in-part of U.S. patent application
`Ser. No. 10/153,979 filed May 23, 2002, which is a con-
`tinuation-in-part of U.S. patent application Ser. No. 09/750,
`487 filed Dec. 27, 2000 and Ser. No. 10/016,857 filed Dec.
`14, 2001, all of which are incorporated herein by reference
`in their entirety.
`
`FIELD OF THE INVENTION
`
`[0002] The present invention relates generally to digital
`content security systems and, more particularly, to a digital
`content security system and method that provides different
`levels of protection of a computer or other storage device
`and the digital content stored thereon.
`
`BACKGROUND OF THE INVENTION
`
`[0003] The market for downloading digital content online
`is rapidly climbing because distribution of such content is
`inexpensive, fast, and easy and the quality of the content
`itself is acceptable. The market, however, remains disorga-
`nized due to competing standards, competing companies,
`discontented artists and producers, and outright
`theft of
`digital content.
`
`[0004] Digital rights management (DRM) companies seek
`to solve the foregoing problems by delivering the digital
`content from the real producers to the right customers and
`ensuring that everyone who should be paid in fact is paid.
`DRMseeksto get everyone paid by managing the multiple
`steps for distributing digital content (music,video, software)
`online: watermarking, encryption, transaction management,
`and rights management. Some DRM companiesperform all
`these steps, while other DRM companies specialize in one or
`two steps of the process.
`
`[0005] First, watermarking stamps each piece of digital
`content with a digital mark so it can be tracked whereverit
`goes. Digital watermarks are just like paper watermarks,
`except they cannot be seen or heard. Special software is
`required to read a digital watermark.
`
`[0006] Second, encryption scrambles watermarkeddigital
`contentandstores it inside a digital safe for shipment around
`the Internet. The safe protects the content during shipping by
`allowing only those with the right software key to the safe
`to decrypt and use the content.
`
`[0007] Third, transaction managementhandles actual pay-
`ments for the digital content using credit card techniques
`found elsewhere in e-commerce. An orderis placed,a credit
`card number is taken, account status is checked, and the
`exchange is authorized.
`
`[0008] Finally, rights management manages the informa-
`tion about the digital content itself: what it is, who getsit,
`how it is delivered, how many times it may be used, how
`long the rights last, who gets paid, how muchthey get paid,
`and how. This information travels with the digital content in
`something called a digital permit. The permits rests on top
`of the digital content as it travels the Internet and allows
`legal users to enjoy the digital content for as long as the
`rights last.
`Page 15 of 25
`
`[0009] The primary objective of DRM companies is to
`deploy technologies that protect digital content as it
`is
`distributed online. Some of these proposed technologies and
`DRM in general are discussed in the article “Digital Rights
`Management May Solvethe Napster ‘Problem’,” Zechnology
`Investor, October 2000, pp. 24-27. Although such technolo-
`gies should reduce the amountofdigital theft, they generally
`favor the content provider at the expense of the consumeror
`favor the consumerat the expense of the content provider.
`That is,
`the rights of either the content provider or the
`consumer are compromised. For example, some technolo-
`gies severely limit the consumer’s ability to make extra
`copies of digital content even when the digital content is
`solely for personal use. Other technologies facilitate the
`making of copies of digital content which can be used by
`different consumers without
`the content provider being
`compensated by each consumer. The present inventor has
`discovered an improved DRM system and method that
`effectively balances and protects the rights of both the
`consumer and the content provider. In addition, the present
`inventor has discovered an associated digital content secu-
`rity system for protecting computers and other storage
`devices from unauthorized use and protecting the digital
`content stored on computers and other storage devices from
`being wrongfully accessed, copied, and/or distributed.
`
`SUMMARYOF THE INVENTION
`
`In accordance with the foregoing,there is disclosed
`[0010]
`a Personal Digital Key Digital Content Security System
`(PDK-DCSS) for protecting computers from unauthorized
`use and protecting the digital content stored on computers
`from being wrongfully accessed, copied, and/or distributed.
