throbber
United States Patent
`
`[19]
`
`5,943,422
`Aug. 24, 1999
`Date of Patent:
`Van Wieet al.
`[45]
`
`[11]
`
`Patent Number:
`
`US005943422A
`
`[54]
`
`STEGANOGRAPHIC TECHNIQUES FOR
`SECURELY DELIVERING ELECTRONIC
`DIGITAL RIGHTS MANAGEMENT
`CONTROL INFORMATION OVER
`INSECURE COMMUNICATION CHANNELS
`
`Inventors: David M. Van Wie, Sunnyvale; Robert
`P. Weber, Menlo Park, both of Calif.
`
`Assignee:
`
`InterTrust Technologies Corp.,
`Sunnyvale, Calif.
`
`OTHER PUBLICATIONS
`
`Baum, Michael, Worldwide Electronic Commerce: Law,
`Policy and Controls Conference, program details, Nov. 11,
`1993.
`
`Bisbey,II et al., Encapsulation: An Approach to Operating
`System Security, Oct. 1973, pp. 666-675.
`Blom etal., Encryption Methods in Data Networks, Ericsson
`Technics, No. 2, 1978, Stockholm, Sweden.
`Bruner, Rick, E., PowerAgent, NetBot help advertisers reach
`Internet shoppers, Aug. 1997 (Document from Internet).
`Cable Television and America’s Telecommunications Infra-
`
`Appl. No.: 08/689,606
`
`Filed:
`
`Aug. 12, 1996
`
`structure, National Cable Television Association, Apr. 1993.
`Caruso, Technology, Digital Commerce 2 plans for water-
`marks, which can bind proof of authorship to electronic
`works, New York Times (Aug. 1995).
`ieecccccecsssseecsssseeesssseesesssusssesnneesss HOAN 7/167
`TInt, C1.o
`CD ROM,Introducing .
`.
`. The Workflow CD-ROM Sam-
`
`US. C1. oncecececeeceececceeseeeesesneaeseceeeeeenes 380/9; 380/5
`pler, Creative Networks, MCIMail: Creative Networks, Inc.,
`Field of Search 0... eee 380/9, 20, 4, 5,
`Palo Alto, California.
`380/28; 382/232
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,573,747
`3,609,697
`3,796,830
`3,798,359
`3,798,360
`3,798,605
`3,806,882
`
`4/1971
`9/1971
`3/1974
`3/1974
`3/1974
`3/1974
`4/1974
`
`.
`
`Adamset al.
`Blevins .
`Smith .
`Feistel .
`Feistel .
`Feistel .
`Clarke .
`
`(List continued on next page.)
`FOREIGN PATENT DOCUMENTS
`
`9 004 79
`0 84 441
`A0135422
`0180460
`0 370 146
`0 456 386 A2
`0 469 864 A2
`
`12/1984
`7/1983
`3/1985
`5/1986
`11/1988
`11/1991
`11/1991
`
`Belgium .
`European Pat. Off.
`Furopean Pat. Off.
`European Pat. Off.
`European Pat. Off.
`European Pat. Off.
`European Pat. Off.
`
`.
`.
`.
`.
`.
`.
`
`(List continued on next page.)
`
`Primary Examiner—David Cain
`Attorney, Agent, or Firm—Nixon & Vanderhyc P.C.
`
`[57]
`
`ABSTRACT
`
`Electronic steganographic techniques can be used to encode
`a rights management control signal onto an information
`signal carried over an insecure communications channel.
`Steganographic techniques ensure that the digital control
`informationis substantially invisibly and substantially indel-
`ibly carried by the information signal. These techniques can
`provide end-to-end rights management protection of an
`information signal irrespective of transformations between
`analog and digital. An electronic appliance can recover the
`control information and use it for electronic rights manage-
`ment to provide compatibility with a Virtual Distribution
`Environment. In one example, the system encodes low data
`rale pointers within high bandwidth time periods of the
`content signal to improve overall control information read/
`seek times.
`
`(List continued on next page.)
`
`348 Claims, 30 Drawing Sheets
`
`
`
`oN
`o6c)
`Oo )
`Ley
`EXAMPLE STEGANOGRAPHICALLY
`ENCODING ELECTRONIC CONTENTSIN AN IMAGE
`
`Roku Exhibit 1019
`Roku Exhibit 1019
`Roku v. Videolabs
`Roku v. Videolabs
`
`

`

`5,943,422
`
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`3,829,833
`3,906,448
`3,911,397
`3,924,065
`3,931,504
`3,946,220
`3,956,615
`3,958,081
`3,970,992
`4,048,619
`4,071,911
`
`4,265,371
`4,270,182
`4,278,837
`4,305,131
`4,306,289
`4,309,569
`4,319,079
`4,323,921
`4,328,544
`4,337,483
`4,361,877
`4,375,579
`4,433,207
`4,434,464
`4,442,486
`4,446,519
`4,454,594
`4,458,315
`4,462,076
`4,462,078
`4,465,901
`4,471,163
`4,484,217
`4,494,156
`4,513,174
`4,528,588
`4,528,643
`4,553,252
`4,558,176
`4,558,413
`4,562,306
`4,562,495
`4,577,289
`4,584,641
`4,588,991
`4,589,064
`4,593,353
`4,593,376
`4,595,950
`4,597,058
`4,634,807
`4,644,493
`4,646,234
`4,652,990
`4,658,093
`
`8/1974
`9/1975
`10/1975
`12/1975
`1/1976
`3/1976
`5/1976
`5/1976
`7/1976
`9/1977
`1/1978
`9/1978
`10/1978
`7/1979
`9/1979
`4/1980
`4/1980
`6/1980
`8/1980
`9/1980
`11/1980
`11/1980
`11/1980
`2/1981
`4/1981
`5/1981
`5/1981
`T/A981
`12/1981
`12/1981
`1/1982
`3/1982
`4/1982
`5/1982
`6/1982
`11/1982
`3/1983
`2/1984
`2/1984
`4/1984
`5/1984
`6/1984
`7/1984
`T/1984
`7/1984
`8/1984
`9/1984
`11/1984
`1/1985
`4/1985
`F/1985
`7/1985
`11/1985
`12/1985
`12/1985
`12/1985
`12/1985
`3/1986
`4/1986
`5/1986
`5/1986
`6/1986
`6/1986
`6/1986
`6/1986
`1/1987
`2/1987
`2/1987
`3/1987
`4/1987
`
`.
`
`.
`
`.
`Freeny, Jr.
`Henriques.
`Freeny, Jr.
`.
`Freeny, Jr.
`.
`Jacoby .
`.
`Brobecket al.
`Andersonet al.
`Ehrsam et al. .
`Boothroyd etal. .
`Forman, Jy.et al.
`Mazur.
`Freeny, Jr.
`Johnstone .
`Mori et al.
`Best .
`Tormanetal. .
`Kuharet al.
`.
`Freeny, Jr.
`.
`Freeny, Jr.
`.
`Hamanoetal. .
`Gerard .
`Freeny, Jr.
`Kennedy .
`Kirschneret al. .
`Bright et al.
`.
`Desaiet al. .
`Asija .
`Best .
`Best .
`Lumley .
`Merkle .
`Best .
`Guillou .
`Baldwin et al.
`Guillou .
`.
`Dyeret al.
`Davidaetal. .
`Best .
`Suzuki et al.
`Mayer.
`Thomas .
`Heffron et al. .
`Uchenick .
`Smith, III .
`Ross .
`Best .
`Donald et al. .
`Block et al.
`.
`Kadison et al.
`Herman.
`Lofberg .
`Freeny, Jr.
`Egendorf.
`Arnold et al.
`Schmidt et al.
`Chouetal. .
`Bondetal. .
`Comerford etal. .
`Guglielmino .
`Atalla .
`Chiba et al.
`Pickholtz .
`Volk .
`Lofberg .
`Izumietal. .
`.
`Chorleyet al.
`Chandraetal. .
`Tolmanet al. .
`Pailen et al.
`.
`Hellman.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`4,670,857
`4,677,434
`4,680,731
`4,683,553
`4,685,056
`4,688,169
`4,691,350
`4,696,034
`4,701,846
`4,712,238
`4,713,753
`4,740,890
`4,747,139
`4,757,533
`4,757,534
`4,768,087
`4,791,565
`4,796,181
`4,807,288
`4,817,140
`4,827,508
`4,858,121
`4,864,494
`4,868,877
`4,903,296
`4,924,378
`4,930,073
`4,949,187
`4,977,594
`4,999,806
`5,001,752
`5,005,122
`5,005,200
`5,010,571
`5,023,907
`5,047,928
`5,048,085
`5,050,213
`5,091,966
`5,103,392
`5,119,493
`5,128,525
`5,136,643
`5,136,646
`5,136,647
`5,136,716
`5,146,575
`5,148,481
`5,155,680
`5,168,147
`5,185,717
`5,201,046
`5,201,047
`5,208,748
`5,214,702
`5,216,603
`5,221,833
`5,222,134
`5,224,160
`5,235,642
`5,245,165
`5,247,575
`5,260,999
`5,263,158
`5,265,164
`5,276,735
`5,280,479
`5,285,494
`5,301,231
`5,311,591
`5,337,360
`5,341,429
`
`6/1987
`6/1987
`7/987
`7/1987
`8/1987
`8/1987
`9/1987
`9/1987
`10/1987
`12/1987
`12/1987
`4/1988
`5/1988
`7/1988
`7/1988
`8/1988
`12/1988
`1/1989
`2/1989
`3/1989
`5/1989
`8/1989
`9/1989
`9/1989
`2/1990
`5/1990
`5/1990
`8/1990
`12/1990
`3/1991
`3/1991
`4/1991
`4/1991
`4/1991
`6/1991
`9/1991
`9/1991
`9/1991
`2/1992
`4/1992
`6/1992
`T/1992
`8/1992
`8/1992
`8/1992
`8/1992
`9/1992
`9/1992
`10/1992
`12/1992
`2/1993
`4/1993
`4/1993
`5/1993
`5/1993
`6/1993
`6/1993
`6/1993
`6/1993
`8/1993
`9/1993
`9/1993
`11/1993
`11/1993
`11/1993
`1/1994
`1/1994
`2/1994
`4/1994
`5/1994
`8/1994
`8/1994
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`Rackman .
`Fascenda.
`Izumiet al.
`Mollier.
`Barnsdale etal. .
`Joshi .
`Kleijne et al.
`Wiedemer.
`Ikedaet al. .
`Gilhousenetal. .
`Boebert et al. .
`William .
`Taaffe .
`Allen et al. .
`Matyaset al.
`Taub etal. .
`Dunham etal. .
`Wiedemer.
`Ugonet al. .
`Chandraetal. .
`Shear.
`Barberetal. .
`Kobus.
`Fischer .
`.
`Chandra et al.
`Hersheyet al. .
`Cina, Jr.
`.
`Cohen .
`Shear.
`Cherowetal. .
`Fischer .
`Griffin et al.
`Fischer .
`Katznelson .
`Johnsonetal. .
`Wiedemer.
`Abrahametal. .
`Shear.
`Bloomberg etal. .
`Mori .
`.
`Janis et al.
`Steamset al.
`Fischer .
`Haberetal. .
`IJaberetal. .
`Harveyet al.
`Nolan, Jr.
`.
`Abrahametal. .
`Wiedemer.
`Bloomberg .
`Mori .
`Goldberg etal. .
`Makietal. .
`Flores et al. .
`Fischer .
`Flores et al. .
`Hecht.
`Waite etal. .
`Pauliniet al.
`Wobberet al.
`Zhang .
`Sprague etal. .
`Wyman .
`Janis .
`.
`Matyaset al.
`Boebert et al. .
`Mary.
`Sprecheretal. .
`Abrahametal. .
`Fischer .
`Fischer .
`Stringeret al. .
`
`.
`
`.
`
`

`

`5,943,422
`
`Page 3
`
`.
`
`.
`.
`
`.
`
`9/1994 Blandford .
`5,347,579
`9/1994 Micheneretal. .
`5,351,293
`5,355,474 10/1994 Thuraisngham etal. .
`5,373,561
`12/1994 Haberet al.
`.
`5,390,247
`2/1995 Fischer.
`5,390,330
`2A 995 Talati .
`$392,220
`2/1995 van den Hameretal. .
`5302300
`2/1995. Crozier .
`5,394,469
`2/1995 Nagel et al.
`5,410,598
`4/1995 Shear .
`§,412,717
`5/1995 Fischer.
`5,421,006
`5/1995 Jablon .
`5,422,953
`6/1995 Fischer.
`5,428,606
`6/1995 Moskowitz .
`5,438,508
`8/1995 Wyman .
`5,442,645
`8/1995 Ugon .
`5,444,779
`8/1995 Daniele .
`5,449,895
`9/1995 Ilechtet al.
`5,449,896
`9/1995 Hechtet al.
`5,450,493
`9/1995 Maher .
`5,453,601
`9/1995 Rosen.
`5,453,605
`9/1995 Hechtet al.
`5,455,407 10/1995 Rosen .
`5,455,861
`10/1995 Faucheret al. .
`5,455,953
`10/1995 Russell .
`5,457,746
`10/1995 Dolphin .
`5,463,565
`10/1995 Cooksonetal. .
`5,473,687 12/1995 Lipscombet al. .
`5,473,692 12/1995 Davis .
`5,479,509
`12/1995 Ugon .
`5,485,622
`1/1996 Yamaki .
`5,491,800
`2/1996 Goldsmithetal. .
`5,497,479
`3/1996 Hornbuckle .
`.
`5,497,491
`3/1996 Mitchell et al.
`5,499,298
`3/1996 Narasimhalu et al. .
`5,504,757
`4/1996 Cooket al. .
`5,504,818
`4/1996 Okano.
`5,504,837
`4/1996 Griffeth et al. .
`5,508,913
`4/1996 Yamamotoetal. .
`5,509,070
`4/1996 Schull .
`5,513,261
`4/1996 Maher .
`5,530,235
`6/1996 Stefik et al. .
`5,530,752
`6/1996 Rubin .
`5,533,123
`7/1996 Force et al. .
`5,534,975
`7/1996 Stefik et al. .
`5,537,526
`7/1996 Anderson et al.
`5,539,735
`7/1996 Moskowitz .
`5,539,828
`7/1996 Davis .
`5,550,971
`8/1996 Brunneretal. .
`$5,553,282
`9/1996 Parrish et al.
`.
`5,557,518
`9/1996 Rosen .
`5,563,946
`10/1996 Cooperet al. .
`5,568,552 10/1996 Davis .
`§,572,673
`11/1996 Shurts .
`5,592,549
`1/1997 Nageletal. .
`5,606,609
`2/1997 Houseretal. .
`5,613,004
`3/1997 Coopermanet al. wee 380/28
`5,621,797
`4/1997 Rosen .
`5,629,980
`5/1997 Stefik et al. .
`5,633,932
`5/1997 Davis et al. .
`5,634,012
`5/1997 Stefik et al. .
`5,636,292
`6/1997 Rhoads oo. cceeeteeeeeees 382/232
`5,638,443
`6/1997 Stefik .
`.
`5,638,504
`6/1997 Scott et al.
`5,640,546
`6/1997 Gopinath etal. .
`5,655,077
`8/1997 Jones et al. .
`5,687,236
`11/1997 Moskowitz et al. ow. eee 380/28
`5,689,587
`11/1997 Benderet al. oe eee 382/232
`5,692,180
`11/1997 Lee.
`5,710,834
`1/1998 Rhoads .
`5,740,549
`4/1998 Reilly et al.
`5,745,604
`4/1998 Rhoads .
`
`.
`
`.
`
`5/1998 Rhoads .
`5,748,763
`5/1998 Rhoads .
`5,748,783
`5/1998 Fischer.
`5,748,960
`5/1998 Dyeretal. .
`5,754,849
`5/1998 McManis .
`5,757,914
`5/1998 LeTourneau .
`5,758,152
`1/1998 Erickson.
`5,765,152
`6/1998 Rhoads.
`5,768,426
`FOREIGN PATENT DOCUMENTS
`
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`
`2/1992 European Pat. Off.
`0 469 864 A3
`4/1994 European Pat. Off.
`0 593 305 A2
`5/1995
`European Pat. Off.
`0651554 Al
`8/1995
`European Pat. Off.
`0 668 695 A2
`2/1996
`European Pat. Off.
`0 695 985 Al
`2/1996
`European Pat. Off.
`0 696 798 Al
`6/1996
`European Pat. Off.
`0715243A1
`6/1996
`EuropeanPat. Off.
`0715244A1
`6/1996
`European Pat. Off.
`0715245A1
`6/1996
`European Pat. Off.
`0715246A1
`6/1996
`European Pat. Off.
`0715247A1
`=69/1996
`European Pat. Off.
`0 725 376
`12/1996
`Luropean Pat. Off.
`0749081A1
`6/1997 European Pat. Off.
`0 778 513 A2
`9/1997 European Pat. Off.
`0 795 873 A2
`1/1990 Germany .
`3803982A1
`5/1982
`Japan .
`57-726
`10/1987
`Japan .
`62-241061
`3/1989
`Japan .
`1-068835
`3/1989
`Japan .
`64-68835
`9/1990
`Japan .
`2-242352
`10/1990
`Japan .
`2-247763
`12/1990
`Japan .
`2-294855
`4-369068 12/1992
`Japan .
`5-181734
`7/1993
`Japan .
`$-257783
`10/1993
`Japan .
`5-268415
`10/1993
`Japan .
`6-175794
`6/1994
`Japan .
`6-215010
`8/1994
`Japan .
`6225059
`8/1994
`Japan.
`7-056794
`3/1995
`Japan .
`7-084852
`3/1995
`Japan .
`7-141138
`6/1995
`Japan .
`7-200317
`8/1995
`Japan .
`7-200492
`8/1995
`Japan .
`7-244639
`9/1995
`Japan .
`8-137795
`5/1996
`Japan .
`8-152990
`6/1996
`Japan .
`8-185298
`7/1996
`Japan .
`A2136175
`9/1984 United Kingdom.
`2294348
`4/1996 United Kingdom .
`2295947
`6/1996 United Kingdom .
`WO
`5/1985 WIPO.
`A8502310
`8/1985 WIPO.
`WO 85/03584
`4/1992 WIPO.
`WO 92/06438
`1/1993 WIPO .
`WO 93/01550
`1/1994 WIPO.
`WO 94/01821
`7/1994 WIPO.
`WO 94/16395
`8/1994 WIPO.
`WO 94/18620
`9/1994 WIPO.
`WO 94/22266
`11/1994 WIPO.
`WO 94/27406
`1/1996 WIPO.
`WO 96/00963
`2/1996 WIPO.
`WO 96/03835
`2/1996 WIPO.
`WO 96/05698
`2/1996 WIPO.
`WO 96/06503
`5/1996 WIPO.
`WO 96/13013
`7/1996 WIPO.
`WO 96/21192
`1/1997 WIPO.
`WO 97/03423
`3/1997 WIPO.
`WO97/07656
`9/1997 WIPO.
`W097/32251
`W097/48203 12/1997 WIPO.
`
`

`

`5,943,422
`Page 4
`
`OTHER PUBLICATIONS
`
`Choudhury,et al., Copyright Protection for Electronic Pub-
`lishing over Computer Networks, AT&T Bell Laboratores,
`Murray Hill, New Jersey 07974 (Jun. 1994).
`Clark, Tim, Ad service gives cash back, www.news.com,
`Aug. 4, 1997, 2 pages (Document from Internet).
`Codercard, Spec Sheet—Basic Coder Subsystem, No date
`given.
`Communications of the ACM,Intelligent Agents, Jul. 1994,
`vol. 37, No. 7.
`Communications of the ACM, Jun. 1996, vol. 39, No. 6.
`Computer Systems Policy Project (CSSP), Perspectives on
`the National Information Infrastructure: Ensuring Interop-
`erability (Feb. 1994), Feb. 1994.
`Cunningham, Donna,et al., News Release, AT&T, Jan. 31,
`1995, AT&T, VLSI Technology join to improve info high-
`way security, 3 pages.
`Data Sheet, About the Digital Notary Service, Surety Tech-
`nologies, Inc., 1994-95, 6 pages.
`Dempsey, et al, D-Lib Magazine, Jul.[Aug. 1996 The
`Warwick Metadata Workshop: A Frameworkfor the Deploy-
`ent of Resource Description, Jul. 15, 1966.
`Denninget al., Data Security, 11 Computing Surveys No. 3,
`Sep. 1979.
`Diffie, Whitfield and Martin E. Hellman, IEEE Transactions
`on Information Theory, vol. 22, No. 6, Nov. 1976, New
`Directions in Cryptography, pp. 644-651.
`Diffie, Whitfield and Martin E. Hellman, Proceedingsof the
`IEEE,vol. 67, No. 3, Mar. 1979, Privacy and Authentication:
`An Introduction to Cryptography, pp. 397-427.
`Digest of Papers, VLSI: New Architectural Horizons, Feb.
`1980, Preventing Software Piracy With Crypto—Micropro-
`cessors, Robert M. Best, pp. 466-469.
`DiscStore (Electronic Publishing Resources 1991).
`Document fromInternet, cgi@nesa-uiuc.edu, CGI Common
`Gateway Interface, 1 page, 1996.
`DSP56000/DSP56001 Digital Signal Processor User’s
`Manual, Motorola, 1990, p. 2—2.
`Dusse, Stephen R. and Burton S. Kaliski A Cryptographic
`Library for the Motorola 56000 in Damgard,I.M., Advances
`in Cryptology—Proceedings EUROCRYPT 90, Spring-
`er-Verlag, 1991, pp. 230-244.
`Dyson, Esther, Intellectual Value, Wired Magazine, Jul.
`1995, pp. 136-141 and 182-184.
`Effector Online vol. 6 No. 6, A Publication of the Electronic
`Frontier Foundation, 8 pages, Dec. 6, 1993.
`EIA and TIA White Paper on National Information Infra-
`structure,published by the Electronic Industries Association
`and the Telecommunications Industry Association, Wash-
`ington, D.C., no date.
`Electronic Currency Requirements, XIWT (Cross Industry
`Working Group), no date.
`Electronic Publishing Resources Inc. Protecting Electroni-
`cally Published Properties Increasing Publishing Profits
`(Electronic Publishing Resources 1991).
`Firefly Network Inc., www.ffly.com, What is Firefly? Firefly
`revision: 41.4 Copyright 1995, 1996.
`First CI Honeywell Bull International Symposium on Com-
`puter Security and Confidentiality, Jan. 26-28, 1981, Con-
`ference Text, pp. 1-21.
`Framework for National Information Infrastructure Ser-
`
`vices, Draft, U.S. Department of Commerce, Jul. 1994.
`Framework for National Information Infrastructure Ser-
`vices, NIST, Jul. 1994, 12 slides.
`
`Garcia, D. Linda, testimony before a hearing on science,
`space and technology, May 26, 1994.
`Gleick, James, “Dead as a Dollar” The New York Times
`Magazine, Jun. 16, 1996, Section 6, pp. 26-30, 35, 42, 50,
`54.
`
`Green paper, Intellectual Property and the National Infor-
`mation Infrastructure, a Preliminary Draft of the Report of
`the Working Group on Intellectual Property Rights, Jul.
`1994.
`
`Greguras, Fred, Softic Symposium '95, Copyright Clear-
`ances and Moral Rights, Nov. 30, 1995 (as updated Dec. 11,
`1995), 3 pages.
`Guillou, L.: Smart Cards and Conditional Access, pp.
`480-490 Advances in Cryptography, Proceedings of Euro-
`Crypt 84 (Beth et al, Ed., Springer-Verlag 1985).
`Harman, Harry H. Modern Factor Analysis, Third Edition
`Revised, University of Chicago Press Chicago and London,
`Third revised published 1976.
`Herzberg, Amir et al., Public Protection of Software, ACM
`Transactions on Computer Systems, vol. 5, No. 4, Nov.
`1987, pp. 371-393.
`Hofmann, Jud, Interfacing the NII to User Homes, Elec-
`tronic Industries Association, Consumer Electronic Bus
`Committee, 14 slides, no date.
`Holt, Stannie, Start-up promises user confidentiality in Web
`marketing service, Info World Electric, Aug. 13, 1997
`(Document from Internet).
`HOTIJAVA™: The Security Story, 4 pages.
`IISP Break Out Session Report for Group No. 3, Standards
`Development and Tracking System, no date.
`Information Infrastructure Standards Panel: NII ‘The Infor-
`
`mation Superhighway’, Nations Bank -IIGDeal —ASC X9,
`15 pages.
`Invoice? What is an Invoice? Business Week, Jun. 10, 1996.
`JAVASOFT,Frequently Asked Questions—Applet Security,
`What’s Java™? Products and Services, Java/Soft News,
`Developer’s Cornier,Jun. 7, 1996, 8 pages.
`Jiang, et al, Aconcept—Based Approach to Retrieval from an
`Electronic Industrialn Directory, International Journal of
`Electronic Commerce, vol. 1, No. 1, Fall 1996, pp. 51-72.
`Jones, Debra, Top Tech Stories, PowerAgent Introducts First
`Internet ‘Infomediary’ to Empower and Protect Consumers,
`Aug. 13, 1997 3 pages (Document from Internet).
`Kelly, Kevin, Whole Earth Review, E-Money,pp. 40-59,
`Summer 1993.
`
`Kent, Protecting Externally Supplied Software in Small
`Computers (MIT/LCS/TR-255 Sep. 1980).
`Kristol et al. Anonymous Internet Mercantile Protocol,
`AT&T Bell Laboratories, Murray Hill, New Jersey, Draft:
`Mar. 17, 1994.
`Lagoze, Carl, D-Lib Magazine, Jul./Aug. 1996, The War-
`wick Framework, A Container Architecture for Diverse Sets
`of Metadata.
`
`Lanza, Mike, electronic mail, George Gilder’s Fifth Article
`—Digital Darkhorse —Newspapers, Feb. 21, 1994.
`Levy, Steven, Wired, E-Money, That’s What I Want, 10
`pages, Dec. 1994.
`Low et al., Anonymous Credit Cards and its Collusion
`Analysis, AT&T Bell Laboratories, Murray Hill, New Jer-
`sey, Oct. 10, 1994.
`Low et al., Anonymous Credit Cards, AT&T Bell Labora-
`tories, Proceedings of the 2nd ACM Conference on Com-
`puter and Communications Security, Fairfax, Virginia, Nov.
`2-4, 1994.
`
`

`

`5,943,422
`
`Page 5
`
`
`
`Lowet al., Document Marking and Identification using both
`Line and Word Shifting, AT&T Bell Laboratories, Murray
`Hill, New Jersey, Jul. 29, 1994. Maclachlan, Malcolm,
`PowerAgent Debuts Spam—Free Marketing, TechWire, Aug.
`13, 1997, 3 pages (Documentfrom Internet).
`Maxemchuk,Electronic Document Distribution, AT&T Bell
`Laboratories, Murray Hill, New Jersey 07974.
`Micro Card—Micro Card Technologies, Inc., Dallas, Texas,
`No date given.
`Mossberg, Walter S., Personal Technology, Threats to Pri-
`vacy On-Line Become More Worrisome, Wall Street Jour-
`nal, Oct. 24, 1996.
`Negroponte, Electronic Word of Mouth, Wired Oct. 1996, p.
`218.
`
`Some
`Telecommunications,
`Nicholas,
`Negroponte,
`Thoughts on Likely and expected Communications sce-
`narios: A Rebuttal, pp. 41-42, Jan. 1993.
`Neumann,et al., A Provably Secure Operating System: The
`System, Its Applications, and Proofs, Computer Science
`Laboratory Report CSL—116, Second Edition, SRI Interna-
`tional (05/80).
`News Release, Premenos Announces Templar 2.0—Next
`Generation
`Software
`for
`Secure
`Internet
`EDI,
`webmaster@templar.net, 1 page, Jan. 17, 1996.
`News Release, The Document Company Xerox, Xerox
`Announces Software Kit for Creating Working Documents
`With Dataglyphs, Nov. 6, 1995, Minneapolis, MN,13 pages.
`News Release, The White House, Office of the President,
`Background on the Administration’s Telecommunications
`Policy Reform Initiative, Jan. 11, 1994.
`NII, Architecture Requirements, XIWT, no date.
`Open System Environment Architectural Framework for
`National Information Infrastructure Services and Standards,
`io Support of National Class Distributed Systems, Distrib-
`uted System Engineering Program Sponsor Group, Draft
`1.0, Aug. 5, 1994.
`Pelton, Dr. Joseph N., Telecommunications, Why Nicholas
`Negroponte is Wrong About the Future of Telecommunica-
`tion, pp. 35-40, Jan. 1993.
`Portland Software’s ZipLock, Internet Information, Copy-
`right Portland Software 1996-1997, 12 pages.
`PowerAgentInc., Proper Use of Consumer Information on
`the Internet White Paper, Jun. 1997, Document from Inter-
`net, 9 pages (Document from Internet).
`PowerAgent Press Release, What the Experts are Reporting
`on PowerAgent, Aug. 13, 1997, 6 pages (Document from
`Internet).
`PowerAgent Press Release, What the Experts are Reporting
`on PowerAgent, Aug. 4, 1997, 5 pages (Document from
`Internet).
`PowerAgent Press Release, What the Experts are Reporting
`on PowerAgent, Aug. 13, 1997, 3 pages (Document from
`Internet).
`Premenos Corp. Whitc Paper: The Future of Electronic
`Commerce, A Supplement to Midrange Systems, Interent
`webmaster@premenos.com, 4 pages.
`Press Release, National Semiconductor and EPR Partner For
`Information Metering/Data Security Cards (Mar. 4, 1994).
`Raokine, G., Thomas—A Complete Single—Chip RSA
`Device, Advances
`in Cryptography, Proceedings of
`CRYPTO 86, pp. 480-487 (A.M. Odlyzko Ed., Spring-
`er—Verlag 1987).
`
`committee
`Standards
`K,,
`Arthur
`Reilly,
`T1-Telecommunications, Input to the ‘International Tele-
`communications Hearings,’ Panel 1: Component Technolo-
`gies of the NI/GII, no date.
`Resnick, et al., Recommender Systems, Communications of
`the ACM, vol. 40, No. 3, Mar. 1997, pp. 56-89.
`ROI (Personal Library Software, 1987 or 1988).
`ROI-Solving Critical Electronic Publishing Problems (Per-
`sonal Library Software, 1987 or 1988).
`Rose, Lance, Cyberspace and the Legal Matrix: Laws or
`Confusion?, 1991.
`Rosenthal, Steve, New Media, Interactive Network: Viewers
`Get Involved, pp. 30-31, Dec. 1992.
`Rosenthal, Steve, New Media, Interactive TV: The Gold
`Rush Is On, pp. 27-29, Dec. 1992.
`Rosenthal, Steve, New Media, Mega Channels, pp. 36-46,
`Sep. 1993.
`Rothstein, Edward, Zhe NewYork ‘limes, ‘lechnology, Con-
`nections, Making th eInternet come to you, through ‘push’
`technology.. p. D5, Jan. 20, 1997.
`Internet
`Rutkowski, Ken, PowerAgent
`Introduces First
`‘Infomediary’ to Empower and Protect Consumers, Tech
`Talk New Story, Aug. 4, 1997 (Document from Internet).
`Sager,Ira (Edited by), Bits & Bytes, Business Week, Sep. 23,
`1996, p. 142E.
`Schlossstein, Steven, International Economy, America: The
`G7’s Comeback Kid, Jun./Jul. 1993.
`Schurmann, Jurgen, Pattern Classification, A Unified View
`of Statistical and Neural Approaches, John Wiley & Sons,
`Inc., 1996.
`Scnaumueller—Bichlet al., A Method of Software Protection
`Based on the Use of Smart Cards and Cryptographic Tech-
`niques, No date given.
`Serving the Community: A Public—Interest Vision of the
`National Information Infrastructure, Computer Profession-
`als for Social Responsibility, Executive Summary, no date.
`Shear, Solutions for CD-Rom Pricing and Data Security
`Problems, pages 530-533, CD Rom Yearbook 1988-1989
`(Microsoft Press 1988 or 1989).
`Smith et al., Signed Vector Timestamps: A Secure Protocol
`for Parital Order Time, CMU-93-116, School of Computer
`Science Carnegie Mellon University, Pittsburgh, Pennsyl-
`vania, Oct. 1991; version of Feb. 1993.
`Special Report, The Internet:Fulfilling the Promise The
`Internet: Bring Order From Chaos; Lynch, Clifford, Search
`the Internet; Resnick, Paul, Filtering Information on the
`Internet; Hearst, Marti A., Interfaces for Searching the Web;
`Stefik, Mark, Trusted Systems; Scientific American, Mar.
`1997, pp. 49-56, 62-64, 68-72, 78-81.
`Stefik, Internet Dreams: Archetypes, Myths, and Metaphors,
`Letting Loose the Light: Igniting Commerce in Electronic
`Publication, pp. 219-253, (1996) Massachusetts Institute of
`Technology.
`Stefik, Mark, Introduction to Knowledge Systems, Chapter 7,
`Classification, pp. 543-607, 1995 by Morgan Kaufmann
`Publisher, Inc.
`Stefik, Mark, Letting Loose the Light, Igniting Commercein
`Electronic Publication (1994, 1995) Palo Alto, California.
`Stephenson, Tom, Advanced Imaging, The Info Infrastruc-
`ture Initiative: Data SuperHighways and You, pp. 73-74,
`May 1993.
`Sterling, Bruce, Literary freeware: Not for Commercial Use,
`remarks at Computers, Freedom and Privacy Conference IV,
`Chicago, Mar. 26, 1994.
`
`

`

`5,943,422
`Page 6
`
`Struif, Bruno The Use of Chipcards for Electronic Signa-
`tures and Encryption in: Proceedings for the 1989 Confer-
`ence on VSLI and Computer Peripherals, IEEE Computer
`Society Press, 1989, pp. 4/155-4/158.
`Templar Overview,: Prementos, Internet info@templar.net,
`4 pages.
`Templar Software and Services: Secure, Reliable, Stan-
`dards—Based EDI Over the Internet, Prementos, Internet
`info@templar.net, 1 page.
`The 1:1 Future of the Electronic Marketplace: Return to a
`Hunting and Gathering Society, 2 pages, no date.
`The Benefits of ROI For Database Protection and Usage
`Based Billing (Personal Library Software, 1987 or 1988).
`The New Alexandria No. 1, Alexandria Institute, pp. 1-12,
`Jul./Aug. 1986.
`Tygar et al., Cryptography: It’s Not Just For Electronic Mail
`Anymore, CMU-—CS—93-107, School of Computer Science
`Carnegie Mellon University, Pittsburgh, Pennsylvania, Mar.
`1, 1993.
`Tygar et al., Dyad: A System for Using Physically Secure
`Coprocessors, School of Computer Science, Carnegie Mel-
`lon University, Pittsburgh, PA 15213 (May 1991).
`Valovi, T., Telecommunications, The Role of Computer
`Networking in the Emerging Virtual Marketplace, pp.
`40-44.
`
`Voight, Joan, Beyond the Banner, Wired, Dec. 1996, pp. 196,
`200, 204.
`Vonder Haar, Steven, PowerAgent Launches Commercial
`Service, Inter@ctive Week, Aug. 4, 1997 (Document from
`Internet).
`
`Weber, Dr. Robert, Digital Rights Management Technolo-
`gies, Oct. 1995, 21 pages.
`Weber, Metering Technologies for Digital Intellectual Prop-
`erty, A Report to the International Federation of Reproduc-
`tion Rights Organisations, pp. 1-29, Oct. 1994, Boston, MA,
`USA.
`
`Weder, Adele, Life on the Infohighway, 4 pages, no date.
`Weingart, Physical Security for the :ABYSS System, IBM
`Thomas J. Watson Research Center, Yorktown Heights, New
`York 10598 (1987).
`Weitzner, Daniel J., A Statement on EFF’s Open Platform
`Campaign as of Nov., 1993, 3 pages.
`WEPIN Store, Stenography (Hidden Writing) (Common
`Law 1995).
`White, ABYSS: A Trusted Architecture for Software Pro-
`tection, IBM Thomas J. Watson Research Center, Yorktown
`Heights, New York 10598 (1987).
`Wired 1.02, Is Advertising Really dead?, Part 2, 1994.
`World Wide Web FAQ, Howcan I put an access counter on
`my home page?, 1 page, 1996.
`XIWTCross Industry Working Team, 5 pages, Jul. 1994.
`Yee, Using Secure Coprocessors, CMU-CS-94-149,
`School of Computer Science, Carnegie Mellon University
`Pittsburgh, PA15213.
`Yellin, F. Low Level Security in Java, 8 pages.
`E. Milbrandt, “Stenography Info and Archive”, 1996.
`M. Kohntopp, “Sag’s durch die Blume’, Apr. 1996,
`marit@schulung.netuse.de.
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 1 of 30
`
`5,943,422
`
`al‘Sid 9EL
`
`XO8dOLLASFIdNVX3
`
`
`
`LNAWSASVNVWSLHOIY
`
`HLIMYSAVIdVIGSIN31dNVXA
`
`DIHdVYDONVDALS
`
`VEDld
`
`
`
`
`
`SLHDIYDIHdVYDONVDALSHLIM
`
`LNSWS95VNVAN
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`ATdNVXS
`
`Sheet 2 of 30
`
`5,943,422
`
`
`
`
`
`INAWOVNVWSLHOIYDIHAVHOONVOSLS67HLIMHOAS1dWvxa!GI‘Sid
`
`~'
`
`WEFILODE
`
`
`
`
`
`LNAWADVNVIWSLHDIYOIHDVYSONVDALS
`
`
`
`HLIMY3SAI5934O10VY
`
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 3 of 30
`
`5,943,422
`
`
`
`
`
`JIHdVEHDONVOSLSHLIMYSCHOOSYGNVVEANVOAIdNVXa
`
`
`
`LNSWS9DVNVISLHSIY
`
`dt“Sis
`
`

`

`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 4 of 30
`
`5,943,422
`
`
`
`
` “
`
`126 O 01000411......
`
`
`
`FIG. 2
`
`EXAMPLE STEGANOGRAPHICALLY
`ENCODING ELECTRONIC CONTENTSIN AN IMAGE
`
`

`

`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 5 of 30
`
`5,943,422
`
`ANALOG
`SIGNAL
`
`SIGNAL
`
`STEGANO-
`GRAPHIC
`DECODER
`
`RIGHTS
`MANAGEMENT
`PROCESSOR
`
`CONTROL
`
`FIG. 3
`
`EXAMPLE STEGANOGRAPHIC
`DECODER AND RIGHTS MANAGEMENT PROCESSOR
`
`

`

`Aug.24, 1999
`
`Sheet 6 of 30
`
`5,943,422
`
`U.S. Patent
`
`901
`
`GAGOONSATIVOIHdVHDONVDSALSdddOSIOH.LNOD
`
`
`DINOY.LOS713JOAsnTATOCGNVDNINIVLEO3IdNVXa("O|pt
`JOVINVNIHLIMpea----,Ofset
`
`Pv‘SIssetQO<<—SiO|9|9NISS390Hd9e1
`YaAISOSY°NOISIASTSL
`|LNaWSDVNVWipoSLHDIY
`
` !I|||iONIGOOACSIHDVHODONVOIALS
`
`SNISSADOYUd=NOISUSANOOTVLIDICOLDOTWNY
`
`!i
`
`
`

`

`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 7 of 30
`
`5,943,422
`
`ANALOGOUT
`
`
`
`ON/OFFCONTROL
`
`EXAMPLE
`
`FIG.5A
`
`ZOo
`
`Oa
`
`tzx
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 8 of 30
`
`5,943,422
`
`LINODOWNY
`
`(Ga1gWVHOSaq)
`
`OXLNOODONMEWvHOosaa
`
`DOIVNYSidwvxa)«=JG*!)J4
`
`
`
`daTeNVeoOsad
`
`SOTVNY
`
`<(aa1gWvyOS)
`NIDOWNY
`
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 9 of 30
`
`JS‘Sls
`
`5,943,422
`
`
`
`
`
`ALIWNOASGN3-O1L-GN3SDYXOANAOLSALVOIsILYADAOASN
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 10 of 30
`
`5,943,422
`
`
`
`LNOSOTWNYWWd/OSLN
`
`gs‘Sis
`
`
`
`
`
`ATIVIIHdVYEDONVOALSONIOYOIN]YOSONILNIYNdYSONISAO3SN
`
`
`
`STOYULNOSLNAWADVNVWSLHDIYGAGOON3
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 11 of 30
`
`5,943,422
`
`
`
`
`
`
`
`
`
`NOILIGIYLSIADOTVNV-OL-IVLIDIG-OL-DOTVWNVATIdINVX>
`
`
`
`
`
`4S‘Sls
`
`OIHdVYHDONVDALS
`
`ACOONA
`
`DOWNY
`
`TWNDIS
`
`
`
`

`

`5,943,422
`
`
`
`
`
`
`
`
`
`FIG.5FEXAMPLEDIGITAL-TO-ANALOG-TODIGITALDISTRIBUTION
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 12 of 30
`
`100J
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 13 of 30
`
`5,943,422
`
`
`
`SNOILYOdINSLNOO
`
`(S)9E1
`
`SSLANIW
`
`\
`
`I''!''1tIi'ttl4UtIiI'{I''I'|l'
`
`
`
`(g)9¢h(S)SEL(s)9eL(e)9EL
`
`
`
`(s)9zL($)921(sjozt
`
`
`TWNOILVZINVDHOIN3H345109*})i-4j
`.
`INSH34sI0YOdSAUNLONYLS
`
`NOLLVINASSddSYNLVvS4
`
`FIAOWSO1SSH|cyoyjy|FHLJe4s
`QLzozBle
`
`(e)ezl
`
`OSALS
`
`TANNVHD
`
`
`
`v2
`
`2|ez!
`
`O22
`
`TIVYL!bMSTIVELL
`LNALNOO
`TANNVHO
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 14 of 30
`
`5,943,422
`
`OzhHOW
`bossy
`
`Ltd}
`
`DOWNY
`
`TWNOIS
`
`Ino
`
`| |I|
`
`—_-d
`
`||1|||VY|ib-—-—-—-sy|abyII|||
`i;|wii||1|!!OOTWNY
`Y.,
`
`
`
`WHOASNVHLMoNIaTaWveos!7]WHLOAdsOIHAVHDONVOSLS—WNodIsWuLOads
`
`|_HO/ONW|_PHOSSNYHL3QOONS
`ASHAANIOLDOTYNY
`
`
`
`ONIGOONSCIHdVEDONVSALS
`
`
`
`QSaTIVLAGJIdWVX3Vz"E)I4
`
`Ov
`
`LW
`
`
`
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 15 of 30
`
`
`
`
`
`O4NITOH.LNODOIHAVHYDONYDALSTWdLoadsIdAHO30
`WLIDId 9drper
`
`!gjdoogdWYHOASNVYLLaNaNG
`
`9AM
`
`SAaAay
`
`5,943,422
`
`
`
`SNIGODSdDIHdVHYDONVOSALS
`
`QaTIVLAdAdNVXSgz"EIS
`
`CGV
`
`COP
`
`Odor
`
`DOTWNY
`
`OL
`
`WLDId
`
`NOISHAANOD
`
`cOP
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 16 of 30
`
`5,943,422
`
`
`
`
`
`—~——----_—_————-+—77PSccct--——-——
`
`
`
`
`
`tJ
`
`i_]
`
`tJ
`
`THESn———-~=
`
`
`
`
`
`IWNSISGACOONAATIVIIHAVHDONVDSALS
`
`
`
`dOMIANIVNOGAONSNDAYSSdNVXS8"Ey
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 17 of 30
`
`5,943,422
`
`=
`
`
`
`Ma
`
`MaTANNVHO
`
`DIHdVHDONVOALS
`
`
`
`VLVdDNIGOONA
`
`alwa
`
`
`
`ONIGOONADIHdVYDONVDALSALVYVLVGFTIEVIYVAAIdNVX436"E\J4
`
`
`
`
`
`
`
`
`
`
`
`TANNVH9SHLOIMGONVSGSLIIAITVNIHLIM
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 18 of 30
`
`5,943,422
`
`qo0e8
`GSLIANTVNIHLIMDNIGOONASIHGVHDONVOALSFIdINVXAO]"EIS
`
`
`
`
`
`
`TANNVHDHLIMONVS
`
`
`
`woosjo9g4008[008100g4O0s(gel
`
`(z)9¢k
`
`
`
`
`
`Boog40080089008
`
`3800
`
`JAENNVHO
`
`Ms
`
`HLIMONVESNIGOON
`
`DIHDVHDONVDALS
`
`Ma
`
`
`

`

`5,943,422
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 19 of 30
`
`104 FIG.
`
`10A
`
`136(1)
`
`=So
`oO
`co
`
`

`

`PUBLIC HEADER
`
`PRIVATE HEADER
`
`PRIVATE BODY (METHODS)
`
`PERMISSIONS RECORDS
`
`KEY BLOCK(S) _
`
`ANALOG DEVICE
`CONTROL SET
`
`136e
`
`REFERENCE TO EXTERNAL
`
`136f
`
`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 20 of 30
`
`5,943,422
`
`136
`
`\
`
`136x
`
`CONTROL SET
`
`FIG. 11. exampLe STEGANOGRAPHICALLY
`ENCODED ORGANIZATIONAL STRUCTURE
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 21 of 30
`
`5,943,422
`
`Ove8teote
`
`aayYasnul
`
`
`
`AW1dS10TOXLNOO|/HOSNaS
`
`SdSmyvads
`
`vee
`
`OLE
`
`TANNWHD9
`
`f-OV
`
`olanyv
`
`Wd/OS.LN
`
`YSCOON3
`
`O0&?
`
`a
`
`|NOILOaLOud|wiginaino|wuld
`
`Wa4in@
`
`AYOWSW
`
`AHOWAN
`
`dadsinadVsd\
`
`822-’ood
`
`\éZOL‘OOL
`
`dnA-yold
`
`0c%
`
`pOL
`
`YSAiud
`
`TICNidS
`
`eee
`5Add||HOSSS3OO0Ud|
`
`BEL'PZL
`
`ALIHNOSS||AYHONZW|HSV14
`
`Azam
`
`H3LSIDSY
`
`ANIDNAOLdAYO
`
`Z0z;ii[roeeee
`
`
`
`
`
`LNAINSSVNVWSLHDIdSIHDVYDONVDALSHLIMSONVIdd¥DINLOSTASdWVX3cl"EI
`
`
`
`
`
`
`
`
`
`

`

`302
`
`
`
`
`
`EXTRACT
`STEGANOGRAPHICALLY
`ENCODED DATA
`
`
`
`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 22 of 30
`
`5,943,422
`
`READ/PLAY
`
`300
`
`/
`
`APPLY
`RULES
`
`
`
`READ OUTPUT OF
`CD-ROM DECODER
`
`
`
`
`
`
`GET ORG
`STRUCTURE
`
`322
`
`BANDWITH
`AVAILABLE?
`
`
`
`FIG. 13 exampce CONTROL STEPS
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 23 of 30
`
`5,943,422
`
`302
`
`APPLY RULES
`
`a
`
`
`
`
`HAVE
`
`COMPLETE
`
`ORG STRUCT?
`
`
` DISABLE
`DEFAULT DISABLE PROCESS OPERATION
`
`
`
`
`WITH RESPECT
`TO RULES
`
`FIG. 13A exampce APPLY RULES ROUTINE
`
`

`

`U.S. Patent
`
`Aug. 24, 1999
`
`Sheet 24 of 30
`
` Q3HS3u43YODa1sODALS|SONY 00!
`
`SOTYNY3qOONzbowbaIWNDIS
`,104300030NI
`
`5,943,422
`
`
`
`
`
`
`
`INSW39ONVUYYHS3Y33HFIdNVXEpy]“1/4
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 25 of 30
`
`5,943,422
`
`
`
`
`
`NOLLNGIYLSICTWNOISDOTWNYSF1dNVX4
`
`VSLDIgOOYNY ONIGOON]
`
`20k
`
`CNAGVSH
`
`OOPSIHEVYHDONVOSLS
`
`
`
`

`

`Aug.24, 1999
`
`Sheet 26 of 30
`
`5,943,422
`
`U.S. Patent
`
`cOl
`
`
`
`
`
`
`
`
`
`
`NOLLNGIYLSICIVNDISDOTVNYSAIdNVXA3
`
`‘Sid
`
`gst
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 27 of 30
`
`5,943,422
`
`SOIWNYf-TWNODIS SNIGOONA
`
`
`
`
`
`TWALSIG-OLDOTVNVATdNVXS
`
`NOILLNSIELSIG
`
`
`
`OSt“Sis
`
`SINDVHDONVOSALS
`
`
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 28 of 30
`
`
`
`5,943,422
`
`
`
`TWALIDId-OL-DOTIVNYJIdWVX3
`
`NOILNAlYLsid
`
`asl
`
`‘Sis
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 29 of 30
`
`540
`
`5,943,422
`
`
`
`
`
`FIG.15EEXAMPLEDIGITAL-TO-ANALOGDISTRIBUTION
`
`124A102
`
`

`

`U.S. Patent
`
`Aug.24, 1999
`
`Sheet 30 of 30
`
`‘Sls
`
`
`ASt
`
`5,943,422
`
`
`
`NOLLNEIYLSIGDOTVNV-OL-1WLIDIC
`
`

`

`5,943,422
`
`1
`STEGANOGRAPHIC TECHNIQUES FOR
`SECURELY DELIVERING ELECTRONIC
`DIGITAL RIGHTS MANAGEMENT
`CONTROL INFORMATION OVER
`INSECURE COMMUNICATION CHANNELS
`
`CROSS REFERENCE TO RELATED
`APPLICATION
`
`This application is rclated to commonly assigned appli-
`cation Ser. No. 08/388,107 of Ginter et al., filed Feb. 13,
`1995, entitled “SYSTEMS AND METHODS FOR
`SECURE TRANSACTION MANAGEMENTAND ELEC-
`TRONIC RIGHTS PROTECTION”(attorney reference
`numbe

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket