Title of Invention

A METHOD OF DISTRIBURING DIGITAL CONTENT REQUESED BY A FIRST PARTY IN A NETWORK AND A DIGITAL CONTENT DISTRIBUTION SYSTEM

Abstract A multiple party system (20) for distributing content. In one embodiment, four parties are involved in the system (20): a consumer (26), a service provider (24), an authenticator (28), and a content provider (22). The distribution of content from the content provider (22) to the consumer (26) is carried out using a predefined protocol, mutating IDs, and licenses. The authenticator (28) controls the distribution of mutating IDs and verifies the identity of one or more participating parties.
Full Text A Method Of Distributing Digital Content Requested by A
First Party In A Network And A Digital Content Distribution System
BACKGROUND OF THE INVENTION
[0002] The invention relates to the distribution of content (which as used herein broadly
encompasses information of all sorts including, but not limited to, messages, text, audio, video,
multi-media materials, and the like). More particularly, the invention relates to the distribution of
such content in a manner that ensures that the copyrights and other simitar legal rights of the
content owner are respected.
[0003] More and more content is being delivered in digital form, and more and more digital
content is being delivered over private and public networks, such as Intranets, the Internet, cable
TV networks, and the like. For consumers of such content, digital versions (as opposed to analog,
paper copy, and other forms) provide various advantages such as enhanced fidelity, improved and
greater playback options, interactivity, and others. Online or network delivery generally offers
greater convenience and timeliness. Online delivery is also cheaper than other delivery methods,
and this benefits content publishers.
[0004] Most current and potential digitally distributed content is, like most books,
distributed in a manner such that the publisher or owner generally gives or sells the content to a
consumer, but continues to restrict rights to use the content even after the content is under the
sole physical control of the consumer. For instance, a content owner typically retains copyright to
the content so that the consumer cannot legally reproduce or publish the work without permission.
Digital content, as opposed to older forms of media, allows a content owner to adjust pricing
according to whether the consumer is allowed to make a persistent copy, or is just allowed to view
the content as it is delivered.
Prior art reference Hunter et a!., U.S. Patent No. 6,647,417, discloses a
music distribution system where music is blanket transmitted to each customer's
computer-based user station. A customer makes a selection for music, the music
is transferred as an encrypted, compressed file, and the customer uses decoding
keys to decode the files. Additionally, an antipiracy "ID tag" is woven into the
recorded music so that any illegal copies therefrom may be traced to the
purchase transaction.
U.S. PreGrant Publication 2004/0024670 discloses a rights management
system using a legality expression language. The legality expression language
includes elements for specifying at least one of an obligation, a prohibition, an
intention, or an assertion. The legality expressions are stored on removable
storage media, smart cards, card readers, card writers, and the like, and can be
authenticated by an interpreter and/or validator. After authentication, a user of a
legality expression may gain access, get a particular right, or the like.
[0005] Despite the worthwhile attributes of digital and network distribution, content owners
are still generally reluctant to distribute content, particularly high-value content, via networks
because unauthorized duplication, piracy, and distribution of digital content (e.g., as was done by
users of Napster) is very easy. Unlike analog recorders, photocopiers, and other older devices,
current technology permits unlimited, pristine copies of digital content to be made. And, in most
instances, copies of the digital content can be made very quickly or nearly instantaneously.
Furthermore, even current protective measures such as public key encryption and the content
scrambling system ("CSS"), which is used for digital versatile discs, have been defeated.
SUMMARY OF THE INVENTION
[0006] In light of the above, there is a need to provide a method and system of distributing
content that ensures that the rights of content owners are respected.
[0007] The present invention provides among other things a multiple party system for
distributing content. In one embodiment, four parties are involved in the system: a consumer, a
service provider, an authenticator, and a content provider. The distribution of content from the
content provider to the consumer is carried out using a predefined protocol, mutating IDs, and
licenses. The authenticator controls the distribution of mutating IDs and verifies the identity of one
or more parties.
[0008] The invention also provides a method for distributing content. In one embodiment,
the method includes having a consumer make a request for content to a service provider and
relaying the request to a content provider. In response to the request, the content provider creates
a license that includes identifying information concerning the service provider and encrypted
information identifying the requested content. The license is sent to the service provider. The
service provider encrypts the license from the content provider with one of its own licenses and
sends this message to the consumer. The consumer encrypts the message to create an
authentication request and sends the authentication request to an authenticator. The authenticator
checks the authentication request and, if valid, informs the content provider to send encrypted
content to the consumer. A decryption key is sent by the authenticator to the consumer so that the
consumer may decrypt and view the content.
[0009] In another embodiment, the invention provides content distribution system that
includes an authenticator and a content provider. The content provider has content and a content
identifier, and generates a first mutating identifier associated with the content identifier. The
system also includes a consumer device that is operable to generate a request for the content. In
addition, the system includes a service provider. The service provider receives the request from
the consumer device, receives the first mutating identifier from the content provider, generates a
second mutating identifier associated with the first mutating identifier, and distributes the second
mutating identifier to the consumer device. The consumer device generates a third mutating
identifier associated with the second mutating identifier, and distributes the third mutating identifier
to the authenticator. The authenticator validates the request and thereafter informs the service
provider of the validity of the request. If the request is valid, the content provider thereafter
encrypts the content and sends the encrypted content to the consumer while the authenticator
sends a decryption code to the consumer.
[0010] As is apparent from the above, it is an advantage of the present invention to
provide a method and system of distributing content. Other features and advantages of the
present invention will become apparent by consideration of the detailed description and
accompanying drawings.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
[0012] Fig. 1 is a schematic illustration of a system of one exemplary embodiment of the
invention.
[0013] Fig. 2 is a schematic illustration of a portion of the system shown in Fig. 1.
[0014] Fig. 3a is an illustration of a bit stream (called a "mutating ID" or "license") used in
one embodiment of the invention.
[0015] Fig.3b and 3c are illustations of ways to distribute mutating Ids.
[0016] Fig. 4 is a schematic illustration of a license structure for one exemplary
embodiment of the invention.
[0017] Fig. 5 is a schematic illustration of another portion of the system shown in Fig. 1.
[0018] Fig. 6 is a schematic illustration of a communication protocol used in the system
shown in Fig. 1.
[0019] Fig. 7 is a schematic illustration of a portion of the system shown in Fig. 1,
iilustrating license distribution to multiple service providers.
[0020] Fig. 8 is a schematic illustration of a mutating identifier cycle used in one form of
the invention.
[0021] Fig. 9a is an exemplary schematic illustration of content key management in one
embodiment of the invention.
[0022] Fig. 9b is an exemplary schematic illustration of data flows that occur when content
is requested under the situation illustrated in Fig. 9a.
[0023] Fig. 10a is an exemplary schematic illustration of content key management in
another embodiment of the invention.
[0024] Fig. 10b is an exemplary schematic illustration of data flows that occur when
content is requested under the situation illustrated in Fig. 10a.
[0025] Fig. 11 is an exemplary illustration of a content request.
[0026] Fig. 12 is an exemplary illustration of a content request showing an approval
phase.
[0027] Fig. 13 is an exemplary illustration of a content request showing a delivery phase.
DETAILED DESCRIPTION
[0028] Before embodiments of the invention are explained in detail, it is to be understood
that the invention is not limited in its application to the details of the construction and the
arrangements of the components set forth in the following description or illustrated in the drawings.
The invention is capable of still other embodiments and of being practiced or being carried out in
various ways. Also, it is to be understood that the phraseology and terminology used herein is for
the purpose of description and should not be regarded as limiting.
[0029] In particular it should be understood that the invention is implemented using
various computer devices, such as personal or home computers, servers, and other devices that
have processors or that are capable of executing programs or sets of instructions, including special
purpose devices such as set top boxes. In general, the invention may be implemented using
existing hardware or hardware that could be readily created by those of ordinary skill in the art.
Thus, the architecture of exemplary devices wili not be explained in detail, except to note that the
devices will generally have a processor, memory (of some kind), and input and output devices. In
some cases, the devices may also have operating systems, and application programs that are
managed by the operating systems. The hardware devices will also generally need some ability,
depending on the role of the device in the particular embodiment of the invention implemented, to
compress or decompress data and to encode data or decode encrypted data. In many instances,
a decompression capability may be provided using available codecs, such as a hardware-
implemented MPEG codecs. A decryption capability may be provided using a decryption hardware
or software module capable of decrypting data that is encrypted using the encryption algorithm
chosen. One encryption algorithm that is suitable for use in embodiments of the invention is the
Rijndael algorithm, an example of which is available at
http://www.esat.kuleuven.ac.be/~rilmen/riindael/rii ndaelref.zip.
[0030] Fig. 1 illustrates an exemplary system 20 configured to distribute content over a
network. In reality, one or more networks or communicationsystems such as the internet, the
telephone system, wireless networks, satellite networks, cable TV networks, and various other
private and public networks could be used in various combinations to provide the communication
links desired or needed to create embodiments or implementations of the invention, as would be
apparent to one of ordinary skill in the art. Thus, the invention is not limited to any specific network
or combinations of networks. However, it is preferred that the networks or communication system
used have .the ability to support secure communications such as communications with data
encrypted with a version of Rijndael encryption, secured socket layer ("SSL") communications, or
others. Furthermore, data can be transferred from one party to another with wire, DSS, or physical
media being physically carried from one party to another.
[0031] In the embodiment shown, the system 20 includes four participants: a content
owner or provider 22, a service provider 24, such as a cable company, Internet service provider, or
the like, a consumer 26, and an authenticator 28. Although, only one content provider, service
provider, and customer are shown, in most implementations of the invention numerous content
providers, service providers, and customers will be involved. Further, there could even be multiple
authenticators, although only one is required. In practice, it is likely that the following relationship
will exist: no. of authenticators customers, but again there is no limit on the number of participants or any requirement of a
particular relationship between the numbers of the various types of participants.
[0032] The participants 22,24,26, and 28 are connected to each other via two-way links
30, 32, 34, 36, and 38. These links may be a constructed from all or part of the networks
mentioned above. The system 20 uses a key-based encryption algorithm and currently available
algorithms such as the Rijndael algorithm may be used. The ultimate choice for the algorithms
used will depend on a variety of factors including a trade off between the strength of the algorithm
(in terms of being broken) and speed (in terms of a processor's capability to perform the
mathematical operations required by the chosen algorithm).
[0033] In one embodiment of the invention, it is assumed that the customer has a
decoding processor or similar device, which may, for example, take the form of a "set top box,"
home computer, or other device. In this same embodiment, it is assumed that the decoding
processor is in a "hostile environment," in the sense that customer may possibly want to tamper or
otherwise circumvent rights management features of the decoding processor. Thus, it is preferred
that the decoding processor be housed in a container that has the ability to detect intrusions to its
interior. It is also preferable, that the decoding processor have "persistent" memory such as non-
volatile RAM, EPROM, or other storage where data remains intact after the removal of power. The
persistent memory is used to store identification information, which may be a "mutating ID" that
changes over time.
[0034] In preferred embodiments, the system 20 uses a random number generator to
generate certain numbers used by a protocol implemented or followed by the system. It is
preferred that the random number generator produce numbers that are as truly random as is
possible with the particular technology used to implement the invention. In one embodiment,
communication traffic, such as requests from customers to obtain content, is used to create
random numbers. Such requests occur, in general, in an unpredictable manner. Thus, the
random numbers generated based on such traffic are also truly or nearly truly random, as opposed
to pseudo random numbers generated with algorithmic methods.
[0035] In the exemplary embodiment shown, each of the parties 22-28 in the system 20
has different responsibilities and it is assumed that each party trusts the authenticator 28. Further,
it is preferable that content provider 22, service provider 24, and consumer 26 be assigned a
changing or mutating identifier ("ID"), which is explained further below.
Content Provider
[0036] The content provider 22 is an entity such as a movie studio, recording company, or
any other entity that wishes to distribute content electronically. In general, it is assumed that the
content provider 22 owns the copyright or other intellectual property rights in the content or is
authorized by the owner of such rights to distribute the content. It is assumed that the content
provider 22 wants to be reimbursed fairly for each copy of its content distributed using the system
20. Thus, in one preferred embodiment of the invention, the system 20 is configured such that the
content provider 22 can produce a virtual inventory of its content (i.e., a list of mutating IDs
(generally created as needed)), where each mutating ID represents a license to view or in some
cases maintain a copy of the content provided. The virtual inventory (or set of licenses) may be
assigned to various distribution entities, such as one or more service providers. As the virtual
inventory is consumed, the consumption is tracked in order to record, log, or note which service
provider 24 provided the content to one of the consumers. For instance, tracking of the virtual
memory allows a content provider such as a movie studio, which has sold distribution rights to a
cable company and a satellite broadcasting company, to determine which of the entities, the cable
company or the satellite broadcasting company, distributed the content to the subject consumer.
The tracking system also allows the consumption activity of individual consumers to be recorded or
logged. In preferred embodiments, the content provider 22 is the sole encrypter of its content and
controls the decoding of the content by, for example, denying a request, as explained further
below.
Service Provider
[0037] In the embodiment shown, the service provider 24 distributes content of the
content providers. However, service providers may also have several addition responsibilities,
including identification of themselves and the subject content with mutating IDs. In the
embodiments described, content cannot be decoded by a user such as the consumer 26 without
the appropriate mutating IDs. In many scenarios, the service provider 24 provides the requested
content off of or from a storage device that is local to the service provider 24. However, the
invention is not limited to any particular location of the content and content may be retrieved from
storage of the content provider 22 and then transferred to the consumer 26. In preferred
embodiments of the invention, every service provider 24 sees each request from consumers in the
system 20 and receives authentication from the authenticator 28. In some embodiments, any one
of the service providers in a particular embodiment may be responsible for shipping or transferring
the content to the consumer. This allows content providers to avoid having to deliver their content
to service providers, if they so desire. In other words, the service provider 24 need not possess
(such as by maintaining encrypted copies in local storage) the content that is ordered by
consumers.
Consumer
[0038] It is assumed that at least some consumers may wish or attempt to view content
without paying for it. Therefore, measures are provided to prevent unauthorized viewing of
content. The mutating IDs mentioned above provide one mechanism by which content decoding
and, therefore, viewing is controlled. By encapsulating multiple mutating IDs, the set top box is
able to prove to the authenticator 28 that 1) the set top box is a licensed decoder of the content, 2)
the service provider 24 is a licensed distributor of the content, and 3) the content itself was
licensed for use by the content provider 22 for the consumer, as will be explained in greater detail.
Authenticator
[0039] The authenticator 28 is the repository that holds the data necessary to decode a
particular piece of content. In the embodiments discussed, the authenticator 28 verifies the
consumer 26, the service provider 24, and the content by their mutating IDs before sending any
decoding information to the subject consumer 26. The authenticator 28 is also the source of
mutating IDs and keeps track of such IDs using a database or similar mechanism.
Mutating ID
[0040] An exemplary mutating ID 38 (sometimes referred to as a "license") is shown in
Fig. 3a. The mutating ID 38 is an identifier having two portions: a first portion 40 and a second
portion 42. The first portion 40 is an identifying number, which is a random number. The second
, portion 42 is an encoding/decoding key, also a random number and preferably a symmetric cipher
key. As implemented in the embodiments discussed herein, a mutating ID can be used only once
and then can not be used again. Mutating IDs are generated and tracked by the authenticator 28.
Because the mutating IDs are one-time-use mechanisms, once a service provider or consumer or
other entity has used its supply of mutating IDs, additional mutating IDs must be obtained from the
authenticator 28. The data in a mutating ID is chosen at random with an equal probability of all
possible mutating IDs. While it is preferred that the mutating ID parts be random, the parts are
generated such that they cannot be derived from each other by any means. When a collision
occurs in the ID parts, a new one is reassigned. As a result, part of the ID is completely random
while the other part is less random. Once a request or decode for specific content has been made,
the three mutating IDs (consumer, service provider, content) are discarded and new mutating IDs
generated for additional transactions, in a manner described in more detail below. Information
regarding how mutating IDs are distributed to parties in the system 20 is also provided in Figs.3b and 3c.
Protocol
[0041] The system 20 uses a protocol to govern communications between entities. Each
entity is randomly assigned a one-time-use identifier (such as the identifier shown in FIG. 3A) that
is to be tagged onto a previously mutated identifier by the authenticator 28. Each identifier
includes a random license number 40 and a random corresponding coding key 42. The one-time-
use identifier takes the form of a modified hash. In addition to being random, the one-time-use
identifier or the hash is immediately discarded after each decryption. In other words, the protocol
generates a new random number that has never been used when a hash or a one-time-use
identifier is needed. In addition to identifying the content to be distributed, the one-time-use
identifier is also completely unrelated hash from the content being encrypted. That is, the hash
does not contain any information of the content including the identity of the entity. In this way, the
identities of the entities are blind to all participants except for the authenticator 28.
[0042] After the authenticator 28 randomly assigns an identifier to the content, the content
provider will then catalog the virtual inventory for distribution. The random identifier provides a
non-deterministic or a random component to the encryption of the identifier. Since there is non-
deterministic information in the identifier, there can be no decoding information gained by knowing
the decoding key. By identifying everything encoded with one of the decoding keys generated by
the authenticator 28, the authenticator 28 can identify who asked for them, when they asked for
them, and for what purpose they asked for them.
[0043] There are four pieces of information to be distributed by the authenticator 28. The
first is the requested content or the content to be distributed. The second and third are a decode
license to be used by the consumer 26 once the license is authenticated, and a distribution license
for distributing the encrypted content to the consumer 26. The last is a consumer identifier. To
decrypt the content, the decryption takes place in reverse order to the path of distribution. By
encapsulating or stacking one inside another or tagging one to another, the encrypted data is
secured. Even if it were possible to obtain the encrypted data, it is considered infeasible to break
since the encryption used is at least as strong as Rijndael.
[0044] As a result, the preferred embodiments of the system 20 are implemented with an
encryption algorithm and a random number generator. Preferably, the encryption algorithm is a
symmetric key-based encryption algorithm. The keys are permutation identifications, offsets, and
skips. All three could be bundled into one object called a "key." Therefore, any key based
encryption algorithm can be used in embodiments of the invention. Since introducing a new
encryption algorithm can be a very time consuming process, the system 20 was created to allow
already existing and tested key-based encryption algorithms to be used.
[0045] With respect to generating a random number, in the embodiment shown, three
different procedures are used. Of course, other combinations of random number procedures can
also be used to generate a random number. The first random number generation procedure is a
standard congruential random number. The first random number generation generates a random
number that is used to determine a sampling rate of a random stream.
[0046] Acquiring a random stream is a difficult part of the entire random number
generation process. By conventional definition, a random stream or a set of numbers is
considered random if and only if the set is the most compact way to represent the numbers. For
instance, given the set 2, 4, 6, 8,10, ©, a more compact representation would be {2i\i e Z+} or any
even number in the positive integer number set. Another way to state this is a set of numbers for
which there is no discernable "pattern." The goal of encrypted communication is to remove all
patterns from the encrypted data being transmitted so that intelligent guessing cannot be used to
decrypt the encrypted transmitted data. In embodiments of the system 20, the authenticator 28
provides all the random numbers used in the distribution and transmission of content. As
discussed in more detail, the sequence of generated numbers is a sequence of random numbers
or a random stream, or at least a close approximation to a random stream.
[0047] The third process of the random number generator is to ensure that there is no
deterministic way to retrieve the next number. The random streams coming into and leaving the
authenticator 28 are encrypted and thereby contain encrypted data. This non-deterministic
mechanism used to generate the random stream helps ensure that the random number sequence
cannot be represented by a more compact expression, hence defining a random stream.

[0048] For example, the authenticator 28 is designed to receive requests to decode
various content. These requests will reach the authenticator 28 in a random order. For instance,
suppose customer X requests the keys to movie Y, and customer W requests the keys to song Z,
etc. These requests are formalized by the protocol as sequences of numbers that have been
arbitrarily chosen either to be intentionally arbitrary or encrypted by an arbitrary key. Since the
requests are arbitrary in nature and are processed in an arbitrary fashion, a stream of random
numbers is naturally generated. By sampling this stream in a semi-arbitrary way (i.e., congruential
random number), a very good sequence of random numbers is generated.
[0049] In one embodiment, the protocol used in the system 20 combines a packet
assembly disassembly generator or PAD, key pairing, and a RC4 random stream cipher. More
specifically, to encrypt the information in a window of data, a PAD series is generated once a PAD
generator is chosen. A second random stream P is generated based on the PAD series in the
following manner:

where pk is the k-\h element of the P series, and pad(k) modnn is the j-th element of the PAD series.
That is, every element of the P series is a combination of exclusive-ORing of the elements in the
series generated by the PAD generator. The key pair generally includes a public key and private
key. These key do not have any mathematical relation. They are generated randomly and
independently of each other. The keys themselves are simply twenty or more digit numbers. Each
entity has a unique key pair.
[0050] An exemplary embodiment of the protocol will now be discussed in greater detail.
In the embodiment shown, the content provider 22 performs encryption (and is sometimes referred
to as the "encrypter"). The content provider 22 encrypts content with a particular key or set of keys
K. The content provider 22 may store or keep the set of keys K or, alternatively, the authenticator
28 may maintain the set of keys. If so maintained, the authenticator 28 maintains the set of keys K
in secret. The content of the content provider is assigned a secret identifying label (e.g., a number
that, in general, never changes). The label is given to the authenticator 28 and the authenticator
associates the label with the keys needed to decode the encrypted content. The association is
indirect, as the association process does not provide any entity access to the actual keys. The
encrypted content can now be given to the service provider 24 or another entity without fear of
unauthorized decoding, because only the content provider and the authenticator have the actual
keys needed to decrypt the content. At this point, the content provider 22 creates the virtual
inventory for the content. This involves asking the authenticator 28 for as many mutating IDs as
the content provider 22 needs or wants to have. Each mutating ID represents a license allowing
exactly one use or consumption of the content. As mentioned earlier, the mutating ID is a number
and a key. The content provider 22 encrypts the identifying label with the mutating ID key and
groups the mutating ID number and encrypted identifying label into a single piece of data called the
"encrypted identifier," which is represented here as "Econtent."
[0051] As each piece of content is consumed, the authenticator 28 tracks which service
provider 24 the particular content came from and notifies the content provider 22 of each such
decoding. Once it receives content, the service provider 24 combines each encrypted piece of
content with other identifying data before distribution to the consumer 26. Each service provider
24 keeps a collection of mutating IDs on hand that are used to identify that particular service
provider. As with all others, these mutating IDs are created and tracked by the authenticator 28.
The service provider 24 will also have a list of Econtent identifiers for each piece of content. Once
requested, the service provider 24 picks an unused Econten, identifier and one of its unused mutating
IDs. The service provider encrypts the Econtent identifier with the key of the chosen mutating ID and
attaches the associated number creating a piece of data referred to herein as the "distributable
content" or "Edistrib" The service provider 24 sends the Edisturb content to the consumer 26 and
awaits a confirmation signal from the authenticator 28 that will allow decoding.
[0052] The confirmation signal is received as an encrypted parcel of data that can be
decrypted with the mutating ID key used to create the Edistrib content. The confirmation signal is an
agreed on, secret set of bytes set by the service provider 24 and authenticator 28. Once the
confirmation has been received and verified, the service provider 24 can send the encrypted
content or Econtent identifier to the consumer 26.
[0053] As noted above, it is assumed that the consumer 26 wants to cheat the system 20.
For that reason, all communications between the consumer 26 and the authenticator 28 are
encrypted by some encrypted communication method. The consumer 26 is given only one
mutating ID at a time. When the consumer 26 wants to view or receive some content, the
consumer 26 makes a selection of the desired content using the set top box or hardware in place
at the site of the consumer 26. The hardware device then requests the content from the service
provider 24 who will send the EdiStrib content for a particular decode. Once this has been received
by the consumer 26, the Edistrib content is encrypted with the consumer's mutating ID key and
coupled with the mutating ID number into a consumer identifier referred to as an EcOnsumer identifier.
The Econsumer identifier is then sent to the authenticator 28 for verification. Upon verification, the
authenticator 28 informs the service provider 24 by a secure channel that the consumer's set top
box is licensed to view the subject content. The authenticator 28 also discards the current set top
box mutating ID and sends the set top box a new, unused mutating ID.
[0054] The consumer 26 simultaneously receives, from separate sources, the encrypted
data and keys necessary to decrypt the data. With this, the decoding device can decode the
requested content.
[0055] Generation of mutating IDs and keeping track of them is the primary task of the
authenticator 28. Distribution of mutating IDs to content providers and service providers can be
handled via any acceptable means to both, as long as they stay secret to the respective receiver.
To ensure that consumers do not ever have more than one mutating ID, once an Econsumer identifier
is verified as accurate, a new mutating ID is encrypted using the consumer's current mutating ID
key and sent to the consumer 26. The consumer can then use that ID for the next transaction.
Since the authenticator 28 keeps track of all mutating IDs, it can verify that an Econsunier identifier is
or contains a valid request. To do so, it will find the key associated with the number in the Econsumer
identifier and decrypt it, revealing the Econsumer identifier. If no key can be found, then the
authenticator 28 returns a failure. Using the exact same process, the authenticator 28 recovers
the ECOntent identifier. If no key can be found, then the authenticator 28 returns a failure. Once
again, the authenticator 28 decrypts the Econtenl identifier, if possible. If it is possible, the
authenticator 28 look ups the confirmation code for the service provider 24, encrypts it with the
mutating ID key used by the service provider 24, and returns it to the service provider. A new
mutating ID is then sent, followed by the decoding data. The authenticator 28 then notes or
otherwise records all the participating parties, time, and content involved in the transaction for
billing purposes.
[0056] As was noted above, one aspect of the invention is to ensure that copies of content
are not obtained by unauthorized or unlicensed entities. In the embodiments discussed, obtaining
an unauthorized copy of the content would require a person or entity to intercept a message and
then break the encrypted content. It is assumed that this is impossible, at least in practical terms,
because even if the content was intercepted (which would not be a trivial task) decoding it would
be very difficult. This is so, in part, because it is possible, using the random numbers and
encryption algorithm discussed to create encrypted data that would require a very long time (on the
order of years and in the inventor's opinion, may thousands of years) to decrypt, Types of attack
would generally require correctly guessing or otherwise obtaining an Econsumer identifier. However,
since each mutating ID is used only once by the controller of that ID, there is no way to divine one
Econsumer identifier by inspecting another. Further, since the mutating IDs are calculated to be
random (to the limit of the random number generator), it is infeasible to calculate one mutating ID
from another.
[0057] In addition to providing a high degree of security, the protocol allows for
interchangeable parties at each position. In other words, multiple content providers can use
multiple service providers to reach multiple consumers using the authenticator 28 agreed upon by
all parties. Further, positions can easily be merged or modified to fit many different distribution
models. However, it is generally required that the virtual inventory be maintained by the content
provider 22 and/or service provider. As noted, the virtual inventory is preferably a list including
secret mutating IDs. The virtual inventory may be traded like any other commodity. Thus, rather
than a discrete piece of data being the actual digital content of the desired piece of content, it

becomes the ECOnsumer identifier constructed by a particular set of events leading to one particular
viewing of that content. Since the EconSumer identifier cannot be constructed without cooperation
from all parties involved, all parties have the ability to negotiate and reach a mutually beneficial
arrangement for the consumption of digital content at the demand of the consumer 26. Should one
party decide to not participate, communication with the authenticator 28 can prevent decoding by
withdrawing the consent of one or more parties.
[0058] As was noted above, the system 20 is not limited to just four parties. More
distribution layers can be introduced and verified through the unraveling process in the same
manner. For instance, one service provider 24 can distribute to another service provider. The
authenticator 28 can continue to unravel an Econsumer identifier until it has found a content provider
22. This can be accomplished by the simple recursive algorithm used to create Econsumer identifiers.
The important distinction is that the implementation of the authenticator 28 controls the ultimate
decoding of content based upon the Econsumer identifier. Should a content provider 22 or service
provider 24 want to control the distribution downstream, it is easy to control by informing the
authenticator 28 to deny decoding of content under particular circumstances.
[0059] Additional aspects of embodiments of the invention will now be described with
respect Figs. 4-13.
[0060] Fig. 5 illustrates the overall process of the consumer 26 requesting content in one
embodiment of the invention. First, the consumer 26 makes a request for a particular piece of
content (step 50). The request may include an identifier or label associated with the particular
piece of content that the consumer found using a search engine or catalog of available content.
The label may also be a title of the content such as a movie title or song title. The service provider
24 then requests an encrypted license 52 from the content provider 22 that is associated with the
desired content. The service provider sends the license 52 to the customer 26 (step 54). The
customer's hardware (e.g., a set top box), encrypts the license 52 with a mutating ID (previously
received from the authenticator 28) and sends the now doubly encrypted license 52 to the
authenticator 28 (step 56). The authenticator 28 checks the license 52 for validity. If the license is
valid, the authenticator 28 so informs the service provider (step 58). The service provider then
sends the content to the consumer 26 (step 60). At the same or nearly the same time, the
authenticator 28 sends decoding information to the consumer 26 (step 62).
[0061] As should be apparent from the discussion above, the license 52 undergoes
multiple transformations, in the sense that the license is encrypted multiple times. Fig. 4 illustrates
this process. The content provider creates the license 52 upon receiving a request for particular
content. The license is an encrypted version of the randomly determined, secret identifier that the
content provider created for the subject content. The now once encrypted version of the license
(license 63 in Fig. 4) is sent to the service provider 24. The service provider 24 encrypts the

license again (license 64 in Fig. 4) and the now doubly encrypted version is sent to the consumer
26. The doubly encrypted license is encrypted with the mutating ID of the consumer to create a
thrice-encrypted version (license 65 in Fig. 4). Authentication or verification of the license and
ultimately delivery and decoding of information is then performed as noted in the discussion above
with respect to Fig. 5. Fig. 6 provides another illustration of the process, including the multiple
encryption steps.
[0062] Fig. 7 illustrates that embodiments of the invention may include multiple service
providers. Furthermore, it is envisioned that service providers may have their own content or
licenses to particular content that other service providers may desire. Thus, various requests for
and transfers of licenses (as shown) may occur between service providers in order to make a large
variety of content available to the ultimate consumers of the various service providers participating
in the system 20.
[0063] Fig. 8 illustrates how mutating IDs are implemented in one embodiment of the
invention. As shown, the consumer 26 is assigned a first mutating ID 100. The consumer uses
that mutating ID to confirm its identity (as shown in box 102, which corresponds to step 56 in Fig.
5). However, once the license 100 is used, the authenticator modifies the license 100 or, in other
words, sends a new key pair to the consumer, as shown in box 104. The new key pair, in effect,
creates a new mutating ID 106.
[0064] Figs. 9a and 9b illustrate one way on managing content keys. If desired, the
system 20 may be set up or configured such that the content provider 22 provides a list of content
keys to the authenticator 28. If the system 20 is implemented in this fashion, a request made by
the consumer 26 for content is transferred (through one or more intermediary service providers
and/or other content providers) to the content provider 22 (step 110). The content provider then
sends a license to the consumer 26 (again, through one or more intermediary service providers)
(step 112). The consumer 26 then sends its content license to the authenticator for verification or
authentication (step 114). If verified, verification information is sent to the content provider 22 (step
116). The authenticator 28 then sends the content key to the consumer 26, so that the content can
be decoded and viewed (step 118).
[0065] Figs. 10a and 10b illustrate another way of managing keys. The overall process is
similar to what was described above with respect to Figs. 9a and 9b, except that no keys are sent
to the authenticator 28, but maintained with the content provider 22.
[0066] Figs. 11-13 illustrate ways in which service and content providers can share
content, if desired. One way of sharing content is for each content provider to hold the rights to
certain content to create a license upon receiving a request for the desired content (Fig. 11).
Alternatively, content providers may distribute a predetermined number of licenses to downstream
providers so that they do not have to respond to each request on an individual basis and so that

provider would be able to send appropriate keys needed for decoding based on the mutating ID
stored in the hardware.
Real Time Authentication of User and Real Time Play Back of Content.
[0072] As noted, one difficulty with modern communications systems is ensuring the
authenticity of the communicating parties. In one embodiment of the invention, the system 20 may
be used to encode information such as email messages sent from one party to another. The
sending party acts like the content provider/service provider and the receiving party like the
customer.
[0073] One way to provide extra insurance of authenticity is to send a receiving party
certain random information and require that the recipient process that information and relay it back
to the sender before communication of valuable information begins. For example, randomly
selected sections of text from the U.S. Constitution, the Gettysburg Address, or for that matter any
text from the thousands of manuscripts from the Library of Congress may be sent to the receiving
party. Before any valuable content or information is sent to the receiving party, the randomly
selected text must be properly decrypted and then a duplicate of the information sent back to the
recipient. If the receiving party is unable to do this, then an improper communication connection
has been made or the receiving party is an imposter, who may, for example, have intercepted or
hacked into the communication link of the true recipient. However, without possessing the proper
mutating ID, no decryption of the random text is possible.
[0074] An additional security feature that may be added to the system 20 is real-time play
back of content. As noted earlier, one of the problems for copyright and other legal rights holders,
is that digital content can be copied (at least theoretically) an infinite number of times and the time
need to make each copy is very short. For example, a CD containing seventy minutes of music
can be completely copied in a few minutes. Compressed files may be copied even faster. This
makes large-scale illicit copying of content very attractive to a potential criminal. Once a single
copy of valuable content is obtained, hundreds and possibly thousands of pristine copies can be
made quickly and then sold.
[0075] In embodiments of the system 20, decoding of the content at the consumer 26 or
receiver is done in a real-time fashion, meaning that play back in the system 20 occurs no faster
than playback of the content as intended for the final viewer or consumer. Thus, if a movie has a
running time of 2 hours and twenty minutes, recording of the content sent to the consumer takes
the same amount of time, thereby discouraging large scale copying of the same. It should also be
noted that the system is configured to restrict the number of decryptions that occur. Generally,
only one decryption can be made by the customer. This helps reduce unauthorized copying. It
should also be noted that the content may include known copy protection devices or code before it
is encrypted. These devices maybe used to prevent or reduce unauthorized copying as well.

downstream providers can be assured of having the ability to distribute a certain number of
"copies" of certain content, without having to obtain approval, which could possibly be denied, by
the act of refusing to supply a license, for each individual request that the downstream provider
receives from end consumers (Figs. 12 and 13).
[0067] As should be apparent, the system 20 and the protocol used to implement it can be
used in a variety of applications beyond the secure distribution of content. Many different types of
communications ranging from e-mail, video and multi-media conferencing, data and telemetry
collection, and others may benefit from using all or part of the system 20 to enhance security and
trust. Some of these additional applications are now discussed.
Confirmation of Geographic Location
[0068] As is known, innumerous human activities depend on the human participants
trusting the other participants. Furthermore, participants must feel comfortable that the other
participants are authentic (i.e., not imposters or frauds) and will not renege on promises or
commitments made. In times when most activities took place face-to-face many concerns about
authenticity were reduced. For example, before the existence of the telephone and Internet,
Imposters would have to physically meet and fool any person that the imposter intended to dupe.
With modem communications, it is often impossible for parties to know who thejy are actually
communicating with or where the parties are located.
[0069] Various biometric and other devices exist that can be used to address concerns of
authenticity and trust and many of these can be used with or added into embodiments of the
system 20 described. However, the system 20 also has inherent features that lessen concerns of
authenticity. One of these is the ability to trace, at least to a relatively specific point, the location of
customers ordering content.
[0070] As noted, mutating IDs are implemented in embodiments of the invention and the
consumer 26 is assigned the first mutating ID 100. Subsequent mutating IDs are assigned each
time the consumer desires to obtain content. Further, each customer 26 has a decoding processor
or similar device (e.g., a set top box, home computer, etc.) and the customer's address and name
are associated with that hardware. Each service provider and content provider also has an actual
physical location and address. Because embodiments of the system 20 rely on unraveling multi-
encrypted and encapsulated identifiers, the location of a consumer can, at a minimum, be traced to
the service area of the service provider of the consumer.
[0071] For example, if the customer or a thief moved the customer's hardware to a
location outside of the service area of the service provider 24 and requested content, the
unraveling of the multi-encrypted and encapsulated identifiers would fail, as the new service

Data and Telemetry Collection
[0076] As noted, embodiments of the invention may be implemented where just three
parties participate. The parties include an authenticator, a sending party (by analogy
encompassing the roles and functions of the content provider and service provider), and receiving
party (by analogy encompassing the roles and functions of the consumer). As noted, the system
20 may be configured to implement a secure email system. As should be apparent, the system 20
could also be implemented in a variety of other applications where secure communication could be
useful, such as collecting data from electric and gas meters, equipment and human monitoring
systems, and other data and telemetry collection applications. In general, many existing systems
could be readily modified with exiting processing and communications hardware to allow
communications using the multi-encrypted and encapsulated identifier architecture described
herein.
[0077] As can be seen from the above, the present invention provides a system and
method of distributing content and information with features to protect security and the legal rights
of content owners. Additional features and advantages of the invention are set forth in the
attached claims. And, additional embodiments of the invention could be implemented as would be
apparent to those of ordinary skill in the art by considering the discussion herein and information
provided in the drawings.
WE CLAIM :
1. A method of distributing digital content requested by a first party in a
network, the method comprising the steps of:
generating a first mutating identifier associated with the digital content;
repeatedly mutating a previously generated mutating identifier at at least
one subsequent party, starting with the first mutating identifier;
terminating mutating a previously generated mutating identifier when the
previously generated mutating identifier is authenticated;
encrypting the content based on the previously authenticated mutating
identifier;
distributing the encrypted content to the first party; and
distributing a decryption key to the first party.
2. The method as claimed in claim 1, wherein the encrypted content is
distributed to the first party by a second party, and the decryption key is
distributed to the first party by a third party.
3. The method as claimed in claim 1, comprising providing each of the
parties with a license.
4. The method as claimed in claim 3, comprising tagging the previously
generated mutating identifier with a party license.
5. The method as claimed in claim 1, wherein mutating a previously
generated mutating identifier further comprises the steps of:
tagging the previously mutating identifier with a party license; and
encrypting the previously tagged mutating identifier.
6. The method as claimed in claim 1, wherein the act of terminating mutating
the previously generated mutating identifier when the previously generated
mutating identifier is authenticated comprises the steps of:
decrypting the previously generated mutating identifier; and
validating the decrypted mutating identifier.
7. The method as claimed in claim 1, comprising the step of tracking a use of
the content by a second party.
8. The method as claimed in claim 1, comprising the step of discarding the
previously generated mutating identifier.
9. The method as claimed in claim 8, comprising the step of modifying the
first mutating identifier associated with the content after the content has been
requested.
10. The method as claimed in claim 1, comprising the step of generating a
new first mutating identifier associated with the content after the content has
been requested.
11. A digital content distribution system comprising:
an authenticator;
a content provider, the content provider having content and a content
identifier, and generating a first mutating identifier associated with the content
identifier;
a consumer device, the consumer device operable to generate a request
for the digital content; and
a service provider, the service provider operable to receive the request
from the consumer device over a network, receive the first mutating identifier
from the content provider, generate a second mutating identifier associated with
the first mutating identifier, distribute the second mutating identifier to the
consumer device, the consumer device generating a third mutating identifier
associated with the second mutating identifier, and distributing the third mutating
identifier to the authenticator, the authenticator obtaining a validation of the
request, the authenticates thereafter informing the service provider of the
validation of the request, the content provider thereafter encrypting the content
and sending the encrypted content to the consumer while the authenticator
sends a decryption code to the consumer.
12. The system as claimed in claim 11, wherein the authenticator randomly
generates a content provider license, a service provider license, and a consumer
device license.
13. The system as claimed in claim 12, wherein the first mutating identifier is
modified after the content has been requested.
14. The system as claimed in claim 12, wherein the second mutating identifier
is associated with the service provider license.
15. The system as claimed in claim 12, wherein the third mutating identifier is
associated with the consumer device license.
16. The system as claimed in claim 11, wherein obtaining a validity of the
request comprises decrypting the third mutating identifier.
17. The system as claimed in claim 11, wherein the authenticator tracks the
use of the content.
18. The system as claimed in claim 11, wherein the plurality of the mutating
identifiers are discarded.
19. The system as claimed in claim 11, wherein a new first mutating identifier
is associated with the content after the content has been requested.
20. A method of digital content distribution, the method comprising the steps
of:
making a request by a consumer in a network for digital content;
generating a first mutating identifier associated with the content at a
content provider;
distributing the first mutating identifier from the content provider to a
service provider;
generating a second mutating identifier with the first mutating identifier at
the service provider;
distributing the second mutating identifier from a service provider to the
consumer;
generating a third mutating identifier with the second mutating identifier at
the consumer;
distributing the third mutating identifier from a service provider to an
authenticator;
determining the request from the third mutating identifier;
generating encrypted content based on the request at the content
provider;
distributing the encrypted content to the consumer; and
distributing a key from the authenticator to the consumer.
21. The method as claimed in claim 20, comprising the step of providing each
identifier with a license.
22. The method as claimed in claim 21, comprising the step of tagging the
identifier with the license.
23. The method as claimed in claim 20, wherein the step of mutating an
identifier comprises the steps of:
tagging the identifier with a license; and
encrypting the tagged identifier.
24. The method as claimed in claim 20, wherein the step of determining the
request from the third mutating identifier comprises the steps of:
decrypting the third mutating identifier; and
validating the decrypted mutating identifier.
25. The method as claimed in claim 20, comprising the step of tracking a use
of the content.
26. The method as claimed in claim 20, comprising the step of discarding the
plurality of the mutating identifiers.
27. The method as claimed in claim 26, comprising the step of generating a
new first mutating identifier associated with the content after the content has
been requested.
28. A method of digital content distribution, the method comprising the steps
of:
encrypting a plurality of identifiers, each identifier identifying a party in a
network;
encapsulating the encrypted identifier at each party; and
authenticating one of the parties with the encapsulated identifier.
29. The method as claimed in claim 28, comprising the step of distributing
content based on the authenticated identifier.
30. The method as claimed in claim 29, comprising the step of discarding the
identifier after the distribution.
31. The method as claimed in claim 28, wherein the step of encapsulating the
encrypted identifier comprises tagging an identifier to the encrypted identifier.
32. The method as claimed in claim 28, comprising the step of providing at
least three parties.
33. The method as claimed in claim 28, wherein the step of authenticate
one of the parties comprises decrypting the encapsulated identifier.
34. The method as claimed in claim 28, comprising the step of generating
new identifier for each party.
35. The method as claimed in claim 28, comprising the step of requestin
content from a party.
A multiple party system (20) for distributing content. In one embodiment,
four parties are involved in the system (20): a consumer (26), a service provider
(24), an authenticator (28), and a content provider (22). The distribution of
content from the content provider (22) to the consumer (26) is carried out using a
predefined protocol, mutating IDs, and licenses. The authenticator (28) controls
the distribution of mutating IDs and verifies the identity of one or more
participating parties.

Documents:


Patent Number 224974
Indian Patent Application Number 01706/KOLNP/2005
PG Journal Number 44/2008
Publication Date 31-Oct-2008
Grant Date 29-Oct-2008
Date of Filing 26-Aug-2005
Name of Patentee IMAGINEER SOFTWARE, INC.
Applicant Address 3452 NORTH HACKETT, MIL WAUKEE, WI
Inventors:
# Inventor's Name Inventor's Address
1 SELLARS, WILLIAM 3452 NORTH HACKETT, MIL WAUKEE, WI 53211
2 COCHRAN, WILLIAM K., JR. 205 WEST WILLIAM STREET #101, CHAMPAIGN, IL 61820
3 HUNT, DAVID,C. 2328 ASHMEAD PLACE, APT. 1, WASAHINGTON, DC 20009
PCT International Classification Number G06F 17/60
PCT International Application Number PCT/US2003/029009
PCT International Filing date 2003-09-15
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 10/248,894 2003-02-27 U.S.A.