`Schneck et al.
`
`US005933498A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,933,498
`Aug. 3,1999
`
`[54] SYSTEM FOR CONTROLLING ACCESS AND
`DISTRIBUTION OF DIGITAL PROPERTY
`
`[75] Inventors: Paul B. Schneck, Potomac; Marshall
`D. Abrams, Silver Spring, both of Md.
`
`[73] Assignee: MRJ, Inc., Fairfax, Va.
`
`[21] Appl. No.: 08/968,887
`Nov. 5, 1997
`[22] Filed:
`
`Related U.S. Application Data
`
`[63] Continuation of application No. 08/584,493, Jan. 11, 1996,
`abandoned.
`Int. Cl.6 .................................................... H04L 9/00
`[51]
`[52] U.S. Cl..................................... 380/4; 380/9; 380/23;
`380/25; 380/49; 380/50
`[58] Field of Search ............................. 380/4, 9, 21, 23,
`380/24, 25, 49, 50, 51, 55
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`3/1970 Wallace, Jr. .
`3,504,132
`3,764,742 10/1973 Abbott et al. .
`3,798,359 3/1974 Feistel .
`4/1975 Morgan et al. .
`3,878,331
`9/1975 Halpern .
`3,906,460
`3,911,216 10/1975 Bartek et al. .
`3/1976 France .
`3,944,976
`5/1976 Ehrsam et al. .
`3,958,081
`3,996,449 12/1976 Attanasio et al. .
`1/1977 Richard et al. .
`4,004,089
`4,028,678 6/1977 Moran .
`7/1977 Birney et al. .
`4,037,215
`
`(List continued on next page.)
`
`FOREIGN PATENT DOCUMENTS
`0332707 9/1989 European Pat. Off. .
`9500355 8/1996 Sweden .
`2236604
`4/1991 United Kingdom .
`2236604 10/1991 United Kingdom .
`W092/20022 11/1992 WIPO .
`W09220022 11/1992 WIPO .
`
`9301550
`W093/01550
`96/27155
`
`1/1993 WIPO ................................ G06F 11/34
`1/1993 WIPO .
`9/1996 WIPO .
`OTHER PUBLICATIONS
`Abrams, M. D. et al, “Cyptography”, Information Secu-
`rity-An Integrated Collection of Essays, Abrams, M.D. et al
`eds., IEEE Computer Society Press 1995, pp. 350-384.
`Choudhury, A. K. et al, “Copyright Protection for Electronic
`Publishing Over Computer Networks”, IEEE Network,
`May/Jun. 1995, pp. 12-20.
`Ciciora, W. S., “Inside the Set-Top Box”, IEEE Spectrum,
`Apr. 1995, vol. 32, No. 4, pp. 70-75.
`(List continued on next page.)
`Primary Examiner—Bernarr E. Gregory
`Attorney, Agent, or Firm—Pillsbury Madison & Sutro LLP
`ABSTRACT
`[57]
`A method and device are provided for controlling access to
`data. Portions of the data are protected and rules concerning
`access rights to the data are determined. Access to the
`protected portions of the data is prevented, other than in a
`non-useable form; and users are provided access to the data
`only in accordance with the rules as enforced by a mecha
`nism protected by tamper detection. A method is also
`provided for distributing data for subsequent controlled use
`of those data. The method includes protecting portions of the
`data; preventing access to the protected portions of the data
`other than in a non-useable form; determining rules con
`cerning access rights to the data; protecting the rules; and
`providing a package including: the protected portions of the
`data and the protected rules. A user is provided controlled
`access to the distributed data only in accordance with the
`rules as enforced by a mechanism protected by tamper
`protection. A device is provided for controlling access to
`data having protected data portions and rules concerning
`access rights to the data. The device includes means for
`storing the rules; and means for accessing the protected data
`portions only in accordance with the rules, whereby user
`access to the protected data portions is permitted only if the
`rules indicate that the user is allowed to access the portions
`of the data.
`
`88 Claims, 26 Drawing Sheets
`
`DISTRIBUTOR
`
`USER
`
`Roku EX1006
`U.S. Patent No. 6,411,941
`
`
`
`5,933,498
`Page 2
`
`.... 235/380
`
`U.S. PATENT DOCUMENTS
`2/1978 Ehrsam et al. .
`4,074,066
`5/1978 Attanasio .
`4,087,856
`4,120,030 10/1978 Johnstone .
`9/1979 Best .
`4,168,396
`1/1980 Roberts et al. .
`4,183,085
`3/1980 Lennon et al. .
`4,193,131
`6/1980 Matyas et al. .
`4,206,315
`4,238,854 12/1980 Ehrsam et al. .
`1/1981 Thomas .
`4,246,638
`4/1981 Konheim .
`4,264,782
`7/1981 Best .
`4,278,837
`7/1981 Atalla .
`4,281,215
`Lumley .
`12/1981
`4,306,289
`Best .
`3/1982
`4,319,079
`4/1982
`Guillou .
`4,323,921
`2/1984
`4,433,207
`5/1984
`Thomas .
`4,446,519
`6/1984 Heffron et al. .
`4,454,594
`7/1984 Uchenick .
`4,458,315
`8/1984 Best .
`4,465,901
`9/1984 Donald et al. .
`4,471,163
`Chaum ................................
`4,529,870
`7/1985
`Arnold et al. .
`12/1985
`4,558,176
`......... 380/4
`Tolman et al........................
`2/1987
`4,646,234
`4^658:093
`4/1987 Hellman .............................. ....... 380/25
`7/1988 Allen et al............................ ....... 380/25
`4,757,533
`1/1989 Wiedemer ........................... .... 380/4 X
`4,796,181
`5/1989 Shear .
