`
`
`
`
`
`
`
`
`
`Exhibit H
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 2 of 42 PageID #: 232
`111111
`1111111111111111111111111111111111111111111111111111111111111
`US0083 70956B2
`
`c12) United States Patent
`Stefik et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,370,956 B2
`Feb.5,2013
`
`(54) SYSTEM AND METHOD FOR RENDERING
`DIGITAL CONTENT IN ACCORDANCE WITH
`USAGE RIGHTS INFORMATION
`
`(75)
`
`Inventors: Mark J. Stefik, Portola Valley, CA (US);
`Peter L. T. Pirolli, San Francisco, CA
`(US)
`
`(73) Assignee: ContentGuard Holdings, Inc.,
`Wilmington, DE (US)
`
`EP
`EP
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`3/1989 Chandra eta!.
`4,817,140 A
`5,204,961 A
`4/1993 Barlow
`2/1995 Barber eta!.
`5,390,297 A
`6,135,646 A
`10/2000 Kahn et al.
`
`FOREIGN PATENT DOCUMENTS
`0398492 A2
`1111990
`0588415 A1
`3/1994
`OTHER PUBLICATIONS
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl. No.: 13/584,782
`
`(22) Filed:
`
`Aug. 13, 2012
`
`(65)
`
`Prior Publication Data
`
`US 2012/0331569 Al
`
`Dec. 27, 2012
`
`(60)
`
`Related U.S. Application Data
`
`Continuation of application No. 11/304,793, filed on
`Dec. 16, 2005, now abandoned, which is a division of
`application No. 11/135,352, filed on May 24, 2005,
`now Pat. No. 7,266,529, which is a continuation of
`application No. 10/322,759, filed on Dec. 19, 2002,
`now Pat. No. 6,898,576, which is a continuation of
`application No. 09/778,001, filed on Feb. 7, 2001, now
`Pat. No. 6,708,157, which is a division of application
`No. 08/967,084, filed on Nov. 10, 1997, now Pat. No.
`6,236,971, which is a continuation of application No.
`08/344,760, filed on Nov. 23, 1994, now abandoned.
`
`(51)
`
`(52)
`(58)
`
`Int. Cl.
`G06F 7104
`(2006.01)
`U.S. Cl. ......................................................... 726/29
`Field of Classification Search ........................ None
`See application file for complete search history.
`
`Non-Final Office Action dated Jun. 12, 2008 cited in U.S. Appl. No.
`111304,793.
`Final Office Action dated Nov. 14, 2008 cited in U.S. Appl. No.
`111304,793.
`Non-Final Office Action dated May 27, 2009 cited in U.S. Appl. No.
`111304,793.
`Final Office Action dated Jan. 22, 2010 cited in U.S. Appl. No.
`111304,793.
`Decision on Appeal dated Jun. 13, 2012 cited in U.S. Appl. No.
`111304,793.
`Kohl, John T. et al., "The Evolution of the Kerberos Authentication
`Service", Distributed Open Systems, IEEE, 1994, 18 pages.
`Primary Examiner- Brandon Hoffman
`(74) Attorney, Agent, or Firm- Marc S. Kaufman; Stephen
`M. Hertzler; Reed Smith LLP
`ABSTRACT
`(57)
`Methods, apparatus, and media for rendering digital content
`by at least one recipient computing device in accordance with
`usage rights information. An exemplary method comprises
`receiving the digital content by the at least one recipient
`computing device from at least one sending computing device
`only if the at least one recipient computing device has been
`determined to be trusted to receive the digital content from the
`at least one sending computing device, receiving, by the at
`least one recipient computing device, a request to render the
`digital content, determining, based on the usage rights infor(cid:173)
`mation, whether the digital content may be rendered by the at
`least one recipient computing device, and rendering the digi(cid:173)
`tal content, by the at least one recipient computing device,
`only if it is determined that the content may be rendered by the
`at least one recipient computing device.
`18 Claims, 13 Drawing Sheets
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 3 of 42 PageID #: 233
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 1 of 13
`
`US 8,370,956 B2
`
`FIG. 1
`
`Creator Creates A
`Digital Work
`
`v-101
`
`Usage Rights Attached To
`Digital Work and
`Deposited In Repository 1
`
`v-1 02
`
`Repository 2 Initiates A
`Session With Repository 1
`
`i-.,.--1 03
`
`Repository 2 Requests
`Access To Digital Work For v-1 04
`A Stated Purpose
`
`Repository 1 Checks Usage
`Rights of Digital Work for
`Determined If Access May
`Be Granted
`I
`
`Access Denied
`
`Access Granted
`
`r-_...-~ 105
`
`[107
`
`Repository 1
`Terminates Session
`with Error
`
`_..--106
`
`Repository 1 Transmits
`Digital Work To
`Repository 2
`
`Repository 1 and 2 Each
`Generate Billing
`Information And Transmit
`To Credit Server
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 4 of 42 PageID #: 234
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 2 of 13
`
`US 8,370,956 B2
`
`FIG. 2
`
`:
`: Master
`l Repositorv 1
`,.,--!
`I
`I
`~
`J
`I
`............................... --- ...........................
`~
`204-·~
`..-205
`,...---
`---
`-~~ ... ,
`I v
`"' ~
`I
`' ' --- '"
`
`r·--------·-------,
`I
`I
`I
`I
`I
`!
`
`I
`
`I
`
`, }
`
`(
`
`~# -"
`
`~~
`
`---
`
`Repository
`
`l 201
`
`FIG. 3
`
`205" I
`I ,.1-.,
`"
`
`l
`
`i
`!
`I
`I
`I
`I
`
`I
`\
`\
`l
`I
`
`I
`I
`
`.... _ ..
`
`t
`
`\
`\
`
`Authorization
`Repository
`l 202
`
`/205
`
`I
`I
`I
`_,A . .,,
`
`'
`
`I
`I
`I
`
`I
`i
`I
`
`\
`
`'
`
`I
`\
`I
`I
`I
`I
`{
`I
`'--~~
`
`Rendering
`Repository
`l 203
`
`302 ',
`(
`..\...
`' I
`i
`I
`
`~ '· '
`
`I
`
`I
`I
`J
`
`Repository
`
`I
`I
`I
`
`I
`f
`
`I
`\
`
`'-._ .. I
`
`\
`201
`
`Credit ~ 301
`Server
`
`_.----
`
`,...
`
`·' \
`~ ........ ~--
`
`. 304
`
`--- ·-
`---
`... , I
`/
`v
`...... _ ......
`~----·-"'" ""
`
`r - - - - - - - - - - - - - - - - ,
`I
`'
`!
`Billing
`! Clearinghouse !
`303 _.. ~
`:
`~---------------~
`
`I
`
`...... 1
`
`~
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 5 of 42 PageID #: 235
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 3 of 13
`
`US 8,370,956 B2
`
`FIG. 4A
`
`r------------------------~
`I
`I
`i
`I
`I
`I
`1
`:
`I
`I
`I
`
`Printer
`Repository
`
`Print Device
`
`1-403 .
`L 402
`------------,-----~
`\
`
`Repository
`
`._..../"- 404
`
`"- 401
`
`FIG. 48
`
`414
`)
`
`Credit
`Server
`
`411
`)
`
`Display/
`Execution
`Repository
`
`---410
`!'
`, - - - - - - - - - - - - - - - - - - - - - - - -J - - - - - - - - - - - ,
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`t ____ ·---· ·--- ··--· ---- ·---· ---- ·---· ---- ·--·· ··-· ···-· .... ··-·· ··-· ·-·-· ·-·- ·--·· .. ··-·· ··-· ·-··· ·-·· ··-·· ··-· ·-··· ·-·· ·---· ··-- ·--·· ··-· ·-·-· ···- ··-·· ··-· ·-·-· ···- .... J
`
`412--.__
`
`Display
`Engine
`
`i - -
`
`;-413
`
`Execubon
`Engine
`
`Repository V 415
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 6 of 42 PageID #: 236
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 4 of 13
`
`US 8,370,956 B2
`
`FIG. 5
`
`0
`
`20,000
`10,000
`I
`Story A
`
`30,000
`
`)
`510
`
`40,000
`
`60,000
`
`80,000
`
`90,0 00
`
`50,000
`I
`Story B
`
`)
`512
`
`70,000
`I
`StoryC
`
`~
`513
`
`Ad
`
`)
`511
`
`FIG. 6
`
`0
`
`1,500
`
`10,000
`
`30,000
`
`25,000
`
`Text
`
`)
`614
`
`Photo
`
`)
`615
`
`Graphics
`
`)
`616
`
`Sidebar
`
`\
`617
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 7 of 42 PageID #: 237
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 5 of 13
`
`US 8,370,956 B2
`
`FIG. 7
`
`700
`~
`
`Identifier
`
`Rights Portion
`
`Parent Pointer
`
`v 701
`Starting Address v 702
`703
`length ~
`v 704
`L..-r- 705
`L..-r- 706
`
`Child Pointer
`
`r
`L-....---------'1 ~ 706
`
`Child Pointer
`
`_
`
`FIG. 8
`
`~820
`
`d-b lock
`(Story A)
`
`821 J
`
`FIG. 9
`
`d-block
`(Ad)
`
`822
`
`d-block
`(Story B)
`
`d-block
`(Story C)
`
`823
`
`824
`
`821
`
`d-block
`(Text)
`
`925 .-?
