`
`[19]
`
`5,943,422
`Aug. 24, 1999
`Date of Patent:
`Van Wieet al.
`[45]
`
`[11]
`
`Patent Number:
`
`US005943422A
`
`[54]
`
`STEGANOGRAPHIC TECHNIQUES FOR
`SECURELY DELIVERING ELECTRONIC
`DIGITAL RIGHTS MANAGEMENT
`CONTROL INFORMATION OVER
`INSECURE COMMUNICATION CHANNELS
`
`Inventors: David M. Van Wie, Sunnyvale; Robert
`P. Weber, Menlo Park, both of Calif.
`
`Assignee:
`
`InterTrust Technologies Corp.,
`Sunnyvale, Calif.
`
`OTHER PUBLICATIONS
`
`Baum, Michael, Worldwide Electronic Commerce: Law,
`Policy and Controls Conference, program details, Nov. 11,
`1993.
`
`Bisbey,II et al., Encapsulation: An Approach to Operating
`System Security, Oct. 1973, pp. 666-675.
`Blom etal., Encryption Methods in Data Networks, Ericsson
`Technics, No. 2, 1978, Stockholm, Sweden.
`Bruner, Rick, E., PowerAgent, NetBot help advertisers reach
`Internet shoppers, Aug. 1997 (Document from Internet).
`Cable Television and America’s Telecommunications Infra-
`
`Appl. No.: 08/689,606
`
`Filed:
`
`Aug. 12, 1996
`
`structure, National Cable Television Association, Apr. 1993.
`Caruso, Technology, Digital Commerce 2 plans for water-
`marks, which can bind proof of authorship to electronic
`works, New York Times (Aug. 1995).
`ieecccccecsssseecsssseeesssseesesssusssesnneesss HOAN 7/167
`TInt, C1.o
`CD ROM,Introducing .
`.
`. The Workflow CD-ROM Sam-
`
`US. C1. oncecececeeceececceeseeeesesneaeseceeeeeenes 380/9; 380/5
`pler, Creative Networks, MCIMail: Creative Networks, Inc.,
`Field of Search 0... eee 380/9, 20, 4, 5,
`Palo Alto, California.
`380/28; 382/232
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,573,747
`3,609,697
`3,796,830
`3,798,359
`3,798,360
`3,798,605
`3,806,882
`
`4/1971
`9/1971
`3/1974
`3/1974
`3/1974
`3/1974
`4/1974
`
`.
`
`Adamset al.
`Blevins .
`Smith .
`Feistel .
`Feistel .
`Feistel .
`Clarke .
`
`(List continued on next page.)
`FOREIGN PATENT DOCUMENTS
`
`9 004 79
`0 84 441
`A0135422
`0180460
`0 370 146
`0 456 386 A2
`0 469 864 A2
`
`12/1984
`7/1983
`3/1985
`5/1986
`11/1988
`11/1991
`11/1991
`
`Belgium .
`European Pat. Off.
`Furopean Pat. Off.
`European Pat. Off.
`European Pat. Off.
`European Pat. Off.
`European Pat. Off.
`
`.
`.
`.
`.
`.
`.
`
`(List continued on next page.)
`
`Primary Examiner—David Cain
`Attorney, Agent, or Firm—Nixon & Vanderhyc P.C.
`
`[57]
`
`ABSTRACT
`
`Electronic steganographic techniques can be used to encode
`a rights management control signal onto an information
`signal carried over an insecure communications channel.
`Steganographic techniques ensure that the digital control
`informationis substantially invisibly and substantially indel-
`ibly carried by the information signal. These techniques can
`provide end-to-end rights management protection of an
`information signal irrespective of transformations between
`analog and digital. An electronic appliance can recover the
`control information and use it for electronic rights manage-
`ment to provide compatibility with a Virtual Distribution
`Environment. In one example, the system encodes low data
`rale pointers within high bandwidth time periods of the
`content signal to improve overall control information read/
`seek times.
`
`(List continued on next page.)
`
`348 Claims, 30 Drawing Sheets
`
`
`
`oN
`o6c)
`Oo )
`Ley
`EXAMPLE STEGANOGRAPHICALLY
`ENCODING ELECTRONIC CONTENTSIN AN IMAGE
`
`Roku Exhibit 1019
`Roku Exhibit 1019
`Roku v. Videolabs
`Roku v. Videolabs
`
`
`
`5,943,422
`
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`3,829,833
`3,906,448
`3,911,397
`3,924,065
`3,931,504
`3,946,220
`3,956,615
`3,958,081
`3,970,992
`4,048,619
`4,071,911
`
`4,265,371
`4,270,182
`4,278,837
`4,305,131
`4,306,289
`4,309,569
`4,319,079
`4,323,921
`4,328,544
`4,337,483
`4,361,877
`4,375,579
`4,433,207
`4,434,464
`4,442,486
`4,446,519
`4,454,594
`4,458,315
`4,462,076
`4,462,078
`4,465,901
`4,471,163
`4,484,217
`4,494,156
`4,513,174
`4,528,588
`4,528,643
`4,553,252
`4,558,176
`4,558,413
`4,562,306
`4,562,495
`4,577,289
`4,584,641
`4,588,991
`4,589,064
`4,593,353
`4,593,376
`4,595,950
`4,597,058
`4,634,807
`4,644,493
`4,646,234
`4,652,990
`4,658,093
`
`8/1974
`9/1975
`10/1975
`12/1975
`1/1976
`3/1976
`5/1976
`5/1976
`7/1976
`9/1977
`1/1978
`9/1978
`10/1978
`7/1979
`9/1979
`4/1980
`4/1980
`6/1980
`8/1980
`9/1980
`11/1980
`11/1980
`11/1980
`2/1981
`4/1981
`5/1981
`5/1981
`T/A981
`12/1981
`12/1981
`1/1982
`3/1982
`4/1982
`5/1982
`6/1982
`11/1982
`3/1983
`2/1984
`2/1984
`4/1984
`5/1984
`6/1984
`7/1984
`T/1984
`7/1984
`8/1984
`9/1984
`11/1984
`1/1985
`4/1985
`F/1985
`7/1985
`11/1985
`12/1985
`12/1985
`12/1985
`12/1985
`3/1986
`4/1986
`5/1986
`5/1986
`6/1986
`6/1986
`6/1986
`6/1986
`1/1987
`2/1987
`2/1987
`3/1987
`4/1987
`
`.
`
`.
`
`.
`Freeny, Jr.
`Henriques.
`Freeny, Jr.
`.
`Freeny, Jr.
`.
`Jacoby .
`.
`Brobecket al.
`Andersonet al.
`Ehrsam et al. .
`Boothroyd etal. .
`Forman, Jy.et al.
`Mazur.
`Freeny, Jr.
`Johnstone .
`Mori et al.
`Best .
`Tormanetal. .
`Kuharet al.
`.
`Freeny, Jr.
`.
`Freeny, Jr.
`.
`Hamanoetal. .
`Gerard .
`Freeny, Jr.
`Kennedy .
`Kirschneret al. .
`Bright et al.
`.
`Desaiet al. .
`Asija .
`Best .
`Best .
`Lumley .
`Merkle .
`Best .
`Guillou .
`Baldwin et al.
`Guillou .
`.
`Dyeret al.
`Davidaetal. .
`Best .
`Suzuki et al.
`Mayer.
`Thomas .
`Heffron et al. .
`Uchenick .
`Smith, III .
`Ross .
`Best .
`Donald et al. .
`Block et al.
`.
`Kadison et al.
`Herman.
`Lofberg .
`Freeny, Jr.
`Egendorf.
`Arnold et al.
`Schmidt et al.
`Chouetal. .
`Bondetal. .
`Comerford etal. .
`Guglielmino .
`Atalla .
`Chiba et al.
`Pickholtz .
`Volk .
`Lofberg .
`Izumietal. .
`.
`Chorleyet al.
`Chandraetal. .
`Tolmanet al. .
`Pailen et al.
`.
`Hellman.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`4,670,857
`4,677,434
`4,680,731
`4,683,553
`4,685,056
`4,688,169
`4,691,350
`4,696,034
`4,701,846
`4,712,238
`4,713,753
`4,740,890
`4,747,139
`4,757,533
`4,757,534
`4,768,087
`4,791,565
`4,796,181
`4,807,288
`4,817,140
`4,827,508
`4,858,121
`4,864,494
`4,868,877
`4,903,296
`4,924,378
`4,930,073
`4,949,187
`4,977,594
`4,999,806
`5,001,752
`5,005,122
`5,005,200
`5,010,571
`5,023,907
`5,047,928
`5,048,085
`5,050,213
`5,091,966
`5,103,392
`5,119,493
`5,128,525
`5,136,643
`5,136,646
`5,136,647
`5,136,716
`5,146,575
`5,148,481
`5,155,680
`5,168,147
`5,185,717
`5,201,046
`5,201,047
`5,208,748
`5,214,702
`5,216,603
`5,221,833
`5,222,134
`5,224,160
`5,235,642
`5,245,165
`5,247,575
`5,260,999
`5,263,158
`5,265,164
`5,276,735
`5,280,479
`5,285,494
`5,301,231
`5,311,591
`5,337,360
`5,341,429
`
`6/1987
`6/1987
`7/987
`7/1987
`8/1987
`8/1987
`9/1987
`9/1987
`10/1987
`12/1987
`12/1987
`4/1988
`5/1988
`7/1988
`7/1988
`8/1988
`12/1988
`1/1989
`2/1989
`3/1989
`5/1989
`8/1989
`9/1989
`9/1989
`2/1990
`5/1990
`5/1990
`8/1990
`12/1990
`3/1991
`3/1991
`4/1991
`4/1991
`4/1991
`6/1991
`9/1991
`9/1991
`9/1991
`2/1992
`4/1992
`6/1992
`T/1992
`8/1992
`8/1992
`8/1992
`8/1992
`9/1992
`9/1992
`10/1992
`12/1992
`2/1993
`4/1993
`4/1993
`5/1993
`5/1993
`6/1993
`6/1993
`6/1993
`6/1993
`8/1993
`9/1993
`9/1993
`11/1993
`11/1993
`11/1993
`1/1994
`1/1994
`2/1994
`4/1994
`5/1994
`8/1994
`8/1994
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`Rackman .
`Fascenda.
`Izumiet al.
`Mollier.
`Barnsdale etal. .
`Joshi .
`Kleijne et al.
`Wiedemer.
`Ikedaet al. .
`Gilhousenetal. .
`Boebert et al. .
`William .
`Taaffe .
`Allen et al. .
`Matyaset al.
`Taub etal. .
`Dunham etal. .
`Wiedemer.
`Ugonet al. .
`Chandraetal. .
`Shear.
`Barberetal. .
`Kobus.
`Fischer .
`.
`Chandra et al.
`Hersheyet al. .
`Cina, Jr.
`.
`Cohen .
`Shear.
`Cherowetal. .
`Fischer .
`Griffin et al.
`Fischer .
`Katznelson .
`Johnsonetal. .
`Wiedemer.
`Abrahametal. .
`Shear.
`Bloomberg etal. .
`Mori .
`.
`Janis et al.
`Steamset al.
`Fischer .
`Haberetal. .
`IJaberetal. .
`Harveyet al.
`Nolan, Jr.
`.
`Abrahametal. .
`Wiedemer.
`Bloomberg .
`Mori .
`Goldberg etal. .
`Makietal. .
`Flores et al. .
`Fischer .
`Flores et al. .
`Hecht.
`Waite etal. .
`Pauliniet al.
`Wobberet al.
`Zhang .
`Sprague etal. .
`Wyman .
`Janis .
`.
`Matyaset al.
`Boebert et al. .
`Mary.
`Sprecheretal. .
`Abrahametal. .
`Fischer .
`Fischer .
`Stringeret al. .
`
`.
`
`.
`
`
`
`5,943,422
`
`Page 3
`
`.
`
`.
`.
`
`.
`
`9/1994 Blandford .
`5,347,579
`9/1994 Micheneretal. .
`5,351,293
`5,355,474 10/1994 Thuraisngham etal. .
`5,373,561
`12/1994 Haberet al.
`.
`5,390,247
`2/1995 Fischer.
`5,390,330
`2A 995 Talati .
`$392,220
`2/1995 van den Hameretal. .
`5302300
`2/1995. Crozier .
`5,394,469
`2/1995 Nagel et al.
`5,410,598
`4/1995 Shear .
`§,412,717
`5/1995 Fischer.
`5,421,006
`5/1995 Jablon .
`5,422,953
`6/1995 Fischer.
`5,428,606
`6/1995 Moskowitz .
`5,438,508
`8/1995 Wyman .
`5,442,645
`8/1995 Ugon .
`5,444,779
`8/1995 Daniele .
`5,449,895
`9/1995 Ilechtet al.
`5,449,896
`9/1995 Hechtet al.
`5,450,493
`9/1995 Maher .
`5,453,601
`9/1995 Rosen.
`5,453,605
`9/1995 Hechtet al.
`5,455,407 10/1995 Rosen .
`5,455,861
`10/1995 Faucheret al. .
`5,455,953
`10/1995 Russell .
`5,457,746
`10/1995 Dolphin .
`5,463,565
`10/1995 Cooksonetal. .
`5,473,687 12/1995 Lipscombet al. .
`5,473,692 12/1995 Davis .
`5,479,509
`12/1995 Ugon .
`5,485,622
`1/1996 Yamaki .
`5,491,800
`2/1996 Goldsmithetal. .
`5,497,479
`3/1996 Hornbuckle .
`.
`5,497,491
`3/1996 Mitchell et al.
`5,499,298
`3/1996 Narasimhalu et al. .
`5,504,757
`4/1996 Cooket al. .
`5,504,818
`4/1996 Okano.
`5,504,837
`4/1996 Griffeth et al. .
`5,508,913
`4/1996 Yamamotoetal. .
`5,509,070
`4/1996 Schull .
`5,513,261
`4/1996 Maher .
`5,530,235
`6/1996 Stefik et al. .
`5,530,752
`6/1996 Rubin .
`5,533,123
`7/1996 Force et al. .
`5,534,975
`7/1996 Stefik et al. .
`5,537,526
`7/1996 Anderson et al.
`5,539,735
`7/1996 Moskowitz .
`5,539,828
`7/1996 Davis .
`5,550,971
`8/1996 Brunneretal. .
`$5,553,282
`9/1996 Parrish et al.
`.
`5,557,518
`9/1996 Rosen .
`5,563,946
`10/1996 Cooperet al. .
`5,568,552 10/1996 Davis .
`§,572,673
`11/1996 Shurts .
`5,592,549
`1/1997 Nageletal. .
`5,606,609
`2/1997 Houseretal. .
`5,613,004
`3/1997 Coopermanet al. wee 380/28
`5,621,797
`4/1997 Rosen .
`5,629,980
`5/1997 Stefik et al. .
`5,633,932
`5/1997 Davis et al. .
`5,634,012
`5/1997 Stefik et al. .
`5,636,292
`6/1997 Rhoads oo. cceeeteeeeeees 382/232
`5,638,443
`6/1997 Stefik .
`.
`5,638,504
`6/1997 Scott et al.
`5,640,546
`6/1997 Gopinath etal. .
`5,655,077
`8/1997 Jones et al. .
`5,687,236
`11/1997 Moskowitz et al. ow. eee 380/28
`5,689,587
`11/1997 Benderet al. oe eee 382/232
`5,692,180
`11/1997 Lee.
`5,710,834
`1/1998 Rhoads .
`5,740,549
`4/1998 Reilly et al.
`5,745,604
`4/1998 Rhoads .
`
`.
`
`.
`
`5/1998 Rhoads .
`5,748,763
`5/1998 Rhoads .
`5,748,783
`5/1998 Fischer.
`5,748,960
`5/1998 Dyeretal. .
`5,754,849
`5/1998 McManis .
`5,757,914
`5/1998 LeTourneau .
`5,758,152
`1/1998 Erickson.
`5,765,152
`6/1998 Rhoads.
`5,768,426
`FOREIGN PATENT DOCUMENTS
`
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`
`2/1992 European Pat. Off.
`0 469 864 A3
`4/1994 European Pat. Off.
`0 593 305 A2
`5/1995
`European Pat. Off.
`0651554 Al
`8/1995
`European Pat. Off.
`0 668 695 A2
`2/1996
`European Pat. Off.
`0 695 985 Al
`2/1996
`European Pat. Off.
`0 696 798 Al
`6/1996
`European Pat. Off.
`0715243A1
`6/1996
`EuropeanPat. Off.
`0715244A1
`6/1996
`European Pat. Off.
`0715245A1
`6/1996
`European Pat. Off.
`0715246A1
`6/1996
`European Pat. Off.
`0715247A1
`=69/1996
`European Pat. Off.
`0 725 376
`12/1996
`Luropean Pat. Off.
`0749081A1
`6/1997 European Pat. Off.
`0 778 513 A2
`9/1997 European Pat. Off.
`0 795 873 A2
`1/1990 Germany .
`3803982A1
`5/1982
`Japan .
`57-726
`10/1987
`Japan .
`62-241061
`3/1989
`Japan .
`1-068835
`3/1989
`Japan .
`64-68835
`9/1990
`Japan .
`2-242352
`10/1990
`Japan .
`2-247763
`12/1990
`Japan .
`2-294855
`4-369068 12/1992
`Japan .
`5-181734
`7/1993
`Japan .
`$-257783
`10/1993
`Japan .
`5-268415
`10/1993
`Japan .
`6-175794
`6/1994
`Japan .
`6-215010
`8/1994
`Japan .
`6225059
`8/1994
`Japan.
`7-056794
`3/1995
`Japan .
`7-084852
`3/1995
`Japan .
`7-141138
`6/1995
`Japan .
`7-200317
`8/1995
`Japan .
`7-200492
`8/1995
`Japan .
`7-244639
`9/1995
`Japan .
`8-137795
`5/1996
`Japan .
`8-152990
`6/1996
`Japan .
`8-185298
`7/1996
`Japan .
`A2136175
`9/1984 United Kingdom.
`2294348
`4/1996 United Kingdom .
`2295947
`6/1996 United Kingdom .
`WO
`5/1985 WIPO.
`A8502310
`8/1985 WIPO.
`WO 85/03584
`4/1992 WIPO.
`WO 92/06438
`1/1993 WIPO .
`WO 93/01550
`1/1994 WIPO.
`WO 94/01821
`7/1994 WIPO.
`WO 94/16395
`8/1994 WIPO.
`WO 94/18620
`9/1994 WIPO.
`WO 94/22266
`11/1994 WIPO.
`WO 94/27406
`1/1996 WIPO.
`WO 96/00963
`2/1996 WIPO.
`WO 96/03835
`2/1996 WIPO.
`WO 96/05698
`2/1996 WIPO.
`WO 96/06503
`5/1996 WIPO.
`WO 96/13013
`7/1996 WIPO.
`WO 96/21192
`1/1997 WIPO.
`WO 97/03423
`3/1997 WIPO.
`WO97/07656
`9/1997 WIPO.
`W097/32251
`W097/48203 12/1997 WIPO.
`
`
`
`5,943,422
`Page 4
`
`OTHER PUBLICATIONS
`
`Choudhury,et al., Copyright Protection for Electronic Pub-
`lishing over Computer Networks, AT&T Bell Laboratores,
`Murray Hill, New Jersey 07974 (Jun. 1994).
`Clark, Tim, Ad service gives cash back, www.news.com,
`Aug. 4, 1997, 2 pages (Document from Internet).
`Codercard, Spec Sheet—Basic Coder Subsystem, No date
`given.
`Communications of the ACM,Intelligent Agents, Jul. 1994,
`vol. 37, No. 7.
`Communications of the ACM, Jun. 1996, vol. 39, No. 6.
`Computer Systems Policy Project (CSSP), Perspectives on
`the National Information Infrastructure: Ensuring Interop-
`erability (Feb. 1994), Feb. 1994.
`Cunningham, Donna,et al., News Release, AT&T, Jan. 31,
`1995, AT&T, VLSI Technology join to improve info high-
`way security, 3 pages.
`Data Sheet, About the Digital Notary Service, Surety Tech-
`nologies, Inc., 1994-95, 6 pages.
`Dempsey, et al, D-Lib Magazine, Jul.[Aug. 1996 The
`Warwick Metadata Workshop: A Frameworkfor the Deploy-
`ent of Resource Description, Jul. 15, 1966.
`Denninget al., Data Security, 11 Computing Surveys No. 3,
`Sep. 1979.
`Diffie, Whitfield and Martin E. Hellman, IEEE Transactions
`on Information Theory, vol. 22, No. 6, Nov. 1976, New
`Directions in Cryptography, pp. 644-651.
`Diffie, Whitfield and Martin E. Hellman, Proceedingsof the
`IEEE,vol. 67, No. 3, Mar. 1979, Privacy and Authentication:
`An Introduction to Cryptography, pp. 397-427.
`Digest of Papers, VLSI: New Architectural Horizons, Feb.
`1980, Preventing Software Piracy With Crypto—Micropro-
`cessors, Robert M. Best, pp. 466-469.
`DiscStore (Electronic Publishing Resources 1991).
`Document fromInternet, cgi@nesa-uiuc.edu, CGI Common
`Gateway Interface, 1 page, 1996.
`DSP56000/DSP56001 Digital Signal Processor User’s
`Manual, Motorola, 1990, p. 2—2.
`Dusse, Stephen R. and Burton S. Kaliski A Cryptographic
`Library for the Motorola 56000 in Damgard,I.M., Advances
`in Cryptology—Proceedings EUROCRYPT 90, Spring-
`er-Verlag, 1991, pp. 230-244.
`Dyson, Esther, Intellectual Value, Wired Magazine, Jul.
`1995, pp. 136-141 and 182-184.
`Effector Online vol. 6 No. 6, A Publication of the Electronic
`Frontier Foundation, 8 pages, Dec. 6, 1993.
`EIA and TIA White Paper on National Information Infra-
`structure,published by the Electronic Industries Association
`and the Telecommunications Industry Association, Wash-
`ington, D.C., no date.
`Electronic Currency Requirements, XIWT (Cross Industry
`Working Group), no date.
`Electronic Publishing Resources Inc. Protecting Electroni-
`cally Published Properties Increasing Publishing Profits
`(Electronic Publishing Resources 1991).
`Firefly Network Inc., www.ffly.com, What is Firefly? Firefly
`revision: 41.4 Copyright 1995, 1996.
`First CI Honeywell Bull International Symposium on Com-
`puter Security and Confidentiality, Jan. 26-28, 1981, Con-
`ference Text, pp. 1-21.
`Framework for National Information Infrastructure Ser-
`
`vices, Draft, U.S. Department of Commerce, Jul. 1994.
`Framework for National Information Infrastructure Ser-
`vices, NIST, Jul. 1994, 12 slides.
`
`Garcia, D. Linda, testimony before a hearing on science,
`space and technology, May 26, 1994.
`Gleick, James, “Dead as a Dollar” The New York Times
`Magazine, Jun. 16, 1996, Section 6, pp. 26-30, 35, 42, 50,
`54.
`
`Green paper, Intellectual Property and the National Infor-
`mation Infrastructure, a Preliminary Draft of the Report of
`the Working Group on Intellectual Property Rights, Jul.
`1994.
`
`Greguras, Fred, Softic Symposium '95, Copyright Clear-
`ances and Moral Rights, Nov. 30, 1995 (as updated Dec. 11,
`1995), 3 pages.
`Guillou, L.: Smart Cards and Conditional Access, pp.
`480-490 Advances in Cryptography, Proceedings of Euro-
`Crypt 84 (Beth et al, Ed., Springer-Verlag 1985).
`Harman, Harry H. Modern Factor Analysis, Third Edition
`Revised, University of Chicago Press Chicago and London,
`Third revised published 1976.
`Herzberg, Amir et al., Public Protection of Software, ACM
`Transactions on Computer Systems, vol. 5, No. 4, Nov.
`1987, pp. 371-393.
`Hofmann, Jud, Interfacing the NII to User Homes, Elec-
`tronic Industries Association, Consumer Electronic Bus
`Committee, 14 slides, no date.
`Holt, Stannie, Start-up promises user confidentiality in Web
`marketing service, Info World Electric, Aug. 13, 1997
`(Document from Internet).
`HOTIJAVA™: The Security Story, 4 pages.
`IISP Break Out Session Report for Group No. 3, Standards
`Development and Tracking System, no date.
`Information Infrastructure Standards Panel: NII ‘The Infor-
`
`mation Superhighway’, Nations Bank -IIGDeal —ASC X9,
`15 pages.
`Invoice? What is an Invoice? Business Week, Jun. 10, 1996.
`JAVASOFT,Frequently Asked Questions—Applet Security,
`What’s Java™? Products and Services, Java/Soft News,
`Developer’s Cornier,Jun. 7, 1996, 8 pages.
`Jiang, et al, Aconcept—Based Approach to Retrieval from an
`Electronic Industrialn Directory, International Journal of
`Electronic Commerce, vol. 1, No. 1, Fall 1996, pp. 51-72.
`Jones, Debra, Top Tech Stories, PowerAgent Introducts First
`Internet ‘Infomediary’ to Empower and Protect Consumers,
`Aug. 13, 1997 3 pages (Document from Internet).
`Kelly, Kevin, Whole Earth Review, E-Money,pp. 40-59,
`Summer 1993.
`
`Kent, Protecting Externally Supplied Software in Small
`Computers (MIT/LCS/TR-255 Sep. 1980).
`Kristol et al. Anonymous Internet Mercantile Protocol,
`AT&T Bell Laboratories, Murray Hill, New Jersey, Draft:
`Mar. 17, 1994.
`Lagoze, Carl, D-Lib Magazine, Jul./Aug. 1996, The War-
`wick Framework, A Container Architecture for Diverse Sets
`of Metadata.
`
`Lanza, Mike, electronic mail, George Gilder’s Fifth Article
`—Digital Darkhorse —Newspapers, Feb. 21, 1994.
`Levy, Steven, Wired, E-Money, That’s What I Want, 10
`pages, Dec. 1994.
`Low et al., Anonymous Credit Cards and its Collusion
`Analysis, AT&T Bell Laboratories, Murray Hill, New Jer-
`sey, Oct. 10, 1994.
`Low et al., Anonymous Credit Cards, AT&T Bell Labora-
`tories, Proceedings of the 2nd ACM Conference on Com-
`puter and Communications Security, Fairfax, Virginia, Nov.
`2-4, 1994.
`
`
`
`5,943,422
`
`Page 5
`
`
`
`Lowet al., Document Marking and Identification using both
`Line and Word Shifting, AT&T Bell Laboratories, Murray
`Hill, New Jersey, Jul. 29, 1994. Maclachlan, Malcolm,
`PowerAgent Debuts Spam—Free Marketing, TechWire, Aug.
`13, 1997, 3 pages (Documentfrom Internet).
`Maxemchuk,Electronic Document Distribution, AT&T Bell
`Laboratories, Murray Hill, New Jersey 07974.
`Micro Card—Micro Card Technologies, Inc., Dallas, Texas,
`No date given.
`Mossberg, Walter S., Personal Technology, Threats to Pri-
`vacy On-Line Become More Worrisome, Wall Street Jour-
`nal, Oct. 24, 1996.
`Negroponte, Electronic Word of Mouth, Wired Oct. 1996, p.
`218.
`
`Some
`Telecommunications,
`Nicholas,
`Negroponte,
`Thoughts on Likely and expected Communications sce-
`narios: A Rebuttal, pp. 41-42, Jan. 1993.
`Neumann,et al., A Provably Secure Operating System: The
`System, Its Applications, and Proofs, Computer Science
`Laboratory Report CSL—116, Second Edition, SRI Interna-
`tional (05/80).
`News Release, Premenos Announces Templar 2.0—Next
`Generation
`Software
`for
`Secure
`Internet
`EDI,
`webmaster@templar.net, 1 page, Jan. 17, 1996.
`News Release, The Document Company Xerox, Xerox
`Announces Software Kit for Creating Working Documents
`With Dataglyphs, Nov. 6, 1995, Minneapolis, MN,13 pages.
`News Release, The White House, Office of the President,
`Background on the Administration’s Telecommunications
`Policy Reform Initiative, Jan. 11, 1994.
`NII, Architecture Requirements, XIWT, no date.
`Open System Environment Architectural Framework for
`National Information Infrastructure Services and Standards,
`io Support of National Class Distributed Systems, Distrib-
`uted System Engineering Program Sponsor Group, Draft
`1.0, Aug. 5, 1994.
`Pelton, Dr. Joseph N., Telecommunications, Why Nicholas
`Negroponte is Wrong About the Future of Telecommunica-
`tion, pp. 35-40, Jan. 1993.
`Portland Software’s ZipLock, Internet Information, Copy-
`right Portland Software 1996-1997, 12 pages.
`PowerAgentInc., Proper Use of Consumer Information on
`the Internet White Paper, Jun. 1997, Document from Inter-
`net, 9 pages (Document from Internet).
`PowerAgent Press Release, What the Experts are Reporting
`on PowerAgent, Aug. 13, 1997, 6 pages (Document from
`Internet).
`PowerAgent Press Release, What the Experts are Reporting
`on PowerAgent, Aug. 4, 1997, 5 pages (Document from
`Internet).
`PowerAgent Press Release, What the Experts are Reporting
`on PowerAgent, Aug. 13, 1997, 3 pages (Document from
`Internet).
`Premenos Corp. Whitc Paper: The Future of Electronic
`Commerce, A Supplement to Midrange Systems, Interent
`webmaster@premenos.com, 4 pages.
`Press Release, National Semiconductor and EPR Partner For
`Information Metering/Data Security Cards (Mar. 4, 1994).
`Raokine, G., Thomas—A Complete Single—Chip RSA
`Device, Advances
`in Cryptography, Proceedings of
`CRYPTO 86, pp. 480-487 (A.M. Odlyzko Ed., Spring-
`er—Verlag 1987).
`
`committee
`Standards
`K,,
`Arthur
`Reilly,
`T1-Telecommunications, Input to the ‘International Tele-
`communications Hearings,’ Panel 1: Component Technolo-
`gies of the NI/GII, no date.
`Resnick, et al., Recommender Systems, Communications of
`the ACM, vol. 40, No. 3, Mar. 1997, pp. 56-89.
`ROI (Personal Library Software, 1987 or 1988).
`ROI-Solving Critical Electronic Publishing Problems (Per-
`sonal Library Software, 1987 or 1988).
`Rose, Lance, Cyberspace and the Legal Matrix: Laws or
`Confusion?, 1991.
`Rosenthal, Steve, New Media, Interactive Network: Viewers
`Get Involved, pp. 30-31, Dec. 1992.
`Rosenthal, Steve, New Media, Interactive TV: The Gold
`Rush Is On, pp. 27-29, Dec. 1992.
`Rosenthal, Steve, New Media, Mega Channels, pp. 36-46,
`Sep. 1993.
`Rothstein, Edward, Zhe NewYork ‘limes, ‘lechnology, Con-
`nections, Making th eInternet come to you, through ‘push’
`technology.. p. D5, Jan. 20, 1997.
`Internet
`Rutkowski, Ken, PowerAgent
`Introduces First
`‘Infomediary’ to Empower and Protect Consumers, Tech
`Talk New Story, Aug. 4, 1997 (Document from Internet).
`Sager,Ira (Edited by), Bits & Bytes, Business Week, Sep. 23,
`1996, p. 142E.
`Schlossstein, Steven, International Economy, America: The
`G7’s Comeback Kid, Jun./Jul. 1993.
`Schurmann, Jurgen, Pattern Classification, A Unified View
`of Statistical and Neural Approaches, John Wiley & Sons,
`Inc., 1996.
`Scnaumueller—Bichlet al., A Method of Software Protection
`Based on the Use of Smart Cards and Cryptographic Tech-
`niques, No date given.
`Serving the Community: A Public—Interest Vision of the
`National Information Infrastructure, Computer Profession-
`als for Social Responsibility, Executive Summary, no date.
`Shear, Solutions for CD-Rom Pricing and Data Security
`Problems, pages 530-533, CD Rom Yearbook 1988-1989
`(Microsoft Press 1988 or 1989).
`Smith et al., Signed Vector Timestamps: A Secure Protocol
`for Parital Order Time, CMU-93-116, School of Computer
`Science Carnegie Mellon University, Pittsburgh, Pennsyl-
`vania, Oct. 1991; version of Feb. 1993.
`Special Report, The Internet:Fulfilling the Promise The
`Internet: Bring Order From Chaos; Lynch, Clifford, Search
`the Internet; Resnick, Paul, Filtering Information on the
`Internet; Hearst, Marti A., Interfaces for Searching the Web;
`Stefik, Mark, Trusted Systems; Scientific American, Mar.
`1997, pp. 49-56, 62-64, 68-72, 78-81.
`Stefik, Internet Dreams: Archetypes, Myths, and Metaphors,
`Letting Loose the Light: Igniting Commerce in Electronic
`Publication, pp. 219-253, (1996) Massachusetts Institute of
`Technology.
`Stefik, Mark, Introduction to Knowledge Systems, Chapter 7,
`Classification, pp. 543-607, 1995 by Morgan Kaufmann
`Publisher, Inc.
`Stefik, Mark, Letting Loose the Light, Igniting Commercein
`Electronic Publication (1994, 1995) Palo Alto, California.
`Stephenson, Tom, Advanced Imaging, The Info Infrastruc-
`ture Initiative: Data SuperHighways and You, pp. 73-74,
`May 1993.
`Sterling, Bruce, Literary freeware: Not for Commercial Use,
`remarks at Computers, Freedom and Privacy Conference IV,
`Chicago, Mar. 26, 1994.
`
`
`
`5,943,422
`Page 6
`
`Struif, Bruno The Use of Chipcards for Electronic Signa-
`tures and Encryption in: Proceedings for the 1989 Confer-
`ence on VSLI and Computer Peripherals, IEEE Computer
`Society Press, 1989, pp. 4/155-4/158.
`Templar Overview,: Prementos, Internet info@templar.net,
`4 pages.
`Templar Software and Services: Secure, Reliable, Stan-
`dards—Based EDI Over the Internet, Prementos, Internet
`info@templar.net, 1 page.
`The 1:1 Future of the Electronic Marketplace: Return to a
`Hunting and Gathering Society, 2 pages, no date.
`The Benefits of ROI For Database Protection and Usage
`Based Billing (Personal Library Software, 1987 or 1988).
`The New Alexandria No. 1, Alexandria Institute, pp. 1-12,
`Jul./Aug. 1986.
`Tygar et al., Cryptography: It’s Not Just For Electronic Mail
`Anymore, CMU-—CS—93-107, School of Computer Science
`Carnegie Mellon University, Pittsburgh, Pennsylvania, Mar.
`1, 1993.
`Tygar et al., Dyad: A System for Using Physically Secure
`Coprocessors, School of Computer Science, Carnegie Mel-
`lon University, Pittsburgh, PA 15213 (May 1991).
`Valovi, T., Telecommunications, The Role of Computer
`Networking in the Emerging Virtual Marketplace, pp.
`40-44.
`
`Voight, Joan, Beyond the Banner, Wired, Dec. 1996, pp. 196,
`200, 204.
`Vonder Haar, Steven, PowerAgent Launches Commercial
`Service, Inter@ctive Week, Aug. 4, 1997 (Document from
`Internet).
`
`Weber, Dr. Robert, Digital Rights Management Technolo-
`gies, Oct. 1995, 21 pages.
`Weber, Metering Technologies for Digital Intellectual Prop-
`erty, A Report to the International Federation of Reproduc-
`tion Rights Organisations, pp. 1-29, Oct. 1994, Boston, MA,
`USA.
`
`Weder, Adele, Life on the Infohighway, 4 pages, no date.
`Weingart, Physical Security for the :ABYSS System, IBM
`Thomas J. Watson Research Center, Yorktown Heights, New
`York 10598 (1987).
`Weitzner, Daniel J., A Statement on EFF’s Open Platform
`Campaign as of Nov., 1993, 3 pages.
`WEPIN Store, Stenography (Hidden Writing) (Common
`Law 1995).
`White, ABYSS: A Trusted Architecture for Software Pro-
`tection, IBM Thomas J. Watson Research Center, Yorktown
`Heights, New York 10598 (1987).
`Wired 1.02, Is Advertising Really dead?, Part 2, 1994.
`World Wide Web FAQ, Howcan I put an access counter on
`my home page?, 1 page, 1996.
`XIWTCross Industry Working Team, 5 pages, Jul. 1994.
`Yee, Using Secure Coprocessors, CMU-CS-94-149,
`School of Computer Science, Carnegie Mellon University
`Pittsburgh, PA15213.
`Yellin, F. Low Level Security in Java, 8 pages.
`E. Milbrandt, “Stenography Info and Archive”, 1996.
`M. Kohntopp, “Sag’s durch die Blume’, Apr. 1996,
`marit@schulung.netuse.de.
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 1 of 30
`
`5,943,422
`
`al‘Sid 9EL
`
`XO8dOLLASFIdNVX3
`
`
`
`LNAWSASVNVWSLHOIY
`
`HLIMYSAVIdVIGSIN31dNVXA
`
`DIHdVYDONVDALS
`
`VEDld
`
`
`
`
`
`SLHDIYDIHdVYDONVDALSHLIM
`
`LNSWS95VNVAN
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`ATdNVXS
`
`Sheet 2 of 30
`
`5,943,422
`
`
`
`
`
`INAWOVNVWSLHOIYDIHAVHOONVOSLS67HLIMHOAS1dWvxa!GI‘Sid
`
`~'
`
`WEFILODE
`
`
`
`
`
`LNAWADVNVIWSLHDIYOIHDVYSONVDALS
`
`
`
`HLIMY3SAI5934O10VY
`
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 3 of 30
`
`5,943,422
`
`
`
`
`
`JIHdVEHDONVOSLSHLIMYSCHOOSYGNVVEANVOAIdNVXa
`
`
`
`LNSWS9DVNVISLHSIY
`
`dt“Sis
`
`
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 4 of 30
`
`5,943,422
`
`
`
`
` “
`
`126 O 01000411......
`
`
`
`FIG. 2
`
`EXAMPLE STEGANOGRAPHICALLY
`ENCODING ELECTRONIC CONTENTSIN AN IMAGE
`
`
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 5 of 30
`
`5,943,422
`
`ANALOG
`SIGNAL
`
`SIGNAL
`
`STEGANO-
`GRAPHIC
`DECODER
`
`RIGHTS
`MANAGEMENT
`PROCESSOR
`
`CONTROL
`
`FIG. 3
`
`EXAMPLE STEGANOGRAPHIC
`DECODER AND RIGHTS MANAGEMENT PROCESSOR
`
`
`
`Aug.24, 1999
`
`Sheet 6 of 30
`
`5,943,422
`
`U.S. Patent
`
`901
`
`GAGOONSATIVOIHdVHDONVDSALSdddOSIOH.LNOD
`
`
`DINOY.LOS713JOAsnTATOCGNVDNINIVLEO3IdNVXa("O|pt
`JOVINVNIHLIMpea----,Ofset
`
`Pv‘SIssetQO<<—SiO|9|9NISS390Hd9e1
`YaAISOSY°NOISIASTSL
`|LNaWSDVNVWipoSLHDIY
`
` !I|||iONIGOOACSIHDVHODONVOIALS
`
`SNISSADOYUd=NOISUSANOOTVLIDICOLDOTWNY
`
`!i
`
`
`
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 7 of 30
`
`5,943,422
`
`ANALOGOUT
`
`
`
`ON/OFFCONTROL
`
`EXAMPLE
`
`FIG.5A
`
`ZOo
`
`Oa
`
`tzx
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 8 of 30
`
`5,943,422
`
`LINODOWNY
`
`(Ga1gWVHOSaq)
`
`OXLNOODONMEWvHOosaa
`
`DOIVNYSidwvxa)«=JG*!)J4
`
`
`
`daTeNVeoOsad
`
`SOTVNY
`
`<(aa1gWvyOS)
`NIDOWNY
`
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 9 of 30
`
`JS‘Sls
`
`5,943,422
`
`
`
`
`
`ALIWNOASGN3-O1L-GN3SDYXOANAOLSALVOIsILYADAOASN
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 10 of 30
`
`5,943,422
`
`
`
`LNOSOTWNYWWd/OSLN
`
`gs‘Sis
`
`
`
`
`
`ATIVIIHdVYEDONVOALSONIOYOIN]YOSONILNIYNdYSONISAO3SN
`
`
`
`STOYULNOSLNAWADVNVWSLHDIYGAGOON3
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 11 of 30
`
`5,943,422
`
`
`
`
`
`
`
`
`
`NOILIGIYLSIADOTVNV-OL-IVLIDIG-OL-DOTVWNVATIdINVX>
`
`
`
`
`
`4S‘Sls
`
`OIHdVYHDONVDALS
`
`ACOONA
`
`DOWNY
`
`TWNDIS
`
`
`
`
`
`5,943,422
`
`
`
`
`
`
`
`
`
`FIG.5FEXAMPLEDIGITAL-TO-ANALOG-TODIGITALDISTRIBUTION
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 12 of 30
`
`100J
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 13 of 30
`
`5,943,422
`
`
`
`SNOILYOdINSLNOO
`
`(S)9E1
`
`SSLANIW
`
`\
`
`I''!''1tIi'ttl4UtIiI'{I''I'|l'
`
`
`
`(g)9¢h(S)SEL(s)9eL(e)9EL
`
`
`
`(s)9zL($)921(sjozt
`
`
`TWNOILVZINVDHOIN3H345109*})i-4j
`.
`INSH34sI0YOdSAUNLONYLS
`
`NOLLVINASSddSYNLVvS4
`
`FIAOWSO1SSH|cyoyjy|FHLJe4s
`QLzozBle
`
`(e)ezl
`
`OSALS
`
`TANNVHD
`
`
`
`v2
`
`2|ez!
`
`O22
`
`TIVYL!bMSTIVELL
`LNALNOO
`TANNVHO
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 14 of 30
`
`5,943,422
`
`OzhHOW
`bossy
`
`Ltd}
`
`DOWNY
`
`TWNOIS
`
`Ino
`
`| |I|
`
`—_-d
`
`||1|||VY|ib-—-—-—-sy|abyII|||
`i;|wii||1|!!OOTWNY
`Y.,
`
`
`
`WHOASNVHLMoNIaTaWveos!7]WHLOAdsOIHAVHDONVOSLS—WNodIsWuLOads
`
`|_HO/ONW|_PHOSSNYHL3QOONS
`ASHAANIOLDOTYNY
`
`
`
`ONIGOONSCIHdVEDONVSALS
`
`
`
`QSaTIVLAGJIdWVX3Vz"E)I4
`
`Ov
`
`LW
`
`
`
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 15 of 30
`
`
`
`
`
`O4NITOH.LNODOIHAVHYDONYDALSTWdLoadsIdAHO30
`WLIDId 9drper
`
`!gjdoogdWYHOASNVYLLaNaNG
`
`9AM
`
`SAaAay
`
`5,943,422
`
`
`
`SNIGODSdDIHdVHYDONVOSALS
`
`QaTIVLAdAdNVXSgz"EIS
`
`CGV
`
`COP
`
`Odor
`
`DOTWNY
`
`OL
`
`WLDId
`
`NOISHAANOD
`
`cOP
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 16 of 30
`
`5,943,422
`
`
`
`
`
`—~——----_—_————-+—77PSccct--——-——
`
`
`
`
`
`tJ
`
`i_]
`
`tJ
`
`THESn———-~=
`
`
`
`
`
`IWNSISGACOONAATIVIIHAVHDONVDSALS
`
`
`
`dOMIANIVNOGAONSNDAYSSdNVXS8"Ey
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 17 of 30
`
`5,943,422
`
`=
`
`
`
`Ma
`
`MaTANNVHO
`
`DIHdVHDONVOALS
`
`
`
`VLVdDNIGOONA
`
`alwa
`
`
`
`ONIGOONADIHdVYDONVDALSALVYVLVGFTIEVIYVAAIdNVX436"E\J4
`
`
`
`
`
`
`
`
`
`
`
`TANNVH9SHLOIMGONVSGSLIIAITVNIHLIM
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 18 of 30
`
`5,943,422
`
`qo0e8
`GSLIANTVNIHLIMDNIGOONASIHGVHDONVOALSFIdINVXAO]"EIS
`
`
`
`
`
`
`TANNVHDHLIMONVS
`
`
`
`woosjo9g4008[008100g4O0s(gel
`
`(z)9¢k
`
`
`
`
`
`Boog40080089008
`
`3800
`
`JAENNVHO
`
`Ms
`
`HLIMONVESNIGOON
`
`DIHDVHDONVDALS
`
`Ma
`
`
`
`
`5,943,422
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 19 of 30
`
`104 FIG.
`
`10A
`
`136(1)
`
`=So
`oO
`co
`
`
`
`PUBLIC HEADER
`
`PRIVATE HEADER
`
`PRIVATE BODY (METHODS)
`
`PERMISSIONS RECORDS
`
`KEY BLOCK(S) _
`
`ANALOG DEVICE
`CONTROL SET
`
`136e
`
`REFERENCE TO EXTERNAL
`
`136f
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 20 of 30
`
`5,943,422
`
`136
`
`\
`
`136x
`
`CONTROL SET
`
`FIG. 11. exampLe STEGANOGRAPHICALLY
`ENCODED ORGANIZATIONAL STRUCTURE
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 21 of 30
`
`5,943,422
`
`Ove8teote
`
`aayYasnul
`
`
`
`AW1dS10TOXLNOO|/HOSNaS
`
`SdSmyvads
`
`vee
`
`OLE
`
`TANNWHD9
`
`f-OV
`
`olanyv
`
`Wd/OS.LN
`
`YSCOON3
`
`O0&?
`
`a
`
`|NOILOaLOud|wiginaino|wuld
`
`Wa4in@
`
`AYOWSW
`
`AHOWAN
`
`dadsinadVsd\
`
`822-’ood
`
`\éZOL‘OOL
`
`dnA-yold
`
`0c%
`
`pOL
`
`YSAiud
`
`TICNidS
`
`eee
`5Add||HOSSS3OO0Ud|
`
`BEL'PZL
`
`ALIHNOSS||AYHONZW|HSV14
`
`Azam
`
`H3LSIDSY
`
`ANIDNAOLdAYO
`
`Z0z;ii[roeeee
`
`
`
`
`
`LNAINSSVNVWSLHDIdSIHDVYDONVDALSHLIMSONVIdd¥DINLOSTASdWVX3cl"EI
`
`
`
`
`
`
`
`
`
`
`
`302
`
`
`
`
`
`EXTRACT
`STEGANOGRAPHICALLY
`ENCODED DATA
`
`
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 22 of 30
`
`5,943,422
`
`READ/PLAY
`
`300
`
`/
`
`APPLY
`RULES
`
`
`
`READ OUTPUT OF
`CD-ROM DECODER
`
`
`
`
`
`
`GET ORG
`STRUCTURE
`
`322
`
`BANDWITH
`AVAILABLE?
`
`
`
`FIG. 13 exampce CONTROL STEPS
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 23 of 30
`
`5,943,422
`
`302
`
`APPLY RULES
`
`a
`
`
`
`
`HAVE
`
`COMPLETE
`
`ORG STRUCT?
`
`
` DISABLE
`DEFAULT DISABLE PROCESS OPERATION
`
`
`
`
`WITH RESPECT
`TO RULES
`
`FIG. 13A exampce APPLY RULES ROUTINE
`
`
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 24 of 30
`
` Q3HS3u43YODa1sODALS|SONY 00!
`
`SOTYNY3qOONzbowbaIWNDIS
`,104300030NI
`
`5,943,422
`
`
`
`
`
`
`
`INSW39ONVUYYHS3Y33HFIdNVXEpy]“1/4
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 25 of 30
`
`5,943,422
`
`
`
`
`
`NOLLNGIYLSICTWNOISDOTWNYSF1dNVX4
`
`VSLDIgOOYNY ONIGOON]
`
`20k
`
`CNAGVSH
`
`OOPSIHEVYHDONVOSLS
`
`
`
`
`
`Aug.24, 1999
`
`Sheet 26 of 30
`
`5,943,422
`
`U.S. Patent
`
`cOl
`
`
`
`
`
`
`
`
`
`
`NOLLNGIYLSICIVNDISDOTVNYSAIdNVXA3
`
`‘Sid
`
`gst
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 27 of 30
`
`5,943,422
`
`SOIWNYf-TWNODIS SNIGOONA
`
`
`
`
`
`TWALSIG-OLDOTVNVATdNVXS
`
`NOILLNSIELSIG
`
`
`
`OSt“Sis
`
`SINDVHDONVOSALS
`
`
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 28 of 30
`
`
`
`5,943,422
`
`
`
`TWALIDId-OL-DOTIVNYJIdWVX3
`
`NOILNAlYLsid
`
`asl
`
`‘Sis
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 29 of 30
`
`540
`
`5,943,422
`
`
`
`
`
`FIG.15EEXAMPLEDIGITAL-TO-ANALOGDISTRIBUTION
`
`124A102
`
`
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 30 of 30
`
`‘Sls
`
`
`ASt
`
`5,943,422
`
`
`
`NOLLNEIYLSIGDOTVNV-OL-1WLIDIC
`
`
`
`5,943,422
`
`1
`STEGANOGRAPHIC TECHNIQUES FOR
`SECURELY DELIVERING ELECTRONIC
`DIGITAL RIGHTS MANAGEMENT
`CONTROL INFORMATION OVER
`INSECURE COMMUNICATION CHANNELS
`
`CROSS REFERENCE TO RELATED
`APPLICATION
`
`This application is rclated to commonly assigned appli-
`cation Ser. No. 08/388,107 of Ginter et al., filed Feb. 13,
`1995, entitled “SYSTEMS AND METHODS FOR
`SECURE TRANSACTION MANAGEMENTAND ELEC-
`TRONIC RIGHTS PROTECTION”(attorney reference
`numbe