`The basic components of the PDK-DCSSare (1) a standard
`hard drive device, with the addition of a PDK Receiver/
`Decoder Circuit (PDK-RDC) optionally integrated into the
`hard drive’s controller, and (2) a PDK-Key associated with
`the PDK-RDC. The PDK-Key and RDC technology is
`utilized to provide two categories of protection: (1) hard
`drive access control for providing Drive-Level and Sector-
`Level protection and (2) operating system-level independent
`file protection for providing File-Level and Network-Level
`protection. A number of alternative embodiments are also
`disclosed.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0011] The foregoing and other advantages of the inven-
`tion will become apparent upon reading the following
`detailed description and upon reference to the drawings in
`which:
`
`[0012] FIG. 1 is a flow chart of a method of managing
`digital rights in accordance with the present invention;
`
`[0013] FIGS. 2, 3, and 4 are block diagramsof portions of
`a DRMsystem for implementing the method in FIG. 1;
`
`[0014] FIG. 5 is a conceptual model of core options for
`acquiring digital content that can be encoded to produce
`key-secured content and core options for playing back the
`key-secured content;
`
`FIG.6 is a block diagram for implementing a core
`[0015]
`acquisition option of downloaded content;
`
`FIG.7 is a block diagram for implementing a core
`[0016]
`acquisition option of store-bought content;
`
`Page 15 of 25
`
`

`

`US 2004/0255139 Al
`
`Dec. 16, 2004
`
`FIG.8 is a block diagram for implementing a core
`[0017]
`acquisition option of broadcast content;
`
`[0018] FIGS. 9a and 9b are block diagrams for imple-
`menting a core playback option of stand-alone devices;
`
`[0019] FIG. 10 is a block diagram for implementing a core
`playback option of networked devices;
`
`[0020] FIG. 11 is a block diagram of a standard computer
`hard drive incorporating an integrated PDK-RDC (receiver/
`decoder circuit) for the purpose of enabling multiple meth-
`ods of securing digital content;
`
`[0021] FIG. 12 is a block diagram for implementing
`Drive-Level protection and Sector-Level protection in con-
`nection with the computer hard drive;
`
`[0022] FIG. 13 is a flow chart of the logic executed by the
`PDK-RDC for implementing Drive-Level protection and
`Sector-Level protection;
`
`[0023] FIG. 14 is a block diagram for implementing
`File-Level protection in connection with the computer hard
`drive; and
`
`[0024] FIG. 15 is a block diagram for implementing
`Network-Level protection by expanding File-Level protec-
`tion to a network environment.
`
`[0025] While the invention is susceptible to various modi-
`fications and alternative forms, specific embodiments have
`been shown by way of example in the drawings and will be
`described in detail herein. However, it should be understood
`that
`the invention is not
`intended to be limited to the
`
`particular forms disclosed. Rather, the invention is to cover
`all modifications, equivalents, and alternatives falling within
`the spirit and scope of the invention as defined by the
`appended claims.
`
`DESCRIPTION OF SPECIFIC EMBODIMENTS
`
`[0026] Turning now to the drawings and referringinitially
`to FIG. 1, there is depicted a method of managing digital
`rights in accordance with the present invention. First, a new
`user requests a physical electronic key or data unit from a
`key provider (step 10). The key provider may offer a web
`site on the Internet, a toll free telephone number, and/or
`retail outlet where the key may be acquired. In addition, the
`key provider may allow a key to be requested in writing,
`preferably using a form designed by the key provider.In one
`model the user may acquire as many keys as desired, while
`in another model each useris only entitled to a single key.
`
`in response to the user’s request for a
`[0027] Second,
`physical key,
`the key provider establishes a new secure
`account for that new user in a secure user account database
`(step 12). The new account may include the following data
`fields: account number, password, software encryption key,
`user label, number of users (linked to account), address,
`telephone number, e-mail address, and custom fields. The
`custom fields may, for example, include demographic infor-
`mation such as the user’s age, gender, marital status, income
`level, interests, hobbies, etc. The physical key may include
`the following data fields: user label, account number, soft-
`ware decryption key, and a custom storage area. The user
`label and the account numberserveasa first activation code
`(or key code) for the acquired physical key. All data fields
`on the physical key, except for the user label, are preferably
`Page 16 of 25
`
`encrypted. To allow the user to view his or her accountin the
`future, the user is preferably assigned a login name and the
`above-noted password.
`
`the key provider ships the physical elec-
`[0028] Third,
`tronic key to the new user via a package courier such as the
`U.S. Postal Service, United Parcel Service, or Federal
`Express (step 14). In one pricing model the physical key is
`sent to the user at no charge, while in another pricing model
`the physical key must be purchased by the user. If the
`physical key must be purchased bythe user, either the user
`must provide credit/debit card information to the key pro-
`vider in step 10 to pay with a credit/debit card, or the key
`provider includes an invoice with the shipped key in step 14.
`
`[0029] FIG. 2 is a block diagram of a system for imple-
`menting steps 10, 12, and 14 of the method of managing
`digital rights. The system includes the new user 100, the key
`provider’s website 102, and the user account database 104.
`
`[0030] Referring back to FIG. 1, fourth, the user transmits
`his or her activation code in the physical key to a digital
`content provider, who may have a cooperative relationship
`with the key provider, and requests to purchase digital
`content (music, video, or software) from that content pro-
`vider (step 16). The content provider mayoffer a website on
`the Internet containing a listing of digital content available
`for purchase. To transmit the activation code to the content
`provider via the web site, the user may manually enter the
`activation code onto a secure page of the web site. Alterna-
`tively,
`the transmission of the activation code may be
`automatically implemented with wireless technology. Spe-
`cifically, the user’s computer may be outfitted with a detec-
`tor that detects the activation code in the user’s physical key
`and then relays the activation code to the content provider
`via the web site. The content provider maybe affiliated with
`the key provider or may be separate from the key provider
`but have an arrangement therewith.
`
`[0031] Fifth, the content provider requests the key pro-
`vider to verify the activation code transmitted by the user
`(step 18). The content provider may send this requestto the
`key provider’s web site. Sixth,
`the key provider in turn
`accesses the user’s account in the user account database and
`determines whether the activation codeis in fact valid (step
`20). The key provider may also determine whether the
`activation code is associated with the user that transmitted
`
`the activation code to the content provider. If the activation
`code is rejected as being invalid, the content provider is so
`informed and the content provider in turn will not honor any
`request by the user to purchase digital content. If, however,
`the activation code is accepted as being valid, the content
`provider is so informed and the purchase transaction pro-
`ceeds. As used herein, the term “key provider” generically
`refers to the entity or entities that manufacture, distribute,
`and validate the physical keys. These functions mayactually
`be performed by multiple entities at different locations or by
`a single entity at a single location.
`
`[0032] Seventh, after securing validation of the first acti-
`vation code in the physical key, the content provider pulls
`the requested digital content from a digital content database/
`library, marks the digital content with a second activation
`code (or unlock code) associated with the first activation
`code in the physical key, and encrypts the marked digital
`content (step 22). The second activation code in the digital
`content may simply be the sameasthe first activation code
`
`Page 16 of 25
`
`

`

`US 2004/0255139 Al
`
`Dec. 16, 2004
`
`least partially encrypted for
`in the physical key, but at
`security. In one embodiment, the “key-secured” contentfile
`includes the following data fields: user label, account num-
`ber, and digital content. The user label and the account
`number serve as the second activation code for the digital
`content. If the content is merely for sampling (described in
`connection with FIG. 6), the file may include such addi-
`tional data fields as a receiver/decoder circuit identification
`number, hour stamp, and life hours. All data fields on the
`content
`file, except
`for
`the user
`label, are preferably
`encrypted.
`
`[0033] Eighth, the content provider delivers the encrypted
`digital content to the user (step 24). The encrypted digital
`content may be delivered by downloading the encrypted
`digital content to the user’s computer while the user is online
`at the content provider’s web site, by attaching the digital
`content to an e-mail addressed to the user, or by shipping a
`disk containing the encrypted digital content to the user via
`a package courier. The user may payfor the digital content
`either by providing credit/debit card information to the
`content provider in step 16 or by paying off of an invoice
`included with delivered digital content. If the digital content
`is delivered online, the user is preferably required to provide
`the credit/debit card information and have such information
`approved as a prerequisite to delivery of the digital content.
`If the user possesses more than one physical electronic key
`and would like the acquired digital content to function with
`each ofthe user’s keys,all of the activation codesare applied
`to the digital content. The content provider charges the user
`based on the number of keys with which the user would like
`the digital content to function. For example, the user may be
`charged the same amountfor each activation code, or may
`be charged a larger amountfor one activation code and lesser
`amounts (e.g., surcharges) for additional activation codes.
`
`[0034] FIG. 3 is a block diagram of a system for imple-
`menting steps 16, 18, 20, 22, and 24 of the method of
`managing digital rights. The system includes the new user
`100, the content provider 106, the key provider’s website
`102,
`the digital content database 108, and the acquired
`digital content 110.
`
`the user enters the
`[0035] Returning to FIG. 1, ninth,
`encrypted digital content into a playing device of a type
`suitable for playing the digital content (step 26). The device
`may, for example, be an MP3 player, a personal computer,
`a DVD player, a CD player, a cellular phone, or other
`portable device. In one embodiment, the device contains a
`wireless transceiver adapted to receive a radio frequency
`signal transmitted by a corresponding wireless transceiver in
`the user’s physical electronic key. The wireless transceiver
`in the device is optionally tracked and “secured” for audit
`purposes by permanently including a unique identifier
`assigned by the device manufacturer in the transceiver.