`
`-· 926
`
`d-block
`(Graphics)
`
`d-block
`{Sidebar)
`
`928
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 8 of 42 PageID #: 238
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 6 of 13
`
`US 8,370,956 B2
`
`FIG. 10
`
`Right
`Code
`
`f
`1050
`
`Status
`Information
`
`f
`1052
`
`FIG. 14
`
`Right
`
`-1450
`
`Transactional
`Component
`
`1451
`
`Specification
`Component
`
`1452
`
`Copy Count
`
`~
`1453
`
`Time
`
`1455
`
`Control
`
`1457
`
`1454
`
`Fees I Incentives
`
`Access
`
`1456
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 9 of 42 PageID #: 239
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 7 of 13
`
`US 8,370,956 B2
`
`FIG. 11
`Identifier (Magazine)
`
`Startrng Address (0)
`
`Length (100,000)
`Rights Portion
`(PRINT~ VIEW)
`
`Parent Pointer
`
`Child Pointers
`f
`
`i
`
`root
`d-block
`1101
`..../
`
`Identifier (Article 1)
`
`•
`
`Starting Address {0}
`
`Length (25,000)
`Rights Portion
`{PRINT, VIEW)
`
`Parent Pointer
`
`Child Pointers
`
`Identifier (Article 2)
`*
`Starting Address (25,001)
`
`Length (25,000)
`Rights Portion
`(PRINT, VIEW)
`
`Parent Pointer
`
`Child Pointers
`
`(
`
`-
`
`d-block
`1102
`
`Identifier (Article 3)
`
`•
`
`d-block__j
`1105
`
`Identifier (Article 4}
`
`•
`
`Starting Address (50,001}
`
`Starting Address (75,001)
`
`Length (25,000)
`Rights Portion
`(VIEW)
`
`Parent Pointer
`
`Child Pointers
`
`d~block__j
`1103
`
`Length {25,000)
`Rights Portion
`(PRINT (Fee))
`
`Parent Pointer
`
`Child Pointers
`d~block
`)
`1104-
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 10 of 42 PageID #: 240
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 8 of 13
`
`US 8,370,956 B2
`
`FIG. 12
`
`---1200
`r··················································································/..···r
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`_J
`L~
`
`Clock
`
`)
`1205
`
`Processing
`Element
`
`Processor
`Memory
`
`---~-- ~~~~-- ~-~-~-
`
`r---~2~~ j ___ [_~~~ _ _L~-1207
`
`External
`Interface
`
`)
`1206
`
`1203
`
`I
`I Descriptor
`Content
`Storage
`Storage
`I
`I
`L-------------------J
`
`I
`I
`I
`I
`
`1204
`
`FIG~ 13
`
`User
`Interface
`
`~1305
`
`Repository Specific
`Software
`Function I Services
`
`v-1304
`
`Usage Transaction ~1303
`Handlers
`
`Core Repository
`Services f Transaction
`Handling
`
`Operating
`System
`
`"" 1302
`
`~
`
`.,--1301
`
`Identification
`Certificates
`
`~1306
`
`-
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 11 of 42 PageID #: 241
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 9 of 13
`
`US 8,370,956 B2
`
`FIG. 15
`1501 ......._. Digital Work Rtghts: = (Rights*)
`1502 -
`Right: o; (Right-Code {Copy-Count} {Control-spec} {Time-Spec}
`{Access-Spec} fFee-3pec})
`1503 ......_ Right-Code:::: Render-Code• Transport-Code • File-Management(cid:173)
`Code Derivative-Works-Code • Configuration-Code
`1504 - - Render-Code: ;::::
`[Play: {Player: Player-ID} • Print: {Printer: Printer-ID}]
`1505-- Transport-Code: =[Copy Transfer • Loon {Remaining-Rights:
`Next-Set-of-Rights}] {(Next-Copy-Rights: Next-Set.-of-Rights)}
`1506- File-Management-Code:
`=Backup {Back-Up-.Copy-Rights:
`Next-Set-of-Rights} Restore Delete Folder
`• Directory {Name: Hide-Local Hide-Remote}
`{Parts: Hide-Local. Hide-Remote}
`1507 .....-- Derivative-Works..code: = [Extract • Embed Edit {Process:
`Process-ID}] {Next-Copy-Rights:
`Next-Set-of Rights}
`1508 -Configuration--Code: = Install • Uninstall
`1509 -Next..Set--of-Rights: ={(Add: Set-of~Rights)} {(Delete:
`Set-of-Rights)} {(Replace: Set-of~Righ1s)} {(Keep: Set-of-Rights)}
`151 0 -Copy-Count: "' {Coples:positlve-integer • 0 Unlimited}
`1511 -control-Spec:= {Control: {Restrictable • Unrestrictab!e}
`{Unchargeable • Chargeable})
`1512 _.__ Tlme-S~c:: ({Fixed-Interval• Sliding-Interval Meter-Time}
`Until: Expiration-Date)
`1513 ..-- Fixed-Interval: = From: Start-Time
`1514 - - Sliding-Interval: = Interval : Use-Duration
`1515 --Meter~ Time: = Time-Remaini09: Remaining--Use
`1516 ,....._Access-Spec: = ({SC: Securit}I-Ciass} {Authorization: Autilorization-ID"}
`{Other-Authorization: Authorization-! D .. } {Ticket: Ticket-10})
`1517 ....---Fee-Spec:= {Scheduled-Discount} Regular-Fee-Spec • Scheduled-Fee-Spec •
`Markup-Spec
`1518 .,...___Scheduled-Discount:= Scheduled-Discount: (Scheduled-Discount:
`(Time.Spec Percentage)*)
`1519 ---Regular-Fee--Spec: =({Fee: • Incentive:} [Per~Use-Spec Metered-Rate(cid:173)
`Spec i Best-Prlce..Spec • Ca!!-For-Prire-Spec}
`{Min: Money-Unit Per: Time-Spec} {Max:
`Money-Unit Per: Time-Spec} To: Account-10}
`1520 - - Per-Use-Spec: = PercUse: Money-Unit
`Metered-Rate-Spec: = Metered: Money-Unit Per: Time-Spec
`1521 -
`1522 ......_Best-Price-Spec:= Best-Price: Money-unit Max: Money-Unit
`1523- Cai!-For-Price-S~c: =Gall-For-Pries
`1524 -Scheduled-Fee-Spec: =(Schedule: (Time-Spec Regular-Fee-Spect)
`1525 .-...........Markup-Spec; = Markup: percentage To: Account-ID
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 12 of 42 PageID #: 242
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 10 of 13
`
`US 8,370,956 B2
`
`FIG. 16 REPOSITORY~1
`
`REPOSITORY -2
`
`Generate Registration
`Identifier
`
`.1601
`
`1602.
`
`Transmit Registration
`Message
`
`1 - - - - - '
`
`_..----1611
`,..............-----....J;........,
`Decrypt Performance
`Message
`
`~---,
`
`No
`
`No
`
`No
`
`Extract Repository~1
`Identifier
`
`l..............~
`
`Transmit Performance
`Message
`
`-1615
`
`Yes
`
`Transmit Nonce
`
`Repository-1
`Terminate Transaction
`
`Repository-2
`Terminate Transaction
`
`1616
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 13 of 42 PageID #: 243
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 11 of 13
`
`US 8,370,956 B2
`
`FIG. 17
`
`REPOSITORY~ 1
`
`Create a Session Key Pair
`
`Encrypt Second Key Using
`Public Key of Repository¥2
`
`1701
`
`1702
`
`1703
`
`REPOSITORY~2
`
`-1704
`
`Decrypt Second Key
`
`Generate Timestamp
`Exchange Message
`t-......----.-----:;'_ 1706
`
`1709
`
`1711
`
`Transmit Encrypted Second
`Key To Repository-2 1---;:--l
`
`Transmit Timestamp
`Exchange Message
`To Repository-1
`
`/1707
`
`~--------~~
`
`Generate Timestamp
`Message
`
`1708
`
`Transmit Timestamp
`Message To Repository~2
`
`Note Current Time
`
`Compare Current Time With
`Time From Repository-1
`
`Terminate Transaction
`
`Compute Adjusted
`Time Delta
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 14 of 42 PageID #: 244
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 12 of 13
`
`US 8,370,956 B2
`
`FIG. 18
`REQUESTER
`
`SERVER
`
`Server Generates
`Transaction Identifier
`1804
`No
`
`Tests Passed
`
`1806
`
`1810-,
`Decrement Copy
`Count For Right
`
`1-----<
`
`1809
`
`Yes
`
`1813
`
`No
`
`1805
`
`Decrement Copies In Use For
`Right By Number In Request
`
`1817
`
`1818
`
`1815
`
`1816
`
`Yes
`Perform Usage
`Transaction Steps
`
`1819
`
`For Metered Use, Subtract
`Initiate End-Charge Financial....,_ __ ---1 Elapsed Time From Remaining
`Transaction to Confirm Billing
`Use Time For Right
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 15 of 42 PageID #: 245
`
`U.S. Patent
`
`Feb.5,2013
`
`Sheet 13 of 13
`
`US 8,370,956 B2
`
`FIG. 19
`
`{Cancel)
`1912~
`Fail
`
`More
`Data
`
`i r 19os
`
`Send
`Next Data r--- t
`I
`No
`I
`I
`More
`I
`I
`Data
`I
`I
`r---....J
`I
`I
`'
`I
`I
`I
`I
`'
`I
`I
`1 Ack
`
`I
`)
`1906:
`I
`I
`I
`I
`I
`Data 1
`1907 I
`I
`I
`I
`I
`I
`
`i
`
`I
`
`I
`I
`I
`I
`I Start
`I
`I 1903
`l------~
`I
`I
`!
`IT
`I
`I
`I
`I
`!
`1 Ack
`I
`I
`Line
`1
`1
`1
`1
`1901
`I
`I
`:
`------- ------------------'---------------~---------!------ ----------------- ------- ------------- ---- _ _l _________ --------
`i
`CLIENT
`I
`I
`I
`I
`I
`I
`I
`I
`'
`I
`I
`
`SERVER
`
`New
`Transaction
`
`19J2
`
`Wait For
`Transaction
`
`1~4
`
`1905 J
`
`.r
`
`1
`913
`
`•
`
`(Cancel)
`Fail
`!
`
`Wait For Ack
`
`)1914
`
`.......
`Commit Report
`To Credit Server L-
`•
`
`I
`I
`I
`I
`I
`
`Report Error
`To Credit Server
`}
`1915
`
`Done
`
`)
`1916
`
`l
`
`I
`!
`
`'
`
`Wait For
`Data
`f
`
`L
`
`I
`
`!
`I
`I
`i
`I
`i
`I
`
`1909
`~
`• I
`Data
`Received
`I _j More
`Data
`
`I
`I
`
`I
`I
`I
`I
`I
`Acknowledge _/ 1910
`
`No
`More
`Data
`
`I
`
`I
`I
`I
`Ll
`: 1916
`)
`I
`I
`Commit Report -
`To Credit Server
`! ;1918
`
`Report Error
`To Credit Server
`t
`Done
`
`v1919
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 16 of 42 PageID #: 246
`
`US 8,370,956 B2
`
`1
`SYSTEM AND METHOD FOR RENDERING
`DIGITAL CONTENT IN ACCORDANCE WITH
`USAGE RIGHTS INFORMATION
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a continuation of U.S. application Ser.
`No. 11/304,793, filed Dec. 16, 2005, which is a divisional of
`U.S. application Ser. No. 11/135,352, filed May 24, 2005,
`now U.S. Pat. No. 7,266,529, which is a continuation of U.S.
`application Ser. No. 10/322,759, filed Dec. 19, 2002, now
`U.S. Pat. No. 6,898,576, which is a continuation of U.S.
`application Ser. No. 09/778,001, filed Feb. 7, 2001, now U.S.
`Pat. No. 6,708,157, which is a divisional of U.S. application
`Ser. No. 08/967,084, filed Nov. 10, 1997, now U.S. Pat. No.
`6,236,971, which is a continuation of U.S. application Ser.
`No. 08/344,760, filed Nov. 23, 1994, now abandoned, the
`entire disclosures of all of which are hereby incorporated by
`reference herein.
`
`FIELD OF THE INVENTION
`
`The present invention relates to the field of distribution and
`usage rights enforcement for digitally encoded works.
`
`BACKGROUND OF THE INVENTION
`
`A fundamental issue facing the publishing and information
`industries as they consider electronic publishing is how to
`prevent the unauthorized and unaccounted distribution or
`usage of electronically published materials. Electronically
`published materials are typically distributed in a digital form
`and recreated on a computer based system having the capa(cid:173)
`bility to recreate the materials. Audio and video recordings,
`software, books and multimedia works are all being electroni(cid:173)
`cally published. Companies in these industries receive royal(cid:173)
`ties for each accounted for delivery of the materials, e.g. the
`sale of an audio CD at a retail outlet. Any unaccounted dis(cid:173)
`tribution of a work results in an unpaid royalty (e.g. copying
`the audio recording CD to another digital medium.)
`The ease in which electronically published works can be
`"perfectly" reproduced and distributed is a major concern.
`The transmission of digital works over networks is common(cid:173)
`place. One such widely used network is the Internet. The
`Internet is a widespread network facility by which computer
`users in many universities, corporations and government enti(cid:173)
`ties communicate and trade ideas and information. Computer
`bulletin boards found on the Internet and commercial net(cid:173)
`works such as CompuServ and Prodigy allow for the posting
`and retrieving of digital information. Information services
`such as Dialog and LEXIS/NEXIS provide databases of cur(cid:173)
`rent information on a wide variety of topics. Another factor
`which will exacerbate the situation is the development and
`expansion of the National Information Infrastructure (the
`Nil). It is anticipated that, as the Nil grows, the transmission
`of digital works over networks will increase many times over.
`It would be desirable to utilize the Nil for distribution of
`digital works without the fear of widespread unauthorized
`copying.
`The most straightforward way to curb unaccounted distri(cid:173)
`bution is to prevent unauthorized copying and transmission.
`For existing materials that are distributed in digital form,
`various safeguards arc used. In the case of software, copy
`protection schemes which limit the number of copies that can 65
`be made or which corrupt the output when copying is detected
`have been employed. Another scheme causes software to
`
`10
`
`2
`become disabled after a predetermined period of time has
`lapsed. A technique used for workstation based software is to
`require that a special hardware device must be present on the
`workstation in order for the software to run, e.g., see U.S. Pat.
`No. 4,932,054 entitled "Method and Apparatus for Protecting
`Computer Software Utilizing Coded Filter Network in Con(cid:173)
`junction with an Active Coded Hardware Device." Such
`devices are provided with the software and are commonly
`referred to as dongles.
`Yet another scheme is to distribute software, but which
`requires a "key" to enable its use. This is employed in distri(cid:173)
`bution schemes where "demos" of the software are provided
`on a medium along with the entire product. The demos can be
`15 freely used, but in order to use the actual product, the key must
`be purchased. These schemes do not hinder copying of the
`software once the key is initially purchased.
`A system for ensuring that licenses are in place for using
`licensed products is described in PCT Publication WO
`20 93/01550 to Griswold entitled "License Management System
`and Method." The licensed product may be any electronically
`published work but is most effective for use with works that
`are used for extended periods of time such as software pro(cid:173)
`grams. Griswold requires that the licensed product contain
`25 software to invoke a license check monitor at predetermined
`time intervals. The license check monitor generates request
`data grams which identify the licensee. The request data grams
`are sent to a license control system over an appropriate com(cid:173)
`munication facility. The license control system then checks
`30 the datagram to determine if the datagram is from a valid
`licensee. The license control system then sends a reply data(cid:173)
`gram to the license check monitor indicating denial or
`approval of usage. The license control system will deny usage
`35 in the event that request datagrams go unanswered after a
`predetermined period of time (which may indicate an unau(cid:173)
`thorized attempt to use the licensed product). In this system,
`usage is managed at a central location by the response data(cid:173)
`grams. So for example if license fees have not been paid,
`40 access to the licensed product is terminated.
`It is argued by Griswold that the described system is advan(cid:173)
`tageous because it can be implemented entirely in software.
`However, the system described by Griswold has limitations.
`An important limitation is that during the use of the licensed
`45 product, the user must always be coupled to an appropriate
`communication facility in order to send and receive data(cid:173)
`grams. This creates a dependency on the communication
`facility. So if the communication facility is not available, the
`licensed product carmot be used. Moreover, some party must
`50 absorb the cost of communicating with the license server.
`A system for controlling the distribution of digitally
`encoded books is embodied in a system available from VPR
`Systems, LTD. of St. Louis, Miss. The VPR system is self(cid:173)
`contained and is comprised of: (1) point of sale kiosks for
`55 storing and downloading ofbooks, (2) personal storage medi(cid:173)
`urns (cartridges) to which the books are downloaded, and (3)
`readers for viewing the book. In a purchase transaction, a
`purchaser will purchase a voucher card representing the
`desired book. The voucher will contain sufficient information
`60 to identify the book purchased and perhaps some demo(cid:173)
`graphic information relating to the sales transaction. To
`download the book, the voucher and the cartridge are inserted
`into the kiosk.
`The VPR system may also be used as a library. In such an
`embodiment, the kiosk manages the number of"copies" that
`may be checked out at one time. Further, the copy of the book
`is erased from the user's cartridge after a certain check-out
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 17 of 42 PageID #: 247
`
`US 8,370,956 B2
`
`10
`
`3
`time has expired. However, individuals cannot loan books
`because the cartridges may only be used with the owner's
`reader.
`The foregoing distribution and protection schemes operate
`in part by preventing subsequent distribution of the work.
`While this certainly prevents unauthorized distributions, it
`does so by sacrificing the potential for subsequent revenue
`bearing uses. For example, it may be desirable to allow the
`lending of a purchased work to permit exposure of the work to
`potential buyers. Another example would be to permit the
`creation of a derivative work for a fee. Yet another example
`would be to permit copying the work for a fee (essentially
`purchasing it). Thus, it would be desirable to provide flexibil-
`ity in how the owner of a digital work may allow it to be
`distributed.
`While flexibility in distribution is a concern, the owners of 15
`a work want to make sure they are paid for such distributions.
`In U.S. Pat. No. 4,977,594 to Shear, entitled "Database Usage
`Metering and Protection System and Method," a system for
`metering and billing for usage of information distributed on a
`CD-ROM is described. The system requires the addition of a 20
`billing module to the computer system. The billing module
`may operate in a number of different ways. First, it may
`periodically communicate billing data to a central billing
`facility, whereupon the user may be billed. Second, billing
`may occur by disconnecting the billing module and the user 25
`sending it to a central billing facility where the data is read and
`a user bill generated.
`U.S. Pat. No. 5,247,575, Sprague eta!., entitled "Informa(cid:173)
`tion Distribution System", describes an information distribu(cid:173)
`tion system which provides and charges only for user selected 30
`information. A plurality of encrypted information packages
`(IPs) are provided at the user site, via high and/or low density
`storage media and/or by broadcast transmission. Some of the
`IPs may be of no interest to the user. The IPs of interest are
`selected by the user and are decrypted and stored locally. The 35
`IPs may be printed, displayed or even copied to other storage
`media. The charges for the selected IP's are accumulated
`within a user apparatus and periodically reported by tele(cid:173)
`phone to a central accounting facility. The central accounting
`facility also issues keys to decrypt the IPs. The keys are 40
`changed periodically. If the central accounting facility has not
`issued a new key for a particular user station, the station is
`unable to retrieve information from the system when the key
`is changed.
`A system available from Wave Systems Corp. of Princeton, 45
`N.Y., provides for metering of software usage on a personal
`computer. The system is installed onto a computer and col(cid:173)
`lects information on what software is in use, encrypts it and
`then transmits the information to a transaction center. From
`the transaction center, a bill is generated and sent to the user. 50
`The transaction center also maintains customer accounts so
`that licensing fees may be forwarded directly to the software
`providers. Software operating under this system must be
`modified so that usage can be accounted.
`Known techniques for billing do not provide for billing of 55
`copies made of the work. For example, if data is copied from
`the CD-ROM described in Shear, any subsequent use of the
`copy of the information cannot be metered or billed. In other
`words, the means for billing runs with the media rather than
`the underlying work. It would be desirable to have a distribu- 60
`tion system where the means for billing is always transported
`with the work.
`
`SUMMARY OF THE INVENTION
`
`A method, system and software for associating usage rights
`with digital content is provided, including creating usage
`
`65
`
`4
`rights from a grammar, the usage rights specifYing a manner
`of use indicating purposes for which the digital content is
`used and/or distributed by an authorized party; associating
`the usage rights with a digital content; processing a usage
`transaction specifying the usage rights to determine if access
`to the digital content is granted; and storing the usage rights in
`a distributed repository. The usage rights also specifY one or
`more conditions which must be satisfied before the manner of
`use is exercised. The creating includes selecting symbols
`from a first set of predetermined symbols to define a valid
`sequence of symbols to indicate the manner of use, selecting
`one or more symbols from a second set of predetermined
`symbols to define a valid sequence of symbols to indicate the
`conditions.
`In further embodiments, a system for controlling the dis(cid:173)
`tribution and use of digital works using digital tickets is
`disclosed. A ticket is an indicator that the ticket holder has
`already paid for or is otherwise entitled to some specified
`right, product or service. In the present invention, a "digital
`ticket" is used to enable the ticket holder to exercise usage
`rights specifying the requirement of the digital ticket. Usage
`rights are used to define how a digital work may be used or
`distributed. Specific instances of usage rights are used to
`indicate a particular manner of use or distribution. A usage
`right may specify a digital ticket which must be present before
`the right may be exercised. For example, a digital ticket may
`be specified in a Copy right of a digital work, so that exercise
`of the Copy right requires the party that desires a copy of the
`digital work be in possession of the necessary digital ticket.
`After a copy of the digital work is successfully sent to the
`requesting party, the digital ticket is "punched" to indicate
`that a copy of the digital work has been made. When the ticket
`is "punched" a predetermined number of times, it may no
`longer be used.
`Digital works are stored in repositories. Repositories
`enforce the usage rights for digital works. Each repository has
`a "generic ticket agent" which punches tickets. In some
`instances only the generic ticket agent is necessary. In other
`instances, punching by a "special ticket agent" residing on
`another repository may be desired. Punching by a "special
`ticket agent" enables greater security and control of the digital
`work. For example, it can help prevent digital ticket forgery.
`Special ticket agents are also useful in situations where an
`external database needs to be updated or checked.
`A digital ticket is merely an instance of a digital work.
`Thus, a digital ticket may be distributed among repositories in
`the same fashion as other digital works.
`A digital ticket may be used in many commercial scenarios
`such as in the purchase of software and prepaid upgrades. A
`digital ticket may also be used to limit the number of times
`that a right may be exercised. For example, a user may pur(cid:173)
`chase a copy of a digital work, along with the right to make up
`to 5 Copies. In this case, the Copy right would have associated
`therewith a digital ticket that can be punched up to 5 times.
`Other such commercial scenarios will become apparent from
`the detailed description.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a flowchart illustrating a simple instantiation of
`the operation of the currently preferred embodiment of the
`present invention.
`FIG. 2 is a block diagram illustrating the various repository
`types and the repository transaction flow between them in the
`currently preferred embodiment of the present invention.
`
`
`
`Case 2:14-cv-00061-JRG Document 1-8 Filed 02/05/14 Page 18 of 42 PageID #: 248
`
`US 8,370,956 B2
`
`5
`FIG. 3 is a block diagram of a repository coupled with a
`credit server in the currently preferred embodiment of the
`present invention.
`FIGS. 4a and 4b are examples of rendering systems as may
`be utilized in the currently preferred embodiment of the
`present invention.
`FIG. 5 illustrates a contents file layout for a digital work as
`may be utilized in the currently preferred embodiment of the
`present invention.
`FIG. 6 illustrates a contents file layout for an individual 10
`digital work of the digital work of FIG. 5 as may be utilized in
`the currently preferred embodiment of the present invention.
`FIG. 7 illustrates the components of a description block of
`the currently preferred embodiment of the present invention.
`FIG. 8 illustrates a description tree for the contents file 15
`layout of the digital work illustrated in FIG. 5.
`FIG. 9 illustrates a portion of a description tree correspond(cid:173)
`ing to the individual digital work illustrated in FIG. 6.
`FIG. 10 illustrates a layout for the rights portion of a
`description block as may be utilized in the currently preferred 20
`embodiment of the present invention.
`FIG. 11 is a description tree wherein certain d-blocks have
`PRINT usage rights and is used to illustrate "strict" and
`"lenient" rules for resolving usage rights conflicts.
`FIG. 12 is a block diagram of the hardware components of 25
`a repository as are utilized in the currently preferred embodi(cid:173)
`ment of the present invention.
`FIG. 13 is a block diagram of the functional (logical)
`components of a repository as are utilized in the currently
`preferred embodiment of the present invention.
`FIG. 14 is diagram illustrating the basic components of a
`usage right in the currently preferred embodiment of the
`present invention.
`FIG. 15 lists the usage rights grammar of the currently
`preferred embodiment of the present invention.
`FIG. 16 is a flowchart illustrating the steps of certificate
`delivery, hotlist checking and performance testing as per(cid:173)
`formed in a registration transaction as may be performed in
`the currently preferred embodiment of the present invention.
`FIG. 17 is a flowchart illustrati