`4,827,508
`Hershey et al. .
`5/1990
`4,924,378
`Chou et al............................
`6/1990
`4,932,054
`......... 380/4
`Robert et al..........................
`6/1990
`......... 380/4
`4,937,863
`8/1990 Ryder, Sr. et al.................... ...... 380/23
`4,953,209
`4,961,142 10/1990 Elliott et al. .
`4,977,594 12/1990 Shear ................................... ......... 380/4
`4/1991 Katznelson .......................... ......... 380/4
`5,010,571
`5/1991 Edwards, Jr. .
`5,014,234
`Johnson et al........................
`6/1991
`5,023,907
`Platteter et al. .
`6/1991
`5,027,396
`9/1991
`Wiedemer .
`5,047,928
`9/1991 Shear .
`5,050,213
`5,058,162 10/1991 Santon et al. .
`5,058,164 10/1991 Elmer et al........................... ....... 380/50
`4/1992 Waite et al............................ ......... 380/4
`5,103,476
`Johnson et al. .
`5/1992
`5,113,519
`....... 380/23
`9/1992
`Geffrotin .............................
`5,146,499
`.... 235/492
`Eisele ...................................
`10/1992
`5,159,182
`3/1993 LeRoux ............................... .... 235/379
`5,191,193
`4/1993 Wyman ............................... ......... 380/4
`5,204,897
`6/1993 Waite et al............................ ......... 380/4
`5,222,134
`8/1993 Wobber et al. .
`5,235,642
`Sprague et al. .
`9/1993
`5,247,575
`Wyman .
`11/1993
`5,260,999
`Janis .
`5 263 157
`11/1993
`5^263458
`11/1993 Janis .
`3/1994 Mita .
`5,291,596
`4/1994 Abraham et al. .
`5,301,231
`6/1994 Halter et al. .
`5,319,705
`8/1994 Chou et al. .
`5,337,357
`Yamazaki et al. .
`8/1994
`5,339,091
`Greenwood et al. .
`9/1994
`5,345,588
`9/1994 Duxbury .
`5447478
`5,369,702 11/1994 Shanton .
`1/1995 Yearsley et al. .
`5,386,469
`1/1995 Bianco .
`5,386,471
`2/1995 Blackledge, Jr. et al. .
`5,388,156
`Hasebe et al. .
`2/1995
`5,392,351
`Nagel et al. .
`2/1995
`5,394,469
`3/1995 Fahn et al. .
`5400403
`4/1995 Shear .
`5,410,598
`7/1995 Johnson et al. .
`5,432,849
`
`......... 380/4
`
`5,438,508 8/1995 Wyman .
`8/1995 Hube et al. .
`5,442,541
`9/1995 Ostrover et al. .
`5,450,489
`5,473,687 12/1995 Lipscomb et al. .
`4/1996 Miyahara .
`5,504,814
`6/1996 Stefik et al. .
`5,530,235
`1/1997 Nagel et al..................................... 380/4
`5,592,549
`1/1997 Hodge et al. .
`5,594,491
`1/1997 Rebec et al. .
`5,594,936
`3/1997 Kazmierczak et al. .
`5,615,264
`5/1997 Stefik et al. .
`5,629,980
`6/1997 Stefik et al. .
`5,638,443
`7/1997 Subler et al. .
`5,646,992
`9/1997 Auerbach et al............................... 380/4
`5,673,316
`
`OTHER PUBLICATIONS
`
`Department of Defense Standard, Department of Defense
`Trusted Computer System Evaluation Criteria, DOD
`2500.28-STD, GPO 1986-623-93, 643 0, Dec. 26, 1985.
`Graubart, R., “On the Need for a Third Form of Access
`Control”, Proceedings of the \2'h National Computer Secu-
`rity Conference, 1989, pp. 296-303.
`K. Brunnstein and P. P. Sint, eds., KnowRight’95, Intellec-
`tual Property Rights and New Technologies: Proceedings of
`the KnowRight’95 Conference, Austrian Computer.
`Low, S. H. et al, “Document Marking and Identification
`using both Line and Word Shifting”, 1995 InfoCom Pro-
`ceedings, IEEE, 1995, pp. 853-860.
`McCollum, C. J. et al, “Beyond the Pale of MAC and DAC:
`Defining New Forms of Access Control”, Proceedings of the
`Symposium on Research in Security and Privacy, IEEE
`Computer Society Press, 1990, pp. 190-200.
`National Institute of Standards and Technology (NIST) and
`National Security Agency (NSA), Federal Criteria for Infor-
`mation Technology Security: vol. I, Protection Profile
`Development; vol. II, Registry of Protection Profiles, Ver
`sion 1.0, Dec. 1992.
`Samuelson, P, “Copyright and Digital Libraries”, Commu-
`nications of the AMC, Apr. 1995, vol. 38, No. 3, pp. 15-20
`& 110.
`Samuelson, P. et al, “A Manifesto Concerning the Legal
`Protection of Computer Programs”, Columbia Law Review,
`vol. 94, No. 8, pp. 2308-2431.
`Sandhu, R. S. “The Typed Access Matrix Model”, Proceed-
`ings of the Symposium on Research in Security and Provacy,
`IEEE Computer Society, 1992, pp. 122-136.
`Sandhu, R. S. et al, “Implementation Considerations for the
`Typed Access Matrix Model in a Distributed Environment”,
`Proceedings of the 15th National Computer Security Con-
`ference, 1992b, pp. 221-235.
`Yee, B., “Using Secure Coprocessors”, Carnegie Mellon
`of
`Computer
`University,
`School
`Science,
`CMU-CS-94-149, May 1994, (also available Defense
`Technical Information Center as AD-A281 255).
`Maxem Chuk, N.F., Sep. 1994, “Electronic Document Dis-
`tribution,” AT&T Technical Journal, pp. 73-80.
`Weber, R., “Metering Technologies For Digital Intellectual
`Property,” A Report to the Internatinal Federation of Repro-
`duction Rights Organization, Oct. 1994,pp. 1-29.
`Clark, PC. and Hoffman, L.J., “Bits: A Smartcard Protected
`Operating System,” Communications of the ACM, Nov.
`1994, vol. 37, No. 11, pp. 66-70, and 94.
`Saigh, W.K., Knowledge is Sacred, Video Pocket/Page
`Reader Systems, Ltd., 1992.
`
`
`
`5,933,498
`Page 3
`
`Kahn, R.E., “Deposit, Registration And Recordation In an
`Electronic Copyright Management System,” Corporation
`for National Research Initiatives, Virginia, Aug. 1992, pp.
`1-29.
`Hilts, P. Mutter, J., and Taylor, S., “Books While U Wait,”
`Publishers Weekly, Jan. 3. 1994, pp. 48-50.
`Strattner, A., ‘“Cash register on a chip” may revolutionize
`software pricing and distribution;’ Wave Systems Corp.,
`Computer Shopper. Copyright, Apr. 1994, vol. 14;No. 4; p.
`62.
`O’Conner, M.A., “New distribution option for electronic
`publishers; iOpener data encryption and metering system for
`CD-ROM use; Column,” CD-ROM Professional, Copy
`right, Mar. 1994, vol. 7;No. 2; p. 134; ISSN: 1049-0833.
`Willett, S., “‘Metered PCs:Is your system watching you?”;
`Wave Systems beta tests new technology,’ Info World, Copy
`right, May 2, 1994, p. 84.
`Linn, R.J., “Copyright and Information Servicces in the
`Contest of the National Research and Education Network,”
`IMA Intellectual Property Project Proceedings, Jan. 1994,
`vol. 1, Issue 1, pp. 9-20.
`Perritt, Jr., H.H., “Permissions Headers ad Contract Law,”
`IMA Intellectual Property Project Proceedings, Jan. 1994,
`vol. 1, Issue 1, pp. 27^-8.
`Upthegrove, L., and Roberts, R., “Intellectual Property
`Header Descriptors: A Dynamic Approach,” IMA Intellec
`tual Property Project Proceedings, Jan. 1994, vol. 1, Issue
`l,pp. 63-66.
`Sirbu, M.A., “Internet Billing Service Design and Prototype
`Implementation, IMA” Intellectual Property Project Pro
`ceedings, Jan. 1994, vol. 1, Issue 1, pp. 67-80.
`Simmel, S.S., and Godard, I., “Metering and Licensing of
`Resources: Kala’s General Purpose Approach,” IMA Intel
`lectual Property Project Proceedings, Jan. 1994, vol. 1, Issue
`1, pp. 81-110.
`Kahn, R.E., “Deposit, Registration and Recordation in an
`Electronic Copyright Management System,” IMA Intellec
`tual property Project Proceedings, Jan. 1994, vol. 1, Issue 1,
`pp. 111-120.
`Tygar, J.D., and Bennet, Y., “Dyad: A System for Using
`Physically Secure Coprocessors,” IMA Intellectual Property
`Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 121-152.
`Griswold, G.N., “A Method for Protecting Copyright on
`Networks,” IMA Intellectual Property Project Proceedings,
`Jan. 1994, vol. 1, Issue 1, pp. 169-178.
`Nelson, TH., “A Publishing and Royalty Model for Net
`worked Documents, ”IMA Intellectual Property Project Pro
`ceedings, Jan. 1994, vol. 1, Issue 1, pp. 257-259.
`European Search Report for Corresponding European Appli
`cation 95308420.9.
`U. Flasche et al., Decentralized Processing of Documents,
`Comput. & Graphics, vol. 10, No. 2, 1986, pp. 119-131.
`R. Mori et al., Superdistribution: The Concept and the
`Architecture, The Transactions of the IEICE, vol. E 73, No.
`7, 1990, Tokyo, JP, pp. 1133-1146.
`
`Rosse, P.E., “Data guard”, Forbes, Jun. 6, 1994, p. 101.
`Xiao-Wen Yang et al., Key distribution system for digital
`video signal, ICSP ’96. 1996 3rd International Conference
`on Signal Processing Proceedings (Cat. No. 96TH8116),
`vol. 2 1996, pp. 847-850.
`E.A.I. Claus, Digital network for video surveillance and
`video distribution, Proc. SPIE—Int. Soc., Opt. Eng. vol.
`2952 1996, pp. 194-204.
`R. J. Bankapur et al., Switched digital video access net
`works, Bell Labs Tech. J. vol. 1 No. 1 Summer 1996, pp.
`66-77.
`C.A. Mandel et al., Intellectual access to digital docu-
`ments:joining proven principles with new technologies, Cat.
`Classif. Q., vol. 22, No. 3-4 1996, pp. 25-42.
`B.J. Goldsmith et al., Digital video distribution and trans
`mission, International Broadcasting Convention (Conf.
`Publ. No. 428) 1996, pp. 26-31.
`D. Van Schooneveld, Standardization of conditional access
`systems for digital pay television, Philips J. Res. (UK), vol.
`50, No. 1-2, 1996, pp. 217-225.
`H.D. Wactlar, Intelligent access to digital video: Informedia
`projectcomputer, vol. 29, No. 5, May 1996, pp. 46-52.
`J.E. Dail et al., Adaptive digital access protocol: A MAC
`protocol for multiservice broadband access networks INS,
`IEEE Commun. Mag. vol. 34, No. 3, Mar. 1996, pp.
`104-112.
`S. Stevens et al., Informedia: improving access to digital
`video—Ins, Interactions, vol. 1, No. 4, Oct. 1994, pp. 67-71.
`B. Hein et al., RACE 1051: a multigigabit transport and
`distribution technology for provision of digital video ser
`vices—INS, Proc. SPIE—Int. Soc. Opt. Eng., vol. 1974,
`1993, pp. 26-33.
`Chen Ching-Chin et al., Analog, digital and multimedia:
`implications for information access INS, Online Information
`91. 15th International Online Information Meeting Proceed
`ings, 1991, pp. 283-292.
`Marshall Abrams, et al, Generalized Framework For Access
`Control, Towards Prototyping the ORGCON Policy, Oct.
`1991, pp. 1-20, Proc 1991 Nat’l Computer Security Conf.
`Marshall D. Abrams, et al, Mediation and Separation in
`Contemporary Information Technology Systems, 1992, pp.
`1-15, Proc. 1992 Nat’l Compute Security Conf.
`Marshall D. Abrams, et al, Generalized Framework for
`Access Control: A Formal Rule Set for The ORGCON
`Policy, MITRE, Apr. 1992, pp. 1-58.
`Marshall D. Abrams, Renewed Unserstanding of Access
`Control Policies, 1993, pp. 1-10, Proc. 16th National Com
`puter Security Conference.
`Leonard J. LaPadula, A Rule-Set Approach to Formal
`Modeling of a Trusted Computer System, Computing Sys
`tems Journal, Winter 1994, vol. 7, No. 1, pp. 113-167, pp.
`1-38.
`
`
`
`Aug. 3,1999
`Aug.3, 1999
`
`Sheet 1 of 26
`Sheet 1 of 26
`
`5,933,498
`5,933,498
`
`PLL
`
`SS3A90V
`
`WSINVHOSW
`
`U.S. Patent
`
`U.S. Patent LNAWAVd
`
`Y¥3asnYOLNGEIYLSIC
`
`t‘Dla
`
`Obl
`
`s0l
`
`Stl
`
`cobb
`
`daSVNIVd
`
`NOILNGIYLSIA
`
`vivd
`
`WSINVHOAN
`
`SNIVOHLNV
`
`WSINVHOAWN
`
`
`
`
`
`U.S. Patent
`
`Aug. 3,1999
`
`Sheet 2 of 26
`
`5,933,498
`
`ENCRYPTED ANCILLARY
`
`INFORMATION
`
`126
`
`ENCRYPTED RULES
`
`124
`
`UNENCRYPTED BODY PART
`
`122
`
`ENCRYPTED BODY PART
`
`^108
`
`PACKAGED DATA
`
`120
`
`CM
`
`
`
`U.S. Patent
`
`Aug. 3,1999
`
`Sheet 3 of 26
`
`5,933,498
`
`System IDs/Public keys 147
`Token/biometrics 146
`Co-requisite rules (permissions) for source data 145
`Custom permissions 144
`Extended permissions 142
`Standard permissions 140
`Encrypted data key 138
`Last valid generation of the product 136
`First valid generation of the product 134
`Intellectual property identifier 132
`License number of these rules 130
`Authentication (hash) 128
`Version number 127
`
`b)
`ί
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug.3, 1999
`
`Sheet 4 of 26
`Sheet 4 of 26
`
`5,933,498
`5,933,498
`
`ON
`
`Nyzys~jtf
`
` 9ZrSozrs0“NOILVINHOSNI{saTnts,waeAqoa
`
`
`AUVTTIONYaesite
`
`O&rS
`
`JFYOWON
`
`L0vS
`
`yOudsNunta”
`
`
`
`
`
`IN3SW31aVLVdLXANL3D
`
`
`
`
`
`‘OJNI“TIONVsa1ny
`
`
`
`1dAUONAIdAYONS3OL
`
`acest
`
`SFA
`
`8erS
`
`aYyOLS
`
`GaldAYONA
`
`
`
`“OJNI“TONY
`
`coVvs
`
`aYOLS
`
`daLdAYONA
`
`sand
`
`ckvs
`
`aYOLS
`
`INAW3T1S
`
`bles
`
`LdAYONa
`
`LN3W314
`
`SLPS
`
`aYOLs
`
`G3LdAYONA
`
`LN3W313
`
`WHLIYOOTV
`
`ZOvS
`
`
`
`
`
`AA»ONILGAYONSAVLVOLOATas
`
`
`
`
`
`HLMASMSNILGAYONAVLVOLdAYWONA
`
`vors
`
`AAONILdAYONS-S1nd
`
`
`
`NIAJMGALdAWONAAHOLS
`
`
`
`NOILVINYOANIAYVTTIIONY
`
`90¢S
`
`
`
`
`
`ONILdAYONAVLVdLOdT3S
`
`00vS
`
`bDla
`
`FIG. 4
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug.3, 1999
`
`Sheet 5 of 26
`Sheet 5 of 26
`
`5,933,498
`5,933,498
`
`Vit
`
`SSIDOV
`
`WSINVHOAN
`
`
`
`yasnYOLNGIYLSIA
`
`IO
`d
`
`S‘ld
`
`8rl
`
`SNIPOHLNV
`
`WSINVHOAW
`
`o Q
`
`OSt
`
`OLL
`
`LNAWAVd
`
`Qaa9vwoVd
`
`s31nd
`
`8
`Lh
`
`daSvaoVd
`
`NOILNGIYLSIG
`
`vivd
`
`WSINVHOAW
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Aug. 3,1999
`Aug.3, 1999
`
`Sheet 6 of 26
`Sheet 6 of 26
`
`5,933,498
`5,933,498
`
`U.S. Patent NOILVINGOSNI
`LYVdAGOdaLdAYONA9‘VJla
`
`LYVdAGOdGaldAYONANN
`
`0S}vivdda5v4ovd
`
`AYVTTIONVGaldAYdONAa
`
`g
`
`Ocl
`
`ook
`
`9c1
`
`150
`
`
`
`Sheet 7 of 26
`Sheet 7 of 26
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug.3, 1999
`
`9€ZS
`
`NIVLEO
`
`‘ONTVIdAS
`
`WALSAS40
`
`evs
`
`ees
`
`
`
`‘OANI“TIONY
`
`82SagOL
`
`
`
`LdAYONSdaL035L0ud
`
`8LZS
`
`SAA
`
`022s
`
`Z‘Dld
`
`oszs
`
`Nunlad
`
`JYOWON
`
`
`ZeLSAYVTIIONY.
`
`ONésamndNOILVINHOANI
`
`
`
`ONILdAYONSAVLVdLoaTas
`
`Aa»ONVWHLIHODTV
`
`002S
`
`Z0LS
`
`
`
`
`
`LN3SWA13VLVYGLXANLID
`
`Viva1dAYONSoezs
`
`
`
`aHO1SIdAHONA
`
`
`
`panei‘OANI“ONY
`
`
`8EZSHLIMAa3HOLSiN3W313
`
`
`Aay3104G31dAYONAiNawa7
`
`5,933,498
`5,933,498
`
`‘ONIWIWaS
`
`
`
`NSNaaaYuOLSGNVAa’310
`
`31LVINDWoAaS31nLNaW373
`ObsONISNGALdANONA
`
`S31NYLdAYONSJYOLS
`
`QbLSZ2ls
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent Aug. 3,1999 sheet 8 of 26
`U.S. Patent
`
`Aug.3, 1999
`
`Sheet 8 of 26
`
`5,933,498
`5,933,498
`
`691
`
`YAdNVL
`
`103140
`
`WSINVHOSIN
`
`rol
`
`AV1dSId
`
`SI0dGYVH
`
`z9k
`
`991
`
`ADSYANZ
`
`39YunNOs
`
`09}
`
`ATMLVIOA-NON
`
`AYOWAN
`
`LINN
`
`BSL
`
`AYOWAWN
`
`gol
`
`NOILdAYONA
`
`SJYVMdYVH
`
`
`
`
`
`O/l’ZHGATIOULNOD
`
`Z91
`
`ZSi
`
`Bil
`
`AV1dsia
`
`ONISSSO0O"dGOLAW1dSId
`
`
`JULVIOA=
`
`WOUxsId
`
`9s1AddO14
`
`Sst
`Psi
`|YSLNIdd8‘Dld
`
`YALNldd
`
`6S
`
`MYOMLAN
`
`ADIAAG
`
`e9l
`
`WAGON
`
`801
`
`aga5VvwAoVd
`
`viva
`
`LOL
`
`(wvy)91—|GATIOULNOD
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug.3, 1999
`
`Sheet 9 of 26
`Sheet 9 of 26
`
`5,933,498
`5,933,498
`
`OZt
`
`vi
`
`AW1dsid
`
`6‘Did
`
`
`PLLQ3aTIOYLNOO
`9ZL7GATIOYULNOO
`QUYVaNVLS
`
`TWNISIYO
`
`YyOSSssa90dd
`
`SS3AI90V
`
`WSINVHOAW
`
`LOL YALNIYd
`
`AddOT4
`
`Ss}
`
`sid
`
`YALNIdd
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 10 of 26
`Sheet 10 of 26
`
`5,933,498
`5,933,498
`
`9LOLS
`
`WdOsddad
`
`TIWINAG
`
`NOILVudadO
`
`ON
`
`VOLS|SAA
`
`SSA99V
`
`tA
`
`oN
`
`LNAW314
`
`“™
`
`ON
`
`ZLOLS
`
`Vivdsl!
`
`ON
`
`
`E035LLINYSAd
`éd3L94L0”d
`
`vivdSIVAN
`
`LANSW3TA
`
`ATEVIIVAV
`
`slols
`
`ONa
`
`éfd1avasn
`
`LN3W31SVivd,SHAAALLBla)
`
`
`
`LSOWWOdsdLNAY3ssgzI0
`
`
`
`éGaSssa0oVATLNS94Y
`
`SAAON
`
`OLOLS
`
`vivaNadO
`
`|
`
`LNAWa13
`
`
`
`(e)oL“DIld
`
`LOOLS
`
`NAdO
`
`Lasvlvd
`
`ON
`
`Lasvilvd
`
`AQVauyTV
`
`sdéNAadO
`
`0001S
`
`2001S:
`
`vOOLS
`
`
`usevivesi_>—saSanu(2)
`é€04.105L0dd:
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug.3, 1999
`
`Sheet 11 of 26
`Sheet 11 of 26
`
`
`JAa“$éINSW31aVLVG1Sv1ONWHOsYad
`
`JONISS31NYMANYO,loeols
`
`4WINaG
`
`(VoL‘DldZZ01Sm0
`
`
`.ONLasviva
`‘eyioAavauv
`
`éNadO
`
`uaeviva
`sanceOrSéGaLLWYad
`
`
`
`SSa00VoTining.:
`
`
`£qg1035L0"dAsan—uasvvasi>sey
`
`SAA
`
`5,933,498
`5,933,498
`
` ALVOIGNI
`
`9€01S
`
`dlLldAYONA
`
`oss37nd
`
`NOILvdadO
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999 Sheet 12 of 26
`Aug. 3, 1999
`Sheet 12 of 26
`
`5,933,498
`5,933,498
`
`ALIYSIALNI
`
`YSHOAHO
`
`wWNWsu
`
`SNOANIWdNynlay
`
`SOLIS
`
`
`
`OLLESLZebbSxSHAANé1N4ASSAIONS.ONx’
`
`SOLIS
`
`SVN
`
`sa1nd
`
`ATEVIIVAV
`
`bkOld
`
`PILES
`
`Sa1ndY¥O4d
`
`YaSNASV
`
`ssvdLoaYYHOo
`NNaIFoLIS'
`
`53w—<4OLas
`
`w«SSAOONS:
`
`NYN.LaY“L
`
`ON
`
`ZLLLSésainu
`
`
`
`oorisa~T
`
`<7GaNIWualad~,SaA
`AQVAYTVSZINY
`ONNYNLaYdtZOLLS418v4sn_
`
`dsaSvwovd
`
`SnmePOLLS%—_|.ss399ns.
`
`FA
`
`éVLV0HLIM
`
`ON
`
`édalvOOudsILNIDwweONBLLLS
`
`<SIHLNOS31NY
`
`7talA,
`
`Neuse
`
`ONS.hJA
`
`92LLS
`
`ADVSSAN
`
`y¥3asnOL
`
`SHA
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 13 of 26
`Sheet 13 of 26
`
`5,933,498
`5,933,498
`
`vlels
`
`aDYOANA
`
`NOILOIWLS3d
`
`ZLZLS
`
`évLvdNO
`
`—<{o1o141835>¢————»
`o——<esON
`
`cl‘Ola
`
`OOZES
`
`ASILNII
`
`NOllvdad0
`
`
`
`ECsLLindad
`
`OlelSfSAA
`
`OLCLS
`
`WdOddad
`
`O/l
`
`BILLS
`
`Las
`
`wSS3IIONS.
`
`3qg09
`
`ON
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 14 of 26
`Sheet 14 of 26
`
`5,933,498
`5,933,498
`
`NOILV.LNSWATdi
`DIHdVYHDOLdAYO
`
`TVAOY’LS3Ad
`
`NOILVINYOSNI
`
`LXS3LYV3TONI
`
`EL‘Old
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 15 of 26
`Sheet 15 of 26
`
`5,933,498
`5,933,498
`
`
`
`SNLVLSYASN
`
`NOILVNIWYSLAG
`
`WNSINVHOSAWN
`
`cSt
`
`bl‘Old
`
`ω 1
`(Λ Z
`* LU <
`vi
`-Ox
`Ο ϋ
`< Lil
`s
`
`WSINVHOSAIN
`
`SSA00V
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`oSh
`
`d3a9VvwoVd
`
`sa1nd
`
`YyOLNGIYLSIO
`
`2
`
`Sk‘Dla
`
`Sheet 16 of 26
`Sheet 16 of 26
`
`5,933,498
`5,933,498
`
`
`
`qs8ol
`
`Ga5VwoVd
`
`viva
`
`NOILNGIYLSIC
`
`WSINVHOSN
`
`SNIYVOHLNV
`
`WSINVHOAW
`
`WSINVHOAWN
`
`SSAD0V
`
`Sit
`
`oLb
`
`PLL
`
`eBg0l
`
`dgaSvwovd
`
`Vivd
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 17 of 26
`Sheet 17 of 26
`
`5,933,498
`5,933,498
`
`VLOLS
`
`
`
`NYNLaHYwdaMOTVONNOILOV
`OLOILSLON,LSSWALSAS,
`
`go91s7
`
`
`
`
`
` ZIOLS“3009NYNL3Yeagyinoay
`
`WHOdd3d
`
`NOILOV
`
`9‘Dla
`
`OLOLSASIA
`
`id4aMOTIV,éLNAWAVd
`
`1384O——~“719LON
`
`909LS
`
`éqdalLliWwdsd
`vO9iso
`
`iN
`
`OOSLS
`
`ASILNAI
`
`NOILVdadO
`
`
`
`
`
`3009NYN.LAY”™.
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug.3, 1999
`Aug. 3,1999
`
`Sheet 18 of 26
`Sheet 18 of 26
`
`5,933,498
`5,933,498
`
`238
`
`238
`
`238238
`
`238
`
`238
`
`
`
`FIG.17(b)
`
`23
`
`238
`
`FIG.17(a)
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 19 of 26
`Sheet 19 of 26
`
`5,933,498
`5,933,498
`
`SNOILOINLSSYLXal
`
`
`
`‘SayT1Nd-SAYNSis
`
`
`
`“MONVGALdAYONA
`
`NOILVANYOANI
`
`9cl
`
`SH3aLdVHO
`
`LOVULSEV
`
`XAaNnNl
`
`801
`
`c0c
`
`Saundid
`
`961
`
`SYALdVHD
`
`86h
`
`SNOILIIS
`
`
`
`(Vet‘Old
`
`FIG. 18(b)
`
`c6h
`
`LOVULSEV
`
`
`
`(eel‘DId
`
`
`
`
`
`
`U.S. Patent
`
`Aug. 3,1999
`
`Sheet 20 of 26
`
`5,933,498
`
`FIG. 19(b)
`
`\
`
`206
`
`t
`
`FIG. 19(a)
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 21 of 26
`Sheet 21 of 26
`
`5,933,498
`5,933,498
`
`YsTIVdL
`
`vel
`
`AVHO-9
`
`€l<4dDV-d
`
`8<ADV*X
`
`
`
`“MONVGALdAYONA
`
`NOILVINYOSNI
`
`92h
`
`
`SLYVd
`
`GALVY-XGNVY‘)SN1dSONANOASNOWWNOD
`
`O¢cl
`
`801
`
`(P)6L“Old
`
`<5
`
`90¢
`
`Y3aTVEl
`
`aaLva-9
`
`SLYVd
`
`802
`
`Ole
`
`azLVae-d
`
`SLUVd
`
`cle
`
`OALVva-x
`
`SLUVd
`
`NOWNWOD
`
`FONANOAS
`
`202
`
`(6L“Did
`
`vO¢
`
`FIAOW
`
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 22 of 26
`Sheet 22 of 26
`
`5,933,498
`5,933,498
`
`NadOS3TldOF>
`
`
`
`
`
`YaNOSHOYVWINVYDON(2)0z‘Did
`
`ac
`
`m
`
`
`
`YSMOSHOYVWINVYD
`
`
`
`SNOILONNJYAHLO
`
`SS39O0VAld
`
`Oz
`
`YyOLIda
`
`921
`
`
`
`“HONVGALdAYONA
`
`NOILVWHYOSNI
`
`OSl
`
`
`
`(qoz‘DI4
`
`
`
`(e)ozg‘DI
`
`HOLIGA
`
`YyyNNvEd
`
`YANIFTHI
`
`022
`
`SNOILONNA
`
`YAHLO
`
`CoG
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 23 of 26
`Sheet 23 of 26
`
`5,933,498
`5,933,498
`
`
`
`VivddaL0vdsuy-NON
`
`GsaLOvdsyOLSSADDVON
`
`VLVd
`
`9c1
`
`
`
`“TWONVGALdAYONA
`
`NOILVINYOSNI
`
`
`
`Vivddalovdad
`
`801
`
`8c
`
`SQHOM
`
`
`
`(Miz‘Dig
`
`FIG. 21(b)
`
`
`
`(e)iz‘Did
`
`G. 21(a)
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 24 of 26
`Sheet 24 of 26
`
`5,933,498
`5,933,498
`
`
`
`NOILN10S3YLSAMOT
`
`
`
`Vivd45VINI
`
`NOILN10S34¥YLVAV1dSI0
`
`
`
`“TONYGALdAYONS
`
`NOILVINYOSNI
`
`9cl
`
`
`
`TWNOILIGGVNOILN10Sau
`
`HSIHGNVWnidaW
`
`
`
`VivdA9VWNI
`
`021
`
`801
`
`
`
`(e)zz“Did
`
`0€2
`
`ADVIdV
`
`VLVO
`
`
`
`(We‘Did
`
`FIG. 22(b)
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Aug. 3,1999
`Aug. 3, 1999
`
`Sheet 25 of 26
`Sheet 25 of 26
`
`5,933,498
`5,933,498
`
`
`
`Sd5JOSLYVdYAHLO
`
`SAYVMLAOS
`
`LINS3YAONOILN10S4uY
`
`
`
`“HONVGALdAYONA
`
`NOILVWHYOSNI
`
`9c}
`
`
`
`NOILVTNOTVONOILN1OSaY
`
`ANILNOW
`
`801
`
`
`
`(Wez‘Did
`
`FIG. 23(b)
`
`cee (e)ez
`
`“DI
`
`G. 23(a)
`
`NOILNTOS3Y
`
`NOILVINITVI
`
`FINILNOY
`
`
`
`
`U.S. Patent
`
`Aug. 3,1999
`
`Sheet 26 of 26
`
`5,933,498
`
`ENVIRONMENT
`APPLICATIONS/
`
`LEVEL L4
`
`/
`
`G. 24
`
`
`
`1
`SYSTEM FOR CONTROLLING ACCESS AND
`DISTRIBUTION OF DIGITAL PROPERTY
`
`This is a continuation of application Ser. No. 08/584,493,
`filed on Jan. 11,1996, which was abandoned upon the filing
`hereof.
`
`5
`
`FIELD OF THE INVENTION
`Uris invention relates to the control of distribution and
`access of digital property as well as to the payment therefor.
`
`BACKGROUND OF THE INVENTION
`Uie development and deployment of digital information
`networks is accompanied by new concerns for the protection
`of rights to data and information. The U.S. Congress Office
`of Technology Assessment identified the following key
`developments relevant to the area of this invention: there has
`been an overall movement to distributed computing; bound
`aries between types of information are blurring; the number
`and variety of service providers has increased. Information
`Security and Privacy in Networked Environments,
`Congress, Office of Technology Assessment, OTA-TCT-
`606, Washington, D.C.: U.S. Government Printing Office,
`September 1994.
`Computer networks allow more interactivity; and, most
`significantly, electronic information has opened new ques
`tions about copyright, ownership, and responsibility for
`information. Technology, business practice, and law are
`changing at different rates, law arguably being the slowest.
`Intellectual property, or information, is different from real
`property. A major difference between intellectual property
`and real property is that intellectual property can be embod
`ied in forms which can be copied from the owner while the
`owner still retains the original. For example, a broadcast or
`performance of a musical composition can be recorded (and
`copies made of the recording) while the composer retains the
`original composition; a photograph can be reproduced while
`the owner retains the original negative.
`In the past, when information was stored in analog form,
`the copying and redistribution of such information, while
`problematic, did not account for as much economic loss as
`is possible today. Uie storage of information in analog form
`uses a physical medium that is made to have some charac
`teristic vary in proportion with the information to be stored.
`For instance, the groove on a vinyl record captures the
`frequency and intensity (volume) of a sound by the extent of
`its excursion. At each stage in the process of playing a
`record: the stylus tracing the groove, generation of a small
`voltage, amplification of the voltage, and reproduction of the
`sound, small errors are introduced. Today’s high fidelity
`systems are very accurate, but they are not flawless.
`Indeed, copying a vinyl record to a cassette tape results in
`a small, but noticeable, reduction in sound quality. If mul
`tiple generations of recording (e.g., cascaded recordings)
`were undertaken, the resulting product would be noticeably
`inferior to the original. Similarly, when multiple generations
`of photocopies of an image are made, the quality of the
`resulting image is typically poor, with many dark and light
`areas that were not present in the original image.
`It is the inevitable gradual degradation of quality that has
`proven to be a practical disincentive to large scale copying
`of analog information. Notwithstanding this observation,
`where the potential profits are high, such copying is under
`taken even though the resulting product’s quality is signifi
`cantly below that of the original. Videotape copies of movies
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`5,933,498
`
`2
`represent a good example. Some fraction of the marketplace
`is willing to accept a lower quality product in exchange for
`a significantly lower price. Uie logistics associated with
`making large numbers of copies (an inherently serial
`process), including obtaining the raw materials (cassettes),
`the reproduction equipment, and the distribution channels
`also have served to limit illicit production. Finally, the
`quality of the product as well as the markings on the package
`distinguish it from the original and may also serve as a
`disincentive (for some) to purchase an illicit copy.
`Just as the invention of the printing press changed the way
`in which society interacted with information on paper, the
`technical advances in digital computers and communica
`tions in the closing years of the twentieth century have a
`potential for high impact on legal, moral, and business
`practice. The printing press is often credited as an enabling
`mechanism for the Renaissance and the Reformation in
`Europe. The advances in digital information technology will
`similarly impact commerce and law. Digital technology
`enables changing the representation of information without
`changing the content. (Of course the content can be changed
`too.)
`The storage of information in digital form depends on the
`ability to encode information in binary form to arbitrary
`precision and to record that binary form in a physical
`medium that can take on two distinct characteristics. Pre
`serving the fidelity of information recorded in binary (using
`media with two distinct and easily-differentiated
`characteristics) is easily accomplished. For instance, a com
`pact disc stores information (each binary digit or bit) as the
`presence or absence of a hole (depression or pit) that reflects
`or does not reflect light. Compared to the analog recording
`of phonograph records, the information stored in each hole
`is unambiguously a binary digit, the value of which is either
`zero or one. No other values are possible. A digital tape
`stores each bit as a magnetic spot that is oriented either
`north/south or south/north. Today’s digital sound systems
`use sufficiently many bits to capture sound levels beyond the
`ability of the human ear to distinguish a difference and in so
`doing attain so-called “perfect” fidelity.
`A digital file can be copied with no loss of fidelity (as the
`mechanism need only distinguish between two easily-
`differentiated states). With straightforward and well-known
`error-correction mechanisms, even inevitable flaws can be
`made so improbable as to occur fewer than once in ten
`billion bits.
`As a result of the ability to copy a file with no loss of
`fidelity, it is now almost impossible to differentiate a digital
`copy from the digital original. In a network environment
`recording materials, reproduction equipment and distribu
`tion are not impediments to copying. Consequently, in the
`digital domain the threshold inhibiting the making of illicit
`copies is significantly lowered. Evidence that this is the case
`is presented by the Software Publishers Association and by
`the Business Software Alliance, each of which indicates that
`billions of dollars of software is pirated (in the sense of
`being illicitly copied) each year. Additionally, print publish
`ers hesitate to expand into the network marketplace because
`they are unable to control (in the sense of receiving com
`pensation in return for rights) secondary distribution of their
`products as well as incorporation of their products into
`derivative products. Digitally stored information may
`include binary data, computer software, text, graphics,
`audio, and video. Uie uses of this information include news,
`entertainment, education, and analysis. Information may be
`distributed in many ways, including networks, magnetic
`media, CD-ROM, semiconductor memory modules, and
`wireless broadcast.
`
`
`
`3
`Copying and distributing large volumes of digital infor
`mation over long distances is becoming easier and less
`costly. Such changes in cost and convenience of necessity
`impact business decisions concerning producing,
`distributing, promoting, and marketing. The commercial
`relationship among information producers (such as authors,
`performers, and artists), distributors (such as publishers,
`promoters, and broadcasters), and consumers must change in
`response to the technology.
`The law concerning intellectual property is in ferment.
`Major revisions in the laws regarding the protection of
`computer programs have been suggested. A Manifesto Con
`cerning the Legal Protection of Computer Programs,
`Samuelson, P. R. et al., Columbia Law Review, vol. 94, no.
`8, pp. 2308-2431, December 1994. The European Union is
`working on harmonizing protection of intellectual property
`rights with respect to technology and differences in civil and
`common law countries. Commission of the European Union,
`Jul. 19 1995, Green Paper on Copyright and Neighboring
`Rights in the Information Society, catalogue number
`CB-CO-95-421-EN-C, ISSN 0254-1475, ISBM 92-77-
`92580-9, Office for Official Publications of the European
`Communities, L-2985 Luxembourg. In the United States,
`the issue of protection of intellectual property rights is being
`addressed in the context of the National Information Infra
`structure. The uncertainty of legal protection over time and
`from country to country only serves to emphasize the
`importance of and need for technical protection of intellec
`tual property rights in information and data.
`Hie principal technology which has been used for pro
`tecting intellectual property is cryptography. However,
`devising practical retail systems f