`
`[0036] Tenth, with the user’s physical electronic key
`within a short range (e.g., few meters) of the playing device,
`the playing device reads (1) the first activation code carried
`in a secure radio frequency signal transmitted by the trans-
`ceiverin the physical key to the transceiver in the device and
`(2) the second activation code marked on the encrypted
`digital content (step 28). The device contains decryption
`software or hardware for decrypting the encrypted digital
`content to the extent necessary to read any encrypted portion
`of the second activation code.
`
`Page 17 of 25
`
`the playing device compares the first
`[0037] Eleventh,
`activation code and the second activation code and deter-
`mines whetherthefirst activation code is associated with the
`
`second activation code (step 30). Steps 29 and 30 may be
`performed, for example, when the user presses a “play”
`button on the playing device or whentheuserfirst enters the
`encrypted digital content into the playing device. If the first
`activation code is associated with the second activation
`
`code, the device decrypts and plays the digital content. If the
`first activation code is not associated with the second
`
`activation code, the device does not play the digital content.
`If the second activation code is simply the sameasthefirst
`activation code, then the foregoing comparison determines
`whether there is a match between thefirst activation code
`and the second activation code. In a preferred embodiment,
`the device continues to play the digital content only while
`the physical key is sufficiently close to the device to com-
`municatethe first activation code to the device and allow the
`
`device to compare the first activation code to the second
`activation code at least partially encrypted with the digital
`content even while the digital content is being played. If the
`physical key is moved out of range, the device is no longer
`enabled to decrypt and play the digital content.
`In an
`alternative embodiment, once the device is initially enabled
`to decrypt and play the digital content, the device remains
`enabled until either the “play” function is stopped, a play
`track/song ends, or the digital content is removed from the
`device, even if the physical key is moved out of range such
`that the key can no longer communicate the first activation
`code to the device.
`
`[0038] FIG. 4 is a block diagram of a system for imple-
`menting steps 26, 28, and 30 of the method of managing
`digital rights. The system includes the encrypted digital
`content 110, the key-enabled playing devices 112, and the
`user’s physical electronic key 114.
`
`[0039] As stated above, the user’s physical electronic key
`and the key-enabled playing device contain respective wire-
`less transceivers to communicate the activation code in the
`key to the device. In a preferred embodiment, the transceiv-
`ers are small, inexpensive Bluetooth radio chips that operate
`in the unlicensed ISM band at 2.4 GHz and avoid interfer-
`ence from other signals by hopping to a new frequencyafter
`transmitting or receiving a packet. The radio chips are
`plugged into electronic devices, which can then communi-
`cate over short distances and through obstacles by meansof
`radio waves. Bluetooth is a term used to describe the
`protocol of a short range (e.g., about 10 meters) frequency-
`hopping radio link between devices containing the radio
`chips. These devices are then termed “Bluetooth-enabled.”
`The secure radio link replaces a cable that would otherwise
`be used to connect the devices. Further details concerning
`Bluetooth wireless technology may be obtained from www-
`-bluetooth.com.
`
`[0040] Wireless technologies other than Bluetooth may be
`used to communicate the activation code from the user’s
`physical electronic key to the playing device. One example
`of an alternative wireless technology is known by a trade
`term “Wi-Fi,” which is short for wireless fidelity and is
`another name for IEEE 802.11b. Products certified as Wi-Fi
`by the Wireless Ethernet Compatibility Alliance (WECA)
`are interoperable with each other even if they are from
`different manufacturers. A user with a Wi-Fi product can use
`
`Page 17 of 25
`
`

`

`US 2004/0255139 Al
`
`Dec. 16, 2004
`
`any brand of access point with any other brand of client
`hardwarethat is built to the Wi-Fi standard.
`
`In other alternative embodiments, the communica-
`[0041]
`tion between the user’s physical electronic key and the
`playing device is not wireless. Rather, in one alternative
`embodiment, the user’s physical electronic key communi-
`cates the activation code to the playing device via a trans-
`mission line such as a serial cable that plugs into the key at
`one end and the playing device at the other end. In another
`alternative embodiment, the key is a smart card or magnetic
`card into which the activation code is encoded, and the key
`is configured to physically fit into a card reader slot on the
`playing device.
`[0042] The above-described DRM method and system for
`implementing the method are advantageous in that
`they
`afford the key holder with tremendousversatility in copying
`and using encrypted digital content for personal use. At the
`same time, the rights of the content provider are protected
`because only the key holder with a key-enabled device can
`use the encrypted digital content. The key holder can copy
`the encrypted digital content as many times as desired, but
`can only play the encrypted digital content on a key-enabled
`device that is enabled with the physical electronic key coded
`to decrypt the encrypted digital content. Thus, the digital
`content, even when copied, remains personal to the key
`holder. Individuals other than the key holder cannot use the
`encrypted digital content, even if they copy it, because both
`the original and copies of the encrypted digital content are
`still encrypted and the individuals do not hold the physical
`electronic key coded to decrypt the digital content.
`[0043] A core element of the present
`invention is the
`concept of a portable, physical electronic keythat is personal
`to a particular user. The physical key represents a DRM
`solution that fully addresses the needs of both consumers
`and publishers of digital content. The physical key is per-
`manently associated with a user’s digital content library. At
`the time of content acquisition, the physical key becomes
`permanently associated with the newly acquired content.
`The user is now “linked” to that acquired content. A user
`(e.g., individual or family) may own as many physical keys
`as desired, but every piece of encrypted digital content
`purchased is tied to one specific key. The user may duplicate
`or transfer the acquired content to any media or device for
`playback as many timesas desired, as long as the associated
`physical key is present. Thus, the present invention guaran-
`tees that the acquired content is played only by the user who
`has legitimately paid for it. The present invention gives
`consumers unprecedented freedoms and conveniencesto use
`legitimately purchased content while still fully protecting
`content providers’ rights.
`the present invention fully
`[0044] Referring to FIG. 5,
`supports the use of “key-secured” digital content 125 with
`all core content acquisition options and all core playback
`options. The key-secured digital content 125 is encoded with
`a second activation code associated with a first activation
`code stored on the user’s physical electronic key. The core
`acquisition options include downloaded content 120, store-
`bought content 122, and broadcast content 124. The core
`playback options include stand-alone devices 126 and net-
`worked devices 128. Each of these options are described in
`further detail below.
`
`[0045] Referring to FIG. 6 generally, as already noted in
`FIGS. 1 through 4, a primary application of the present
`Page 18 of 25
`
`invention is its use in the downloading of digital content
`from the Internet. A consumer shops a content distributor’s
`website and selects a piece of content they wish to purchase
`(music, movies, software, E-books, etc.). The consumer then
`provides the web site with standard on-line purchase infor-
`mation including the selection’s title and method of pay-
`ment, as well as their physical electronic key information.
`Transparent to the consumer, the distributor’s website links
`to the key provider’s website and transmits the physical key
`information for validation. The key provider’s web site then
`provides the distributor’s web site with the information
`required to prepare the acquired content for secure shipment
`to the consumer(or notification that the physical key was
`invalid). The key provider’s web site records the transaction
`for later billing. Finally, the distributor’s web site retrieves
`a copy of the digital content from its library, permanently
`links it to the consumer’s physical key (by using the key’s
`information to encryptit), and transmits the secured content
`to the consumer. The consumeris now free to duplicate the
`content as often as desired, and to play the content on any
`key-enabled playback device.
`
`[0046] Referring to the specifics of FIG.6, the process of
`implementing the core acquisition option of downloaded
`digital content 120 (see FIG.5) proceeds asfollows. At step
`130, a receiver/decoder circuit 140 retrieves an account
`number from a consumer’s physical key (transponder) 142
`over a secure RFlink. At step 131, the consumerenters such
`data as a password, purchase selection, and method of
`payment via the consumer’s personal computer 144. The
`data is transmitted to a content distributor’s web site 146
`
`from the consumer’s personal computer 144. At step 132,
`the content distributor’s web site 146 transmits the account
`
`number and password to a key provider’s web site 148. At
`step 133, the key provider’s web site 148 authenticates all
`data against its database 150 and,if authentic, returns such
`information as the account number, user label, number of
`users, and software encryption key to the distributor’s web
`site 146. If the data is not valid, the key provider’s website
`148 sends a message to the distributor’s web site 146
`indicating the same. A counter, used for the key provider’s
`billing purposes, is incremented. At step 134, the distribu-
`tor’s web site 146 pulls the purchased contentfile from its
`database 152, encrypts it with the software encryption keyit
`received in step 133, and builds a final key-secured content
`file that
`is then transmitted to the consumer’s personal
`computer 144. Charges are assessed based on

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket