throbber
Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 1 of 42 PageID #: 231
`
`
`
`
`
`
`
`
`
`Exhibit H
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 2 of 42 PageID #: 232
`111111
`1111111111111111111111111111111111111111111111111111111111111
`US0083 70956B2
`
`c12) United States Patent
`Stefik et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,370,956 B2
`Feb.5,2013
`
`(54) SYSTEM AND METHOD FOR RENDERING
`DIGITAL CONTENT IN ACCORDANCE WITH
`USAGE RIGHTS INFORMATION
`
`(75)
`
`Inventors: Mark J. Stefik, Portola Valley, CA (US);
`Peter L. T. Pirolli, San Francisco, CA
`(US)
`
`(73) Assignee: ContentGuard Holdings, Inc.,
`Wilmington, DE (US)
`
`EP
`EP
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`3/1989 Chandra eta!.
`4,817,140 A
`5,204,961 A
`4/1993 Barlow
`2/1995 Barber eta!.
`5,390,297 A
`6,135,646 A
`10/2000 Kahn et al.
`
`FOREIGN PATENT DOCUMENTS
`0398492 A2
`1111990
`0588415 A1
`3/1994
`OTHER PUBLICATIONS
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl. No.: 13/584,782
`
`(22) Filed:
`
`Aug. 13, 2012
`
`(65)
`
`Prior Publication Data
`
`US 2012/0331569 Al
`
`Dec. 27, 2012
`
`(60)
`
`Related U.S. Application Data
`
`Continuation of application No. 11/304,793, filed on
`Dec. 16, 2005, now abandoned, which is a division of
`application No. 11/135,352, filed on May 24, 2005,
`now Pat. No. 7,266,529, which is a continuation of
`application No. 10/322,759, filed on Dec. 19, 2002,
`now Pat. No. 6,898,576, which is a continuation of
`application No. 09/778,001, filed on Feb. 7, 2001, now
`Pat. No. 6,708,157, which is a division of application
`No. 08/967,084, filed on Nov. 10, 1997, now Pat. No.
`6,236,971, which is a continuation of application No.
`08/344,760, filed on Nov. 23, 1994, now abandoned.
`
`(51)
`
`(52)
`(58)
`
`Int. Cl.
`G06F 7104
`(2006.01)
`U.S. Cl. ......................................................... 726/29
`Field of Classification Search ........................ None
`See application file for complete search history.
`
`Non-Final Office Action dated Jun. 12, 2008 cited in U.S. Appl. No.
`111304,793.
`Final Office Action dated Nov. 14, 2008 cited in U.S. Appl. No.
`111304,793.
`Non-Final Office Action dated May 27, 2009 cited in U.S. Appl. No.
`111304,793.
`Final Office Action dated Jan. 22, 2010 cited in U.S. Appl. No.
`111304,793.
`Decision on Appeal dated Jun. 13, 2012 cited in U.S. Appl. No.
`111304,793.
`Kohl, John T. et al., "The Evolution of the Kerberos Authentication
`Service", Distributed Open Systems, IEEE, 1994, 18 pages.
`Primary Examiner- Brandon Hoffman
`(74) Attorney, Agent, or Firm- Marc S. Kaufman; Stephen
`M. Hertzler; Reed Smith LLP
`ABSTRACT
`(57)
`Methods, apparatus, and media for rendering digital content
`by at least one recipient computing device in accordance with
`usage rights information. An exemplary method comprises
`receiving the digital content by the at least one recipient
`computing device from at least one sending computing device
`only if the at least one recipient computing device has been
`determined to be trusted to receive the digital content from the
`at least one sending computing device, receiving, by the at
`least one recipient computing device, a request to render the
`digital content, determining, based on the usage rights infor(cid:173)
`mation, whether the digital content may be rendered by the at
`least one recipient computing device, and rendering the digi(cid:173)
`tal content, by the at least one recipient computing device,
`only if it is determined that the content may be rendered by the
`at least one recipient computing device.
`18 Claims, 13 Drawing Sheets
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 3 of 42 PageID #: 233
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 1 of 13
`
`US 8,370,956 B2
`
`FIG. 1
`
`Creator Creates A
`Digital Work
`
`v-101
`
`Usage Rights Attached To
`Digital Work and
`Deposited In Repository 1
`
`v-1 02
`
`Repository 2 Initiates A
`Session With Repository 1
`
`i-.,.--1 03
`
`Repository 2 Requests
`Access To Digital Work For v-1 04
`A Stated Purpose
`
`Repository 1 Checks Usage
`Rights of Digital Work for
`Determined If Access May
`Be Granted
`I
`
`Access Denied
`
`Access Granted
`
`r-_...-~ 105
`
`[107
`
`Repository 1
`Terminates Session
`with Error
`
`_..--106
`
`Repository 1 Transmits
`Digital Work To
`Repository 2
`
`Repository 1 and 2 Each
`Generate Billing
`Information And Transmit
`To Credit Server
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 4 of 42 PageID #: 234
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 2 of 13
`
`US 8,370,956 B2
`
`FIG. 2
`
`:
`: Master
`l Repositorv 1
`,.,--!
`I
`I
`~
`J
`I
`............................... --- ...........................
`~
`204-·~
`..-205
`,...---
`---
`-~~ ... ,
`I v
`"' ~
`I
`' ' --- '"
`
`r·--------·-------,
`I
`I
`I
`I
`I
`!
`
`I
`
`I
`
`, }
`
`(
`
`~# -"
`
`~~
`
`---
`
`Repository
`
`l 201
`
`FIG. 3
`
`205" I
`I ,.1-.,
`"
`
`l
`
`i
`!
`I
`I
`I
`I
`
`I
`\
`\
`l
`I
`
`I
`I
`
`.... _ ..
`
`t
`
`\
`\
`
`Authorization
`Repository
`l 202
`
`/205
`
`I
`I
`I
`_,A . .,,
`
`'
`
`I
`I
`I
`
`I
`i
`I
`
`\
`
`'
`
`I
`\
`I
`I
`I
`I
`{
`I
`'--~~
`
`Rendering
`Repository
`l 203
`
`302 ',
`(
`..\...
`' I
`i
`I
`
`~ '· '
`
`I
`
`I
`I
`J
`
`Repository
`
`I
`I
`I
`
`I
`f
`
`I
`\
`
`'-._ .. I
`
`\
`201
`
`Credit ~ 301
`Server
`
`_.----
`
`,...
`
`·' \
`~ ........ ~--
`
`. 304
`
`--- ·-
`---
`... , I
`/
`v
`...... _ ......
`~----·-"'" ""
`
`r - - - - - - - - - - - - - - - - ,
`I
`'
`!
`Billing
`! Clearinghouse !
`303 _.. ~
`:
`~---------------~
`
`I
`
`...... 1
`
`~
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 5 of 42 PageID #: 235
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 3 of 13
`
`US 8,370,956 B2
`
`FIG. 4A
`
`r------------------------~
`I
`I
`i
`I
`I
`I
`1
`:
`I
`I
`I
`
`Printer
`Repository
`
`Print Device
`
`1-403 .
`L 402
`------------,-----~
`\
`
`Repository
`
`._..../"- 404
`
`"- 401
`
`FIG. 48
`
`414
`)
`
`Credit
`Server
`
`411
`)
`
`Display/
`Execution
`Repository
`
`---410
`!'
`, - - - - - - - - - - - - - - - - - - - - - - - -J - - - - - - - - - - - ,
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`t ____ ·---· ·--- ··--· ---- ·---· ---- ·---· ---- ·--·· ··-· ···-· .... ··-·· ··-· ·-·-· ·-·- ·--·· .. ··-·· ··-· ·-··· ·-·· ··-·· ··-· ·-··· ·-·· ·---· ··-- ·--·· ··-· ·-·-· ···- ··-·· ··-· ·-·-· ···- .... J
`
`412--.__
`
`Display
`Engine
`
`i - -
`
`;-413
`
`Execubon
`Engine
`
`Repository V 415
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 6 of 42 PageID #: 236
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 4 of 13
`
`US 8,370,956 B2
`
`FIG. 5
`
`0
`
`20,000
`10,000
`I
`Story A
`
`30,000
`
`)
`510
`
`40,000
`
`60,000
`
`80,000
`
`90,0 00
`
`50,000
`I
`Story B
`
`)
`512
`
`70,000
`I
`StoryC
`
`~
`513
`
`Ad
`
`)
`511
`
`FIG. 6
`
`0
`
`1,500
`
`10,000
`
`30,000
`
`25,000
`
`Text
`
`)
`614
`
`Photo
`
`)
`615
`
`Graphics
`
`)
`616
`
`Sidebar
`
`\
`617
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 7 of 42 PageID #: 237
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 5 of 13
`
`US 8,370,956 B2
`
`FIG. 7
`
`700
`~
`
`Identifier
`
`Rights Portion
`
`Parent Pointer
`
`v 701
`Starting Address v 702
`703
`length ~
`v 704
`L..-r- 705
`L..-r- 706
`
`Child Pointer
`
`r
`L-....---------'1 ~ 706
`
`Child Pointer
`
`_
`
`FIG. 8
`
`~820
`
`d-b lock
`(Story A)
`
`821 J
`
`FIG. 9
`
`d-block
`(Ad)
`
`822
`
`d-block
`(Story B)
`
`d-block
`(Story C)
`
`823
`
`824
`
`821
`
`d-block
`(Text)
`
`925 .-?
`
`-· 926
`
`d-block
`(Graphics)
`
`d-block
`{Sidebar)
`
`928
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 8 of 42 PageID #: 238
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 6 of 13
`
`US 8,370,956 B2
`
`FIG. 10
`
`Right
`Code
`
`f
`1050
`
`Status
`Information
`
`f
`1052
`
`FIG. 14
`
`Right
`
`-1450
`
`Transactional
`Component
`
`1451
`
`Specification
`Component
`
`1452
`
`Copy Count
`
`~
`1453
`
`Time
`
`1455
`
`Control
`
`1457
`
`1454
`
`Fees I Incentives
`
`Access
`
`1456
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 9 of 42 PageID #: 239
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 7 of 13
`
`US 8,370,956 B2
`
`FIG. 11
`Identifier (Magazine)
`
`Startrng Address (0)
`
`Length (100,000)
`Rights Portion
`(PRINT~ VIEW)
`
`Parent Pointer
`
`Child Pointers
`f
`
`i
`
`root
`d-block
`1101
`..../
`
`Identifier (Article 1)
`
`•
`
`Starting Address {0}
`
`Length (25,000)
`Rights Portion
`{PRINT, VIEW)
`
`Parent Pointer
`
`Child Pointers
`
`Identifier (Article 2)
`*
`Starting Address (25,001)
`
`Length (25,000)
`Rights Portion
`(PRINT, VIEW)
`
`Parent Pointer
`
`Child Pointers
`
`(
`
`-
`
`d-block
`1102
`
`Identifier (Article 3)
`
`•
`
`d-block__j
`1105
`
`Identifier (Article 4}
`
`•
`
`Starting Address (50,001}
`
`Starting Address (75,001)
`
`Length (25,000)
`Rights Portion
`(VIEW)
`
`Parent Pointer
`
`Child Pointers
`
`d~block__j
`1103
`
`Length {25,000)
`Rights Portion
`(PRINT (Fee))
`
`Parent Pointer
`
`Child Pointers
`d~block
`)
`1104-
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 10 of 42 PageID #: 240
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 8 of 13
`
`US 8,370,956 B2
`
`FIG. 12
`
`---1200
`r··················································································/..···r
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`_J
`L~
`
`Clock
`
`)
`1205
`
`Processing
`Element
`
`Processor
`Memory
`
`---~-- ~~~~-- ~-~-~-
`
`r---~2~~ j ___ [_~~~ _ _L~-1207
`
`External
`Interface
`
`)
`1206
`
`1203
`
`I
`I Descriptor
`Content
`Storage
`Storage
`I
`I
`L-------------------J
`
`I
`I
`I
`I
`
`1204
`
`FIG~ 13
`
`User
`Interface
`
`~1305
`
`Repository Specific
`Software
`Function I Services
`
`v-1304
`
`Usage Transaction ~1303
`Handlers
`
`Core Repository
`Services f Transaction
`Handling
`
`Operating
`System
`
`"" 1302
`
`~
`
`.,--1301
`
`Identification
`Certificates
`
`~1306
`
`-
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 11 of 42 PageID #: 241
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 9 of 13
`
`US 8,370,956 B2
`
`FIG. 15
`1501 ......._. Digital Work Rtghts: = (Rights*)
`1502 -
`Right: o; (Right-Code {Copy-Count} {Control-spec} {Time-Spec}
`{Access-Spec} fFee-3pec})
`1503 ......_ Right-Code:::: Render-Code• Transport-Code • File-Management(cid:173)
`Code Derivative-Works-Code • Configuration-Code
`1504 - - Render-Code: ;::::
`[Play: {Player: Player-ID} • Print: {Printer: Printer-ID}]
`1505-- Transport-Code: =[Copy Transfer • Loon {Remaining-Rights:
`Next-Set-of-Rights}] {(Next-Copy-Rights: Next-Set.-of-Rights)}
`1506- File-Management-Code:
`=Backup {Back-Up-.Copy-Rights:
`Next-Set-of-Rights} Restore Delete Folder
`• Directory {Name: Hide-Local Hide-Remote}
`{Parts: Hide-Local. Hide-Remote}
`1507 .....-- Derivative-Works..code: = [Extract • Embed Edit {Process:
`Process-ID}] {Next-Copy-Rights:
`Next-Set-of Rights}
`1508 -Configuration--Code: = Install • Uninstall
`1509 -Next..Set--of-Rights: ={(Add: Set-of~Rights)} {(Delete:
`Set-of-Rights)} {(Replace: Set-of~Righ1s)} {(Keep: Set-of-Rights)}
`151 0 -Copy-Count: "' {Coples:positlve-integer • 0 Unlimited}
`1511 -control-Spec:= {Control: {Restrictable • Unrestrictab!e}
`{Unchargeable • Chargeable})
`1512 _.__ Tlme-S~c:: ({Fixed-Interval• Sliding-Interval Meter-Time}
`Until: Expiration-Date)
`1513 ..-- Fixed-Interval: = From: Start-Time
`1514 - - Sliding-Interval: = Interval : Use-Duration
`1515 --Meter~ Time: = Time-Remaini09: Remaining--Use
`1516 ,....._Access-Spec: = ({SC: Securit}I-Ciass} {Authorization: Autilorization-ID"}
`{Other-Authorization: Authorization-! D .. } {Ticket: Ticket-10})
`1517 ....---Fee-Spec:= {Scheduled-Discount} Regular-Fee-Spec • Scheduled-Fee-Spec •
`Markup-Spec
`1518 .,...___Scheduled-Discount:= Scheduled-Discount: (Scheduled-Discount:
`(Time.Spec Percentage)*)
`1519 ---Regular-Fee--Spec: =({Fee: • Incentive:} [Per~Use-Spec Metered-Rate(cid:173)
`Spec i Best-Prlce..Spec • Ca!!-For-Prire-Spec}
`{Min: Money-Unit Per: Time-Spec} {Max:
`Money-Unit Per: Time-Spec} To: Account-10}
`1520 - - Per-Use-Spec: = PercUse: Money-Unit
`Metered-Rate-Spec: = Metered: Money-Unit Per: Time-Spec
`1521 -
`1522 ......_Best-Price-Spec:= Best-Price: Money-unit Max: Money-Unit
`1523- Cai!-For-Price-S~c: =Gall-For-Pries
`1524 -Scheduled-Fee-Spec: =(Schedule: (Time-Spec Regular-Fee-Spect)
`1525 .-...........Markup-Spec; = Markup: percentage To: Account-ID
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 12 of 42 PageID #: 242
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 10 of 13
`
`US 8,370,956 B2
`
`FIG. 16 REPOSITORY~1
`
`REPOSITORY -2
`
`Generate Registration
`Identifier
`
`.1601
`
`1602.
`
`Transmit Registration
`Message
`
`1 - - - - - '
`
`_..----1611
`,..............-----....J;........,
`Decrypt Performance
`Message
`
`~---,
`
`No
`
`No
`
`No
`
`Extract Repository~1
`Identifier
`
`l..............~
`
`Transmit Performance
`Message
`
`-1615
`
`Yes
`
`Transmit Nonce
`
`Repository-1
`Terminate Transaction
`
`Repository-2
`Terminate Transaction
`
`1616
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 13 of 42 PageID #: 243
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 11 of 13
`
`US 8,370,956 B2
`
`FIG. 17
`
`REPOSITORY~ 1
`
`Create a Session Key Pair
`
`Encrypt Second Key Using
`Public Key of Repository¥2
`
`1701
`
`1702
`
`1703
`
`REPOSITORY~2
`
`-1704
`
`Decrypt Second Key
`
`Generate Timestamp
`Exchange Message
`t-......----.-----:;'_ 1706
`
`1709
`
`1711
`
`Transmit Encrypted Second
`Key To Repository-2 1---;:--l
`
`Transmit Timestamp
`Exchange Message
`To Repository-1
`
`/1707
`
`~--------~~
`
`Generate Timestamp
`Message
`
`1708
`
`Transmit Timestamp
`Message To Repository~2
`
`Note Current Time
`
`Compare Current Time With
`Time From Repository-1
`
`Terminate Transaction
`
`Compute Adjusted
`Time Delta
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 14 of 42 PageID #: 244
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 12 of 13
`
`US 8,370,956 B2
`
`FIG. 18
`REQUESTER
`
`SERVER
`
`Server Generates
`Transaction Identifier
`1804
`No
`
`Tests Passed
`
`1806
`
`1810-,
`Decrement Copy
`Count For Right
`
`1-----<
`
`1809
`
`Yes
`
`1813
`
`No
`
`1805
`
`Decrement Copies In Use For
`Right By Number In Request
`
`1817
`
`1818
`
`1815
`
`1816
`
`Yes
`Perform Usage
`Transaction Steps
`
`1819
`
`For Metered Use, Subtract
`Initiate End-Charge Financial....,_ __ ---1 Elapsed Time From Remaining
`Transaction to Confirm Billing
`Use Time For Right
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 15 of 42 PageID #: 245
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 13 of 13
`
`US 8,370,956 B2
`
`FIG. 19
`
`{Cancel)
`1912~
`Fail
`
`More
`Data
`
`i r 19os
`
`Send
`Next Data r--- t
`I
`No
`I
`I
`More
`I
`I
`Data
`I
`I
`r---....J
`I
`I
`'
`I
`I
`I
`I
`'
`I
`I
`1 Ack
`
`I
`)
`1906:
`I
`I
`I
`I
`I
`Data 1
`1907 I
`I
`I
`I
`I
`I
`
`i
`
`I
`
`I
`I
`I
`I
`I Start
`I
`I 1903
`l------~
`I
`I
`!
`IT
`I
`I
`I
`I
`!
`1 Ack
`I
`I
`Line
`1
`1
`1
`1
`1901
`I
`I
`:
`------- ------------------'---------------~---------!------ ----------------- ------- ------------- ---- _ _l _________ --------
`i
`CLIENT
`I
`I
`I
`I
`I
`I
`I
`I
`'
`I
`I
`
`SERVER
`
`New
`Transaction
`
`19J2
`
`Wait For
`Transaction
`
`1~4
`
`1905 J
`
`.r
`
`1
`913
`
`•
`
`(Cancel)
`Fail
`!
`
`Wait For Ack
`
`)1914
`
`.......
`Commit Report
`To Credit Server L-
`•
`
`I
`I
`I
`I
`I
`
`Report Error
`To Credit Server
`}
`1915
`
`Done
`
`)
`1916
`
`l
`
`I
`!
`
`'
`
`Wait For
`Data
`f
`
`L
`
`I
`
`!
`I
`I
`i
`I
`i
`I
`
`1909
`~
`• I
`Data
`Received
`I _j More
`Data
`
`I
`I
`
`I
`I
`I
`I
`I
`Acknowledge _/ 1910
`
`No
`More
`Data
`
`I
`
`I
`I
`I
`Ll
`: 1916
`)
`I
`I
`Commit Report -
`To Credit Server
`! ;1918
`
`Report Error
`To Credit Server
`t
`Done
`
`v1919
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 16 of 42 PageID #: 246
`
`US 8,370,956 B2
`
`1
`SYSTEM AND METHOD FOR RENDERING
`DIGITAL CONTENT IN ACCORDANCE WITH
`USAGE RIGHTS INFORMATION
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a continuation of U.S. application Ser.
`No. 11/304,793, filed Dec. 16, 2005, which is a divisional of
`U.S. application Ser. No. 11/135,352, filed May 24, 2005,
`now U.S. Pat. No. 7,266,529, which is a continuation of U.S.
`application Ser. No. 10/322,759, filed Dec. 19, 2002, now
`U.S. Pat. No. 6,898,576, which is a continuation of U.S.
`application Ser. No. 09/778,001, filed Feb. 7, 2001, now U.S.
`Pat. No. 6,708,157, which is a divisional of U.S. application
`Ser. No. 08/967,084, filed Nov. 10, 1997, now U.S. Pat. No.
`6,236,971, which is a continuation of U.S. application Ser.
`No. 08/344,760, filed Nov. 23, 1994, now abandoned, the
`entire disclosures of all of which are hereby incorporated by
`reference herein.
`
`FIELD OF THE INVENTION
`
`The present invention relates to the field of distribution and
`usage rights enforcement for digitally encoded works.
`
`BACKGROUND OF THE INVENTION
`
`A fundamental issue facing the publishing and information
`industries as they consider electronic publishing is how to
`prevent the unauthorized and unaccounted distribution or
`usage of electronically published materials. Electronically
`published materials are typically distributed in a digital form
`and recreated on a computer based system having the capa(cid:173)
`bility to recreate the materials. Audio and video recordings,
`software, books and multimedia works are all being electroni(cid:173)
`cally published. Companies in these industries receive royal(cid:173)
`ties for each accounted for delivery of the materials, e.g. the
`sale of an audio CD at a retail outlet. Any unaccounted dis(cid:173)
`tribution of a work results in an unpaid royalty (e.g. copying
`the audio recording CD to another digital medium.)
`The ease in which electronically published works can be
`"perfectly" reproduced and distributed is a major concern.
`The transmission of digital works over networks is common(cid:173)
`place. One such widely used network is the Internet. The
`Internet is a widespread network facility by which computer
`users in many universities, corporations and government enti(cid:173)
`ties communicate and trade ideas and information. Computer
`bulletin boards found on the Internet and commercial net(cid:173)
`works such as CompuServ and Prodigy allow for the posting
`and retrieving of digital information. Information services
`such as Dialog and LEXIS/NEXIS provide databases of cur(cid:173)
`rent information on a wide variety of topics. Another factor
`which will exacerbate the situation is the development and
`expansion of the National Information Infrastructure (the
`Nil). It is anticipated that, as the Nil grows, the transmission
`of digital works over networks will increase many times over.
`It would be desirable to utilize the Nil for distribution of
`digital works without the fear of widespread unauthorized
`copying.
`The most straightforward way to curb unaccounted distri(cid:173)
`bution is to prevent unauthorized copying and transmission.
`For existing materials that are distributed in digital form,
`various safeguards arc used. In the case of software, copy
`protection schemes which limit the number of copies that can 65
`be made or which corrupt the output when copying is detected
`have been employed. Another scheme causes software to
`
`10
`
`2
`become disabled after a predetermined period of time has
`lapsed. A technique used for workstation based software is to
`require that a special hardware device must be present on the
`workstation in order for the software to run, e.g., see U.S. Pat.
`No. 4,932,054 entitled "Method and Apparatus for Protecting
`Computer Software Utilizing Coded Filter Network in Con(cid:173)
`junction with an Active Coded Hardware Device." Such
`devices are provided with the software and are commonly
`referred to as dongles.
`Yet another scheme is to distribute software, but which
`requires a "key" to enable its use. This is employed in distri(cid:173)
`bution schemes where "demos" of the software are provided
`on a medium along with the entire product. The demos can be
`15 freely used, but in order to use the actual product, the key must
`be purchased. These schemes do not hinder copying of the
`software once the key is initially purchased.
`A system for ensuring that licenses are in place for using
`licensed products is described in PCT Publication WO
`20 93/01550 to Griswold entitled "License Management System
`and Method." The licensed product may be any electronically
`published work but is most effective for use with works that
`are used for extended periods of time such as software pro(cid:173)
`grams. Griswold requires that the licensed product contain
`25 software to invoke a license check monitor at predetermined
`time intervals. The license check monitor generates request
`data grams which identify the licensee. The request data grams
`are sent to a license control system over an appropriate com(cid:173)
`munication facility. The license control system then checks
`30 the datagram to determine if the datagram is from a valid
`licensee. The license control system then sends a reply data(cid:173)
`gram to the license check monitor indicating denial or
`approval of usage. The license control system will deny usage
`35 in the event that request datagrams go unanswered after a
`predetermined period of time (which may indicate an unau(cid:173)
`thorized attempt to use the licensed product). In this system,
`usage is managed at a central location by the response data(cid:173)
`grams. So for example if license fees have not been paid,
`40 access to the licensed product is terminated.
`It is argued by Griswold that the described system is advan(cid:173)
`tageous because it can be implemented entirely in software.
`However, the system described by Griswold has limitations.
`An important limitation is that during the use of the licensed
`45 product, the user must always be coupled to an appropriate
`communication facility in order to send and receive data(cid:173)
`grams. This creates a dependency on the communication
`facility. So if the communication facility is not available, the
`licensed product carmot be used. Moreover, some party must
`50 absorb the cost of communicating with the license server.
`A system for controlling the distribution of digitally
`encoded books is embodied in a system available from VPR
`Systems, LTD. of St. Louis, Miss. The VPR system is self(cid:173)
`contained and is comprised of: (1) point of sale kiosks for
`55 storing and downloading ofbooks, (2) personal storage medi(cid:173)
`urns (cartridges) to which the books are downloaded, and (3)
`readers for viewing the book. In a purchase transaction, a
`purchaser will purchase a voucher card representing the
`desired book. The voucher will contain sufficient information
`60 to identify the book purchased and perhaps some demo(cid:173)
`graphic information relating to the sales transaction. To
`download the book, the voucher and the cartridge are inserted
`into the kiosk.
`The VPR system may also be used as a library. In such an
`embodiment, the kiosk manages the number of"copies" that
`may be checked out at one time. Further, the copy of the book
`is erased from the user's cartridge after a certain check-out
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 17 of 42 PageID #: 247
`
`US 8,370,956 B2
`
`10
`
`3
`time has expired. However, individuals cannot loan books
`because the cartridges may only be used with the owner's
`reader.
`The foregoing distribution and protection schemes operate
`in part by preventing subsequent distribution of the work.
`While this certainly prevents unauthorized distributions, it
`does so by sacrificing the potential for subsequent revenue
`bearing uses. For example, it may be desirable to allow the
`lending of a purchased work to permit exposure of the work to
`potential buyers. Another example would be to permit the
`creation of a derivative work for a fee. Yet another example
`would be to permit copying the work for a fee (essentially
`purchasing it). Thus, it would be desirable to provide flexibil-
`ity in how the owner of a digital work may allow it to be
`distributed.
`While flexibility in distribution is a concern, the owners of 15
`a work want to make sure they are paid for such distributions.
`In U.S. Pat. No. 4,977,594 to Shear, entitled "Database Usage
`Metering and Protection System and Method," a system for
`metering and billing for usage of information distributed on a
`CD-ROM is described. The system requires the addition of a 20
`billing module to the computer system. The billing module
`may operate in a number of different ways. First, it may
`periodically communicate billing data to a central billing
`facility, whereupon the user may be billed. Second, billing
`may occur by disconnecting the billing module and the user 25
`sending it to a central billing facility where the data is read and
`a user bill generated.
`U.S. Pat. No. 5,247,575, Sprague eta!., entitled "Informa(cid:173)
`tion Distribution System", describes an information distribu(cid:173)
`tion system which provides and charges only for user selected 30
`information. A plurality of encrypted information packages
`(IPs) are provided at the user site, via high and/or low density
`storage media and/or by broadcast transmission. Some of the
`IPs may be of no interest to the user. The IPs of interest are
`selected by the user and are decrypted and stored locally. The 35
`IPs may be printed, displayed or even copied to other storage
`media. The charges for the selected IP's are accumulated
`within a user apparatus and periodically reported by tele(cid:173)
`phone to a central accounting facility. The central accounting
`facility also issues keys to decrypt the IPs. The keys are 40
`changed periodically. If the central accounting facility has not
`issued a new key for a particular user station, the station is
`unable to retrieve information from the system when the key
`is changed.
`A system available from Wave Systems Corp. of Princeton, 45
`N.Y., provides for metering of software usage on a personal
`computer. The system is installed onto a computer and col(cid:173)
`lects information on what software is in use, encrypts it and
`then transmits the information to a transaction center. From
`the transaction center, a bill is generated and sent to the user. 50
`The transaction center also maintains customer accounts so
`that licensing fees may be forwarded directly to the software
`providers. Software operating under this system must be
`modified so that usage can be accounted.
`Known techniques for billing do not provide for billing of 55
`copies made of the work. For example, if data is copied from
`the CD-ROM described in Shear, any subsequent use of the
`copy of the information cannot be metered or billed. In other
`words, the means for billing runs with the media rather than
`the underlying work. It would be desirable to have a distribu- 60
`tion system where the means for billing is always transported
`with the work.
`
`SUMMARY OF THE INVENTION
`
`A method, system and software for associating usage rights
`with digital content is provided, including creating usage
`
`65
`
`4
`rights from a grammar, the usage rights specifYing a manner
`of use indicating purposes for which the digital content is
`used and/or distributed by an authorized party; associating
`the usage rights with a digital content; processing a usage
`transaction specifying the usage rights to determine if access
`to the digital content is granted; and storing the usage rights in
`a distributed repository. The usage rights also specifY one or
`more conditions which must be satisfied before the manner of
`use is exercised. The creating includes selecting symbols
`from a first set of predetermined symbols to define a valid
`sequence of symbols to indicate the manner of use, selecting
`one or more symbols from a second set of predetermined
`symbols to define a valid sequence of symbols to indicate the
`conditions.
`In further embodiments, a system for controlling the dis(cid:173)
`tribution and use of digital works using digital tickets is
`disclosed. A ticket is an indicator that the ticket holder has
`already paid for or is otherwise entitled to some specified
`right, product or service. In the present invention, a "digital
`ticket" is used to enable the ticket holder to exercise usage
`rights specifying the requirement of the digital ticket. Usage
`rights are used to define how a digital work may be used or
`distributed. Specific instances of usage rights are used to
`indicate a particular manner of use or distribution. A usage
`right may specify a digital ticket which must be present before
`the right may be exercised. For example, a digital ticket may
`be specified in a Copy right of a digital work, so that exercise
`of the Copy right requires the party that desires a copy of the
`digital work be in possession of the necessary digital ticket.
`After a copy of the digital work is successfully sent to the
`requesting party, the digital ticket is "punched" to indicate
`that a copy of the digital work has been made. When the ticket
`is "punched" a predetermined number of times, it may no
`longer be used.
`Digital works are stored in repositories. Repositories
`enforce the usage rights for digital works. Each repository has
`a "generic ticket agent" which punches tickets. In some
`instances only the generic ticket agent is necessary. In other
`instances, punching by a "special ticket agent" residing on
`another repository may be desired. Punching by a "special
`ticket agent" enables greater security and control of the digital
`work. For example, it can help prevent digital ticket forgery.
`Special ticket agents are also useful in situations where an
`external database needs to be updated or checked.
`A digital ticket is merely an instance of a digital work.
`Thus, a digital ticket may be distributed among repositories in
`the same fashion as other digital works.
`A digital ticket may be used in many commercial scenarios
`such as in the purchase of software and prepaid upgrades. A
`digital ticket may also be used to limit the number of times
`that a right may be exercised. For example, a user may pur(cid:173)
`chase a copy of a digital work, along with the right to make up
`to 5 Copies. In this case, the Copy right would have associated
`therewith a digital ticket that can be punched up to 5 times.
`Other such commercial scenarios will become apparent from
`the detailed description.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a flowchart illustrating a simple instantiation of
`the operation of the currently preferred embodiment of the
`present invention.
`FIG. 2 is a block diagram illustrating the various repository
`types and the repository transaction flow between them in the
`currently preferred embodiment of the present invention.
`
`

`

`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 18 of 42 PageID #: 248
`
`US 8,370,956 B2
`
`5
`FIG. 3 is a block diagram of a repository coupled with a
`credit server in the currently preferred embodiment of the
`present invention.
`FIGS. 4a and 4b are examples of rendering systems as may
`be utilized in the currently preferred embodiment of the
`present invention.
`FIG. 5 illustrates a contents file layout for a digital work as
`may be utilized in the currently preferred embodiment of the
`present invention.
`FIG. 6 illustrates a contents file layout for an individual 10
`digital work of the digital work of FIG. 5 as may be utilized in
`the currently preferred embodiment of the present invention.
`FIG. 7 illustrates the components of a description block of
`the currently preferred embodiment of the present invention.
`FIG. 8 illustrates a description tree for the contents file 15
`layout of the digital work illustrated in FIG. 5.
`FIG. 9 illustrates a portion of a description tree correspond(cid:173)
`ing to the individual digital work illustrated in FIG. 6.
`FIG. 10 illustrates a layout for the rights portion of a
`description block as may be utilized in the currently preferred 20
`embodiment of the present invention.
`FIG. 11 is a description tree wherein certain d-blocks have
`PRINT usage rights and is used to illustrate "strict" and
`"lenient" rules for resolving usage rights conflicts.
`FIG. 12 is a block diagram of the hardware components of 25
`a repository as are utilized in the currently preferred embodi(cid:173)
`ment of the present invention.
`FIG. 13 is a block diagram of the functional (logical)
`components of a repository as are utilized in the currently
`preferred embodiment of the present invention.
`FIG. 14 is diagram illustrating the basic components of a
`usage right in the currently preferred embodiment of the
`present invention.
`FIG. 15 lists the usage rights grammar of the currently
`preferred embodiment of the present invention.
`FIG. 16 is a flowchart illustrating the steps of certificate
`delivery, hotlist checking and performance testing as per(cid:173)
`formed in a registration transaction as may be performed in
`the currently preferred embodiment of the present invention.
`FIG. 17 is a flowchart illustrati

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket