The present inventions relate generally to computer security, and more particularly to steganographic techniques for hiding or encoding electronic control information within an information signal carried by an insecure communications channel. Still more particularly, the present inventions relate to systems, methods and techniques that substantially invisibly and/or indelibly convey, over analog or other insecure communications channels, digital rights management control information for use within a virtual distribution environment electronic rights management system.
The world is becoming digital. Digital signals are everywhere—in our computers, television sets, VCRs, home stereos, and CD players. Digital processing—which operates on information “bits” (numerical “on” or “off” values)—provides a degree of precision and protection from noise that cannot be matched by the older, “analog” formats we have used since the beginning of the electronic age.
Despite the clear advantage of digital communications, the older “analog” domain remains significant. Many of our most important information delivery mechanisms continue to be based on analog—not digital—signaling. In fact, most of our electronic entertainment, news, sports and music program material comes to us in the form of analog signals. For example:
Moreover, the “real world” is analog. Everything digital must ultimately be turned into something analog if we are to experience it; and conversely, everything analog must be turned into something digital if the power of modern digital technology will be used to handle it. Modern digital technology also allows people to get better quality for less money.
Despite the pervasiveness of analog signals, existing methods for managing rights and protecting copyright in the analog realm are primitive or non-existent. For example:
A related problem relates to the conversion of information between the analog and digital domains. Even if information is effectively protected and controlled initially using strong digital rights management techniques, an analog copy of the same information may no longer be securely protected.
For example, it is generally possible for someone to make an analog recording of program material initially delivered in digital form. Some analog recordings based on digital originals are of quite good quality. For example, a Digital Versatile Disk (“DVD”) player may convert a movie from digital to analog format and provide the analog signal to a high quality analog home VCR. The home VCR records the analog signal. A consumer now has a high quality analog copy of the original digital property. A person could re-record the analog signal on a DVD-R (a Digital Versatile Disk appliance and media supporting both read and write operations). This recording will in many circumstances have substantial quality—and would no longer be subject to “pay per view” or other digital rights management controls associated with the digital form of the same content.
Since analog formats will be with us for a long time to come, rightsholders such as film studios, video rental and distribution companies, music studios and distributors, and other value chain participants would very much like to have significantly better rights management capabilities for analog film, video, sound recordings and other content. Solving this problem generally requires a way to securely associate rights management information with the content being protected.
People have for many years been-using various techniques allowing digital information to, in effect, ride “piggyback” on analog information signals. For example, since the 1960s, it has been common to digitally encode text information such as subtitles into otherwise unused portions of analog television signals (e.g., within the so-called “Vertical Blanking Interval”).
Unfortunately, sending digital information using such known digital encoding techniques is problematic because the digital information is not persistent. It is relatively easy to strip out or eliminate digital information encoded using prior techniques commonly employed for superimposing digital signals onto an analog information signal. Analog communications channels may commonly be subjected to various signal processing that may (intentionally or unintentionally) strip out digital information added to the analog signal—defeating any downstream system, process or technique that depends on the presence and readability of the digital information. For example, the television vertical blanking signal—along with any signal components disposed within the vertical blanking interval—is typically routinely eliminated whenever a video signal is processed by a computer.
Attempting to use insecure techniques for providing rights management is at best ineffective, and can be worse than no rights management at all. Unscrupulous people can strip out insecure control information altogether so that the corresponding information signal is subject to no controls at all—for example, defeating copy protection mechanisms and allowing users to avoid paying for rights usage. More nefariously, an unscrupulous person could alter an insecure system by substituting false control information in place of the proper information. Such substitutions could, for example, divert payments to someone other than legitimate rights holders—facilitating electronic fraud and theft.
Prior, insecure techniques fail to solve the overall problem of how to provide and securely manage advanced automatic electronic rights management for analog and other information signals conveyed over an insecure communications channel. The lack of strong rights management for analog signals creates a huge gap in any comprehensive electronic rights management strategy, and makes it possible for consumers and others to circumvent—to at least some extent—even the strongest digital rights management technologies. Consequently, there is a real need to seamlessly integrate analog delivery models with modern electronic digital rights management techniques.
The present inventions solve these and other problems by providing “end to end” secure rights management protection allowing content providers and rights holders to be sure their content will be adequately protected—irrespective of the types of devices, signaling formats and nature of signal processing within the content distribution chain. This “end to end” protection also allows authorized analog appliances to be easily, seamlessly and cost-effectively integrated into a modern digital rights management architecture.
The present inventions may provide a Virtual Distribution Environment (“VDE”) in which electronic rights management control information may be delivered over insecure (e.g., analog) communications channels. This Virtual Distribution Environment is highly flexible and convenient, accommodating existing and new business models while also providing an unprecedented degree of flexibility in facilitating ad hoc creation of new arrangements and relationships between electronic commerce and value chain participants—regardless of whether content is distributed in digital and/or analog formats.
The present inventions additionally provide the following important and advantageous features:
Briefly, the present inventions use “steganography” to substantially indelibly and substantially invisibly encode rights management and/or electronic commerce rules and controls within an information signal such as, for example, an analog signal or a digitized (for example, sampled) version of an analog signal.
The Greek term “steganography” refers to various “hidden writing” secret communication techniques that allow important messages to be securely carried over insecure communications channels. Here are some examples of steganography:
The present inventions use steganography to ensure that encoded control information is both substantially invisible and substantially indelible as it passes over an insecure communications channel. At the receiving end, a secure, trusted component (such as a protected processing environment described in Ginter et al.) recovers the steganographically-encoded control information, and uses the recovered information to perform electronic rights management (for example, on analog or other information signals carried over the same channel).
One specific aspect provided by the present inventions involve steganographically encoding digital rights management control information onto an information signal such as, for example, an analog or digitized television, video or radio signal. The steganographic encoding process substantially inextricably intertwines the digital control information with images, sounds and/or other content the information signal carries—but preferably without noticeably degrading or otherwise affecting those images, sounds and/or other content. It may be difficult to detect (even with educated signal processing techniques) that the analog signal has been steganographically encoded with a rights management control signal, and it may be difficult to eliminate the steganographically encoded control signal without destroying or degrading the other information or content the signal carries.
The present inventions also provide a secure, trusted protected processing environment to recover the steganographically-encoded control signal from the information signal, and to enforce rights management processes based on the recovered steganographically encoded control signal. This allows the information signal delivery mechanism to be fully integrated (and made compatible) with a digital virtual distribution environment and/or other electronic rights management system.
In accordance with yet another aspect provided by this invention, steganographically encoded, digital rights management control information may be used in conjunction with a scrambled and/or encrypted information signal. The scrambling and/or encryption can be used to enforce the rights management provided in accordance with the steganographically encoded rights management control information. For example, the control signal can be steganographically decoded and used to control, at least in part, under what circumstances and/or how the information signal is to be descrambled and/or decrypted.
In accordance with yet another feature provided by the invention, digital certificates can be used to securely enforce steganographically encoded rights management control information.
In accordance with still another feature provided by the invention, steganography is used to encode an information signal with rights management control information in the form of one or more protected organizational structures having association with electronic controls. The electronic controls may, for example, define permitted and/or required operation(s) on content, and consequences of performing and/or failing to perform such operations. The organizational structure(s) may identify, implicitly or explicitly, the content the electronic controls apply to. The organizational structure(s) may also define the extent of the content, and semantics of the content.
The type, amount and characteristics of the steganographically encoded rights management control information are flexible and programmable—providing a rich, diverse mechanism for accommodating a wide variety of rights management schemes. The control information can be used to securely enforce straightforward secure rights management consequences such as “copy/no copy/one copy” type controls—but are by no means limited to such models. To the contrary, the present invention can be used to enable and enforce much richer, more complex rights management models—including for example those involving usage auditing, automatic electronic payment, and the use of additional electronic network connections. Moreover, the rights management control arrangements provided by the present invention are infinitely extensible and scaleable—fully accommodating future models as they are commercially deployed while preserving full compatibility with different (and possibly more limited) rights management models deployed during earlier stages.
The organizational structure(s) may be steganographically encoded in such a way that they are protected for purposes of secrecy and/or integrity. The employed steganographic techniques may provide some degree of secrecy protection—or other security techniques (e.g., digital encryption, digital seals, etc.) may be used to provide a desired or requisite degree of security and/or integrity protection for the steganographically encoded information.
In one example, the organizational structure(s) may comprise digital electronic containers that securely contain corresponding digital electronic control information. Such containers may, for example, use cryptographic techniques. In other examples, the organizational structure(s) may define associations with other electronic control information. The other electronic control information may be delivered independently over the same or different communications path used to deliver the organizational structure(s).
In one example, the steganographic techniques employed may involve applying the organizational structure information in the form of high frequency “noise” to an analog information signal. Spectral transforms may be used to apply and recover such steganographically-encoded high frequency “noise.” Since the high frequency noise components of the information signal may be essentially random, adding a pseudo-random steganographically encoded control signal component may introduce substantially no discernible information signal degradation, and may be difficult to strip out once introduced (at least without additional knowledge of how the signal was incorporated, which may include a shared secret).
In accordance with another aspect provided by the invention, a steganographic encoding process analyzes an information signal to determine how much excess bandwidth is available for steganographic encoding. The steganographic encoding process may use variable data rate encoding to apply more control information to parts of an information signal that use much less than all of the available communications channel bandwidth, and to apply less control information to parts of an information signal that use nearly all of the available communications channel bandwidth.
In accordance with still another aspect provided by the invention, multiple organizational structures may be steganographically encoded within a given information signal. The multiple organizational structures may apply to different corresponding portions of the information signal, and/or the multiple organizational structures may be repetitions or copies of one another to ensure that an electronic appliance has “late entry” and/or error correcting capability and/or can rapidly locate a pertinent organizational structure(s) starting from any arbitrary portion of the information signal stream.
In accordance with yet another aspect provided by this invention, an organizational structure may be steganographically encoded within a particular portion of a content-carrying information signal to which the organizational structure applies—thereby establishing an implicit correspondence between the organizational structure and the identification and/or extent and/or semantics of the information content to which the organizational structure applies. The correspondence may, for example, include explicit components (e.g., internally stated start/end points), with the storage or other physical association determined by convenience (i.e., it may make sense to put the organizational structure close to where it is used, in order to avoid seeking around storage media to find it).
In accordance with yet another aspect provided by this invention, pointers can be steganographically encoded into parts of an information signal stream that has little excess available bandwidth. Such pointers may be used, for example, to direct an electronic appliance to portions of the information signal stream having more available bandwidth for steganographic encoding. Such pointers may provide improved steganographic decode access time—especially, for example, in applications in which the information signal stream is stored or otherwise available on a random access basis.
These and other features and advantages provided by this invention may be better and more completely understood by referring to the following detailed description of presently preferred example embodiments in conjunction with the drawings, of which:
In this example, a provider 60 delivers an information signal 70 to multiple electronic appliances 100(1), . . . , 100(N). In this particular example, provider 60 is shown as being a television broadcaster that delivers an analog television information signal 70 over a wireless or cable communications path, and appliances 100(1), . . . , 100(N) are shown as being home color television sets 106. As made clear by
In the
The provider 60 encodes the electronic rights management control information 126 onto information signal 70 using steganographic techniques that make the control information both:
The control information 126 is substantially indelibly encoded because, in this example, it is substantially inextricably intertwined with the television images and/or sound—and can't easily be eliminated from information signal 70 without destroying the images, sound or other information carried by the information signal. For example, steganographically encoding rights management control information will generally survive compression and decompression of a digitized analog signal, and will also survive repeated analog/digital/analog conversion sequences.
Even though the steganographically encoded control information 126 is substantially indelible, the television viewer is not bothered by the steganographically encoded information because the steganographically encoded rights management control information is, in this example, also encoded substantially invisibly. In fact, the viewer may not be able to see the steganographic control information at all—and it may have no effect whatsoever on his or her viewing experience (other than in terms of the effect is has on associated rights management processes). The control information 126 is shown in dotted lines on the
Since indelibility of the steganographic encoding provides persistence, indelibility may be more important than invisibility in at least some applications. For example, it may be desirable in some applications to use a shared secret to decode and then remove the steganographically-encoded control information 126 before presenting the information signal (or its content) to the user. The steganographically encoded information need not be particularly invisible in this scenario. Even though someone with knowledge of the shared secret can remove the steganographically encoded information, it may nevertheless remain substantially indelible to anyone who doesn't know the shared secret required to remove it.
Organization Structures
The organizational structure(s) may be encoded in such a way that they are protected for purposes of secrecy, authenticity and/or integrity. The employed steganographic technique may provide such protection, or another security technique may be used in conjunction with steganography to provide a desired or requisite degree of protection depending on the application. Containers 136 may, for example, use mathematical techniques called “encryption” that help guarantee the integrity and/or secrecy of the control information 126 they contain.
Each of the
The ability to securely deliver digital control information to such protected processing environments as embodied with components 124 is important at least because it increases flexibility and enhances functionality. For example, different digital control information can be delivered for the same or different electronic content. As one specific example, one set of rules may apply to a particular television program, another set of rules might apply to a particular film, and a still different set of rules could apply to a particular musical work. As yet another example, different classes of users of the same electronic content can receive different control information depending upon their respective needs.
Rights management components 124 are able to steganographically decode the control information 126 carried by the information signal 70. Components 124 use the decoded control information 126 to electronically manage rights. For example, components 126 may use the decoded control information 126 to control how the images and/or sound carried by information signal 70 may be used.
In one example, digital rights management component 124 may comprise or include one or more integrated circuit chips as shown in
The analog-to-digital converter (ADC) 130 shown in
The present inventions may be used with all sorts of different kinds of electronic appliances 100 each of which may include a rights management component 124.
Different rights holders want different types of rights management and control. For example, some rights holders may be completely satisfied with a relatively simple “copy/no copy/one copy” rights management control model, whereas other rights holders may desire a richer, more complex rights management scheme. The present inventions flexibly accommodate a wide variety of electronic rights management techniques—giving rightsholders extreme flexibility and programmability in defining, for example, commerce and rights management models that far exceed the simple “copy/no copy, one copy.” Assuming a closed appliance, that is, one lacking at least an occasional connection to a payment method (e.g., Visa, MasterCard, American Express, electronic cash, Automated Clearinghouses (ACHs) and/or a Financial Clearinghouse that serves as the interface for at least one payment method), the following are non-limiting examples of steganographically encoded rights controls and associated consequences that can be accommodated by the present invention:
An even more flexible and diverse array of rights controls and associated consequences are enabled by the present inventions if at least one appliance is connected to some form of communications “backchannel” between the appliance and some form of payment method. This backchannel may be a telephone call, the use of a modem, a computer data network, such as the Internet, a communications channel from a settop box to the head end or some other point on a cable TV distribution system, or a hybrid arrangement involving high bandwidth distribution of analog properties with a slower return channel, a phone line and modem—just to name a few examples. Non-limiting examples of such more rights controls and associated consequences enabled by the present invention include the following:
In the
In a more secure example, the incoming analog signal is scrambled, and the
In the
The steganographic techniques provided by the present invention ensure that the electronic controls 126 persist in the signal A delivered from appliance 100A to appliance 106B—and from appliance 106B to still other appliances. Because of the substantial indelibility characteristics of the steganographically encoded control information 126, this information persists in the signal as stored on recording medium 104, in copies of the recorded signal produced by replaying the medium, and in further downstream versions of the signal.
This persistence will, for example, survive conversion from analog to digital format (e.g., sampling or “digitizing”), storage, and subsequent conversion from digital to analog format. For example, because the steganographically encoded control information 126 is substantially indelibly, substantially inextricably intertwined and integrated with the information signal A, the digitized version of the information signal that appliance 100A records on medium 104 will also contain the steganographically encoded control information 126. Similarly, when appliance 100A plays back the recording from medium 104, it will reproduce information signal A along with the steganographically encoded control information 126. The steganographically encoded control information 126 thus persists irrespective of digitization (or other processing) of signal A. In some cases, lossy compression techniques used on the data may remove high frequency noise—thereby potentially damaging the steganographic channel. When these lossy compression techniques are used or may be encountered, the steganographic encoding function should be matched to the compression algorithm(s) using conventional signal analysis techniques to avoid this consequence.
Similarly, appliance 106B may output further copies or versions of signal A in analog form and/or digital form. Because of its inherently persistent characteristics, the steganographically encoded control information 126 will be present in all subsequent versions of the signal outputted by appliance 106B—be they in analog format, digital format, or any other useful format.
Degrading a digital signal carrying control information is fatal—the rights management system typically may no longer function properly if even a single bit is altered. To avoid this, the preferred embodiment provides redundancy (repeating pointers and the organizational structures and/or any control information incorporated into the organizational structures), and also uses conventional error correction coding such as, for example, Reed-Solomon (or similar) error correcting codes. Additionally, because the steganographically encoded control information 126 is substantially inextricably intertwined with the desired content carried by information signal A, any process that degrades the steganographically encoded control information 126 will also tend to degrade the information signal's desired content. Although the steganographically encoded information may degrade (along with the content) in multi-generation “copies” of the signal, degraded copies may not be commercially significant since the information content of the signal will be similarly degraded due to the substantially inextricable intertwining between the steganographically encoded control information 126 and the content carried by signal A. The refresh circuit shown in
The
Control information portions 126(1), 126(2), 126(3), 126(4) and 126(5) may all be different. For example, control information 126(1) may permit the user to copy trailer 272, whereas control information 126(4) may prohibit the user from copying the first five minutes 278 of the film.
As shown in
Referring to
A steganographic encode block 406 may be used to steganographically encode digital control information 126, in clear text form and/or after encryption by a conventional digital encryption block 414 based on an encryption key Key, Steganographic information can be combined with a pseudo-random data stream (e.g. exclusive-or'd into the output of a DES engine)—in effect shuffling around the noise in the signal rather than replacing noise with the signal, per se. When protection is desired, the values in the pseudo-random stream can be protected by encryption (e.g. the key that initializes the DES engine should be protected). When the steganographic channel is “public” (e.g., unencrypted), the stream should be readily reproducible (e.g. by using one of a preset collection of values shared by every device). A small portion (a “public header”—see Ginter et al.) is always detectable using a shared preset value (that does not need to be protected, distinguishing it from the private header keys), may be provided to ensure that the rights management technology can be activated properly. Since the rights management component 124 at the receiving side needs to know how to descramble the signal, there normally will be an indication in the “public header” that names a key that will be used to unlock the private header (and so on, as described, for example, in Ginter et al.). Some publicly available, agreed upon preset values may be used to extract the “public header” information from the steganographically encoded channel.
Steganographic encode block 406 may be any conventional steganographic encoding arrangement capable of steganographically encoding a digital signal onto information signal 70. Steganographic encode step 406 may be based on a key Kc—allowing the same basic steganographic encoding and decoding transformations to be used by a wide variety of different appliances while still maintaining individuality and secrecy through the use of different steganographic keys.
In one example, the steganographic encoding step 406 may introduce the (encrypted) digital control information into the high frequency spectrum portion of the spectrally transformed information signal 70. The spectrally transformed signal with steganographic encoding is shown in the
The amount of amplitude modification performed by steganographic encode step 406 may be limited in this example to ensure that the resulting steganographically encoded signal does not exceed the available channel bandwidth. See, for example,
The following equations show the relationship between total bandwidth, bandwidth available for steganographic encoding, and the data rate of the steganographically encoded signal:
where Δt=tn+1−tn, and
In the above expressions, the function S corresponds to an area under a curve resulting from the product of B (bandwidth) and t (time). The parameter delta t refers to the “granularity” of the analog-to-digital conversion (i.e., 1/sampling rate).
Steganographic encode block 406 can use an encoding rate and characteristic that ensures the steganographically encoded signal bandwidth doesn't exceed the total bandwidth available in the communication channel. Typically, the amount of bandwidth available for steganographic encoding may be on the order of on the average of 0.1% of the total transmission channel bandwidth—but as mentioned above, this bandwidth available for steganographic encoding may be unequally distributed with respect to time within the information signal stream 70 and may depend on the content of the information signal.
In this example, steganographic encode block 406 analyzes the content (e.g., by performing statistical weighted averaging), and provides a responsive variable steganographic encoding rate. For example, steganographic encoding block 406 can use a high data rate during example time periods “II” and “IV” in which the information signal 70 has characteristics that allow high steganographic rate encoding without the resulting signal exceeding the available overall channel bandwidth. Encoding block 406 can use a low data rate during time periods “I” and “III” in which the information signal 70 has characteristics that do not allow high data rate steganographic encoding without exceeding available overall channel bandwidth. Steganographic encoding block 406 may use any number of different variable rates to accommodate different relationships between information signal 70 characteristics and available channel bandwidth.
Referring again to
This signal may be further scrambled and/or encrypted (e.g., based on a scrambling and/or encryption key Keyd) before being converted to analog form (shown in Graph A6) by a conventional digital-to-analog conversion block 412 (if necessary). Signal scrambling may be independent of steganographically encoded control information. For example, a good way to support existing devices is to not scramble the signal, and to use legislative means to ensure that each new device manufactured is equipped with rights management technology. Scrambling/encrypting of content, can be used to enforce use of rights management. If legislative means can enforce the use of rights management technology, encryption or scrambling of content may not be necessary (although a decision to provide cryptographic protection for the control information is independent of this factor and must be evaluated in light of protecting the rights management system). Rights holders can choose an enticement technique(s) based on their business model(s). The benefit of scrambling is that it provides technical means for enforcing rights management. The benefit of unscrambled content is support of hundreds of millions of devices in the installed base—with the promise that new devices (potentially including computers) will enforce the control information even though they don't “have to” from a technical perspective.
The resulting steganographically encoded information signal 70 may then be transmitted over an insecure communications channel. Digital-to-analog conversion step 412 may be omitted if a digital communications channel (e.g., an optical disk, a digital satellite link, etc.) is available to deliver the signal.
The resulting digitized signal provided by
In a further example shown in
This particular
An optical disk player 102 with random access capability may “seek” to the place at which the closest organizational structure 136 is stored on the disk 104, and rapidly read the organizational structure off of the disk in less time than might be required to read an organizational structure that steganographic encode block 406 encodes at a lower data rate during times when the content bandwidth occupies most of the available channel bandwidth. In such arrangements, the process of reading a pointer 800, “seeking” to a position on the medium specified by the pointer, and then reading an organization structure 136 steganographically encoded at a high data rate may provide overall faster access times than if the organizational structure was itself encoded at a lower data rate within the parts of the information signal stream used in this example to encode only pointers.
A main system bus 206 may couple rights management component 124 to a main system microprocessor 208 and various system components such as, for example, a CD-ROM decoder 210, a control and audio block 212, a video decoder 214, a digital output protection block 216, and a communications system 218. In this example, main microprocessor 208 controls the overall operations of appliance 100, with rights management component 124 performing security-related functions such as-rights management and steganographic decoding.
In the
The video output of CD-ROM decoder 210 may be decompressed by MPEG-2 video decoder 214 and applied via an NTSC and/or PAL encoder 230 to television 106. (In another example, the output could be in a non-interlaced format such as RGB rather than in interlaced formats such as NTSC and PAL.) Meanwhile, control and audio block 212 (which may operate in conjunction with its own buffer memory 232) may receive digitized audio information recorded on optical disk 204 via DSP 224 and CD-ROM decoder 210. Control and audio block 212 may provide this audio output to audio processing block 234 for output to loudspeakers 116. Control and audio block 212 may also provide an interface to the user via an infrared sensor 236 (for a remote control, for example), front-panel user controls 238 and/or an LED display 240.
In this example, security microprocessor 200 within rights management component 124 receives the digitized video and/or audio that DSP 224 reads from optical disk 104 via pickup 220 and RF amp 222. Security microprocessor 200 steganographically decodes this digitized analog information signal to recover the digital control information 126 encoded onto the information signal. Security microprocessor 200 also performs rights management functions based on the digital control information 126 it recovers. In addition, if desired security microprocessor may remove the steganographic encoding from a received digitized analog signal (since it shares a secret such as the steganographic encoding key Key with the steganographic encoding point, it can remove the steganographic encoding) and/or steganographically encode a signal with received, augmented and/or new rights management control information.
In this example, microprocessor 200 may selectively control cryptography engine 204 to decrypt encrypted content provided by optical disk 104—thus enforcing the rights management activities provided in accordance with electronic controls 126. Security component 124 may also control digital output protection block 216 in accordance with rights management control information 126—thus, selectively permitting digital appliance 100 to output content in digital form. Rights management component 124 may take other steps (e.g., watermarking and/or fingerprinting information before releasing it) to provide a degree of copy protection and/or quality degradation to prevent or discourage someone from creating an unlimited number of high quality copies of the content of optical disk 104. Rules contained in the control information can also govern how other parts of the system behave. For example, the control information could specify that no sound can be played unless the content is paid for. Another property may specify that certain copy protection schemes should be turned on in the NTSC encoder. Still another might disable the digital outputs of the device altogether, or unless an additional fee is paid.
Rights management component 124 (protected processing environment 138) may, in this particular example, communicate over a network 144 (such as, for example, the Internet or other data communications path) with other rights management related entities, such as, for example, clearinghouses and repositories. This “back channel” allows rights management component 124 to, for example, report usage and payment information and/or to retrieve additional rights management control information 126 to augment or supplement the control information it steganographically decodes.
If protected processing environment 138 encounters a pointer (“yes” exit to decision block 318), then the protected processing environment determines whether it already has received the corresponding organizational structure pointed to by the received pointer (
If protected processing environment 138 has received no organizational structures or pointers (“no” exits to each of decision blocks 308, 312, 318), then the protected processing environment may determine whether there is any bandwidth available to carry control information. For example, some types of content stored on optical disk 104 may take up substantially all available channel bandwidths so that no bandwidth remains for steganographic encoding. If there is no available bandwidth for steganographic encoding (“no” exit to decision block 324), then the protected processing environment 138 may return to the “apply rules” block 302 and repeat steps 304-324 to wait until bandwidth is available for steganographic encoding. On the other hand, if there is bandwidth available and still no steganographically encoded information has appeared (“yes” exit to decision block 324,
As mentioned above, protected processing environment 138 may also perform any or all of the
The
In this example, an example set top box user appliance 108 may receive the distributed steganographically encoded analog signal A′. Set top box 108 may include a rights management component 124 as described above, and may perform rights management operations and/or processes in response to and based on steganographically encoded control information 126.
Set top box 108 in this example may output the steganographically encoded analog signal (or a facsimile of it) to additional user electronic appliances such as, for example, a television set 106, a digital optical recording device (e.g., DVD-R) 102, and/or a video tape recorder 118. Each of these additional appliances 106, 102, 118 may include a rights management component 124 that performs electronic rights management based on the steganographically encoded control information 126. Any recordings made by recording devices 102, 118 may also be steganographically encoded.
In this example, digital television 106B includes an analog output that may provide analog television signals to additional devices, such as, for example, an analog video cassette recorder 118. In this example, the rights management component 124C within digital television 106B may steganographically encode the analog television signal A with controls 126 and associated organizational structure(s) 136 before releasing the analog signal to the outside world.
While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
This application is a continuation of U.S. application Ser. No. 10/189,231, filed Jul. 5, 2002 now U.S. Pat. No. 6,618,484, which is a continuation of U.S. application Ser. No. 09/790,566, filed Feb. 23, 2001, now U.S. Pat. No. 6,449,367, which is a continuation of U.S. application Ser. No. 09/247,328, filed Feb. 10, 1999, now U.S. Pat. No. 6,240,185, which is a continuation of U.S. application Ser. No. 08/689,606, filed Aug. 12, 1996, now U.S. Pat. No. 5,943,422. This application is related to commonly assigned application Ser. No. 08/388,107 of Ginter et al., filed 13 Feb. 1995, entitled “SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION, now abandoned. A file wrapper continuation of application Ser. No. 08/388,107 issued as U.S. Pat. No. 5,982,891. We incorporate by reference, into this application, the entire disclosure of this prior-filed Ginter et al. patent application just as if its entire written specification and drawings were expressly set forth in this application.
Number | Name | Date | Kind |
---|---|---|---|
3573747 | Adams et al. | Apr 1971 | A |
3609697 | Blevins | Sep 1971 | A |
3790700 | Callais et al. | Feb 1974 | A |
3796830 | Smith | Mar 1974 | A |
3798359 | Feistel | Mar 1974 | A |
3798360 | Feistel | Mar 1974 | A |
3798605 | Feistel | Mar 1974 | A |
3806874 | Ehrat | Apr 1974 | A |
3806882 | Clarke | Apr 1974 | A |
3829833 | Freeny, Jr. | Aug 1974 | A |
3845391 | Crosby | Oct 1974 | A |
3906448 | Henriques | Sep 1975 | A |
3911397 | Freeny, Jr. | Oct 1975 | A |
3924065 | Freeny, Jr. | Dec 1975 | A |
3931504 | Jacoby | Jan 1976 | A |
3946200 | Juodikis | Mar 1976 | A |
3946220 | Brobeck et al. | Mar 1976 | A |
3956615 | Anderson et al. | May 1976 | A |
3958081 | Ehrsam et al. | May 1976 | A |
3970992 | Boothroyd et al. | Jul 1976 | A |
3996449 | Attanasio et al. | Dec 1976 | A |
4020326 | Coulthurst | Apr 1977 | A |
4048619 | Forman, Jr. et al. | Sep 1977 | A |
4071911 | Mazur | Jan 1978 | A |
4104721 | Markstein et al. | Aug 1978 | A |
4112421 | Freeny, Jr. | Sep 1978 | A |
4120030 | Johnstone | Oct 1978 | A |
4141005 | Ronner et al. | Feb 1979 | A |
4162483 | Entenman | Jul 1979 | A |
4163280 | Mori et al. | Jul 1979 | A |
4168396 | Best | Sep 1979 | A |
4183085 | Roberts et al. | Jan 1980 | A |
4196310 | Forman et al. | Apr 1980 | A |
4200913 | Kuhar et al. | Apr 1980 | A |
4209787 | Freeny, Jr. | Jun 1980 | A |
4217588 | Freeny, Jr. | Aug 1980 | A |
4220991 | Hamano et al. | Sep 1980 | A |
4232193 | Gerard | Nov 1980 | A |
4232317 | Freeny, Jr. | Nov 1980 | A |
4236217 | Kennedy | Nov 1980 | A |
4246638 | Thomas | Jan 1981 | A |
4253157 | Kirschner et al. | Feb 1981 | A |
4259720 | Campbell | Mar 1981 | A |
4262329 | Bright et al. | Apr 1981 | A |
4265371 | Desai et al. | May 1981 | A |
4270182 | Asija | May 1981 | A |
4278837 | Best | Jul 1981 | A |
4305131 | Best | Dec 1981 | A |
4306289 | Lumley | Dec 1981 | A |
4309569 | Merkle | Jan 1982 | A |
4319079 | Best | Mar 1982 | A |
4321672 | Braun et al. | Mar 1982 | A |
4323921 | Guillou | Apr 1982 | A |
4328544 | Baldwin et al. | May 1982 | A |
4337483 | Guillou | Jun 1982 | A |
4361877 | Dyer et al. | Nov 1982 | A |
4375579 | Davida et al. | Mar 1983 | A |
4405829 | Rivest et al. | Sep 1983 | A |
4433207 | Best | Feb 1984 | A |
4434464 | Suzuki et al. | Feb 1984 | A |
4442484 | Childs, Jr. et al. | Apr 1984 | A |
4442486 | Mayer | Apr 1984 | A |
4446519 | Thomas | May 1984 | A |
4454594 | Heffron et al. | Jun 1984 | A |
4458315 | Uchenick | Jul 1984 | A |
4462076 | Smith, III | Jul 1984 | A |
4462078 | Ross | Jul 1984 | A |
4465901 | Best | Aug 1984 | A |
4471163 | Donald et al. | Sep 1984 | A |
4471216 | Herve | Sep 1984 | A |
4484217 | Block et al. | Nov 1984 | A |
4494156 | Kadison et al. | Jan 1985 | A |
4513174 | Herman | Apr 1985 | A |
4523271 | Levien | Jun 1985 | A |
4525599 | Curran et al. | Jun 1985 | A |
4528588 | Lofberg | Jul 1985 | A |
4528643 | Freeny, Jr. | Jul 1985 | A |
4529870 | Chaum | Jul 1985 | A |
4553252 | Egendorf | Nov 1985 | A |
4558176 | Arnold et al. | Dec 1985 | A |
4558413 | Schmidt et al. | Dec 1985 | A |
4562305 | Gaffney, Jr. | Dec 1985 | A |
4562306 | Chou et al. | Dec 1985 | A |
4562495 | Bond et al. | Dec 1985 | A |
4573119 | Westheimer et al. | Feb 1986 | A |
4577289 | Comerford et al. | Mar 1986 | A |
4578530 | Zeidler | Mar 1986 | A |
4584639 | Hardy | Apr 1986 | A |
4584641 | Guglielmino | Apr 1986 | A |
4588991 | Atalla | May 1986 | A |
4589064 | Chiba et al. | May 1986 | A |
4590552 | Guttag et al. | May 1986 | A |
4593183 | Fukatsu | Jun 1986 | A |
4593353 | Pickholtz | Jun 1986 | A |
4593376 | Volk | Jun 1986 | A |
4595950 | Lofberg | Jun 1986 | A |
4597058 | Izumi et al. | Jun 1986 | A |
4598288 | Yarbrough et al. | Jul 1986 | A |
4599489 | Cargile | Jul 1986 | A |
4609777 | Cargile | Sep 1986 | A |
4609985 | Dozier | Sep 1986 | A |
4621321 | Boebert et al. | Nov 1986 | A |
4621334 | Garcia | Nov 1986 | A |
4622222 | Horváth et al. | Nov 1986 | A |
4634807 | Chorley et al. | Jan 1987 | A |
4644493 | Chandra et al. | Feb 1987 | A |
4646234 | Tolman et al. | Feb 1987 | A |
4649515 | Thompson et al. | Mar 1987 | A |
4652990 | Pailen et al. | Mar 1987 | A |
4658093 | Hellman | Apr 1987 | A |
4670857 | Rackman | Jun 1987 | A |
4672572 | Alsberg | Jun 1987 | A |
4672605 | Hustig et al. | Jun 1987 | A |
4677434 | Fascenda | Jun 1987 | A |
4677552 | Sibley, Jr. | Jun 1987 | A |
4680731 | Izumi et al. | Jul 1987 | A |
4683553 | Mollier | Jul 1987 | A |
4683968 | Appelbaum et al. | Aug 1987 | A |
4685055 | Thomas | Aug 1987 | A |
4685056 | Barnsdale, Jr. et al. | Aug 1987 | A |
4688169 | Joshi | Aug 1987 | A |
4691350 | Kleijne et al. | Sep 1987 | A |
4696034 | Wiedemer | Sep 1987 | A |
4700296 | Palmer, Jr. et al. | Oct 1987 | A |
4701846 | Ikeda et al. | Oct 1987 | A |
4712238 | Gilhousen et al. | Dec 1987 | A |
4713753 | Boebert et al. | Dec 1987 | A |
4727550 | Chang et al. | Feb 1988 | A |
4740890 | William | Apr 1988 | A |
4747139 | Taaffe | May 1988 | A |
4748561 | Brown | May 1988 | A |
4757533 | Allen et al. | Jul 1988 | A |
4757534 | Matyas et al. | Jul 1988 | A |
4757914 | Roth et al. | Jul 1988 | A |
4759060 | Hayashi et al. | Jul 1988 | A |
4768087 | Taub et al. | Aug 1988 | A |
4780821 | Crossley | Oct 1988 | A |
4791565 | Dunham et al. | Dec 1988 | A |
4796181 | Wiedemer | Jan 1989 | A |
4796220 | Wolfe | Jan 1989 | A |
4798209 | Klingenbeck et al. | Jan 1989 | A |
4799156 | Shavit et al. | Jan 1989 | A |
4807288 | Ugon et al. | Feb 1989 | A |
4816655 | Musyck et al. | Mar 1989 | A |
4817140 | Chandra et al. | Mar 1989 | A |
4823264 | Deming | Apr 1989 | A |
4827508 | Shear | May 1989 | A |
4858121 | Barber et al. | Aug 1989 | A |
4864494 | Kobus, Jr. | Sep 1989 | A |
4864616 | Pond et al. | Sep 1989 | A |
4866769 | Karp | Sep 1989 | A |
4868736 | Walker | Sep 1989 | A |
4868877 | Fischer | Sep 1989 | A |
4881197 | Fischer | Nov 1989 | A |
4888798 | Earnest | Dec 1989 | A |
4893248 | Pitts et al. | Jan 1990 | A |
4893332 | Brown | Jan 1990 | A |
4903296 | Chandra et al. | Feb 1990 | A |
4907269 | Guillon et al. | Mar 1990 | A |
4919545 | Yu | Apr 1990 | A |
4924378 | Hershey et al. | May 1990 | A |
4926480 | Chaum | May 1990 | A |
4930073 | Cina, Jr. | May 1990 | A |
4937863 | Robert et al. | Jun 1990 | A |
4941175 | Enescu et al. | Jul 1990 | A |
4949187 | Cohen | Aug 1990 | A |
4953209 | Ryder, Sr. et al. | Aug 1990 | A |
4962533 | Krueger et al. | Oct 1990 | A |
4967403 | Ogawa | Oct 1990 | A |
4975647 | Downer et al. | Dec 1990 | A |
4975878 | Boddu et al. | Dec 1990 | A |
4977594 | Shear | Dec 1990 | A |
4995082 | Schnorr | Feb 1991 | A |
4999806 | Chernow et al. | Mar 1991 | A |
5001752 | Fischer | Mar 1991 | A |
5005122 | Griffin et al. | Apr 1991 | A |
5005200 | Fischer | Apr 1991 | A |
5010571 | Katznelson | Apr 1991 | A |
5014234 | Edwards, Jr. | May 1991 | A |
5022080 | Durst et al. | Jun 1991 | A |
5023907 | Johnson et al. | Jun 1991 | A |
5027397 | Double et al. | Jun 1991 | A |
5032979 | Hecht et al. | Jul 1991 | A |
5047928 | Wiedemer | Sep 1991 | A |
5048085 | Abraham et al. | Sep 1991 | A |
5050212 | Dyson | Sep 1991 | A |
5050213 | Shear | Sep 1991 | A |
5051932 | Inoue et al. | Sep 1991 | A |
5058162 | Santon et al. | Oct 1991 | A |
5065429 | Lang | Nov 1991 | A |
5070400 | Lieberman | Dec 1991 | A |
5079648 | Maufe | Jan 1992 | A |
5091966 | Bloomberg et al. | Feb 1992 | A |
5103392 | Mori | Apr 1992 | A |
5103459 | Gilhousen et al. | Apr 1992 | A |
5103476 | Waite et al. | Apr 1992 | A |
5109413 | Comerford et al. | Apr 1992 | A |
5111390 | Ketcham | May 1992 | A |
5113518 | Durst, Jr. et al. | May 1992 | A |
5119493 | Janis et al. | Jun 1992 | A |
5126936 | Champion et al. | Jun 1992 | A |
5128525 | Stearns et al. | Jul 1992 | A |
5129084 | Kelly, Jr. et al. | Jul 1992 | A |
5136643 | Fischer | Aug 1992 | A |
5136646 | Haber et al. | Aug 1992 | A |
5136647 | Haber et al. | Aug 1992 | A |
5136716 | Harvey et al. | Aug 1992 | A |
5138712 | Corbin | Aug 1992 | A |
5146575 | Nolan, Jr. | Sep 1992 | A |
5148481 | Abraham et al. | Sep 1992 | A |
5150407 | Chan | Sep 1992 | A |
5155680 | Wiedemer | Oct 1992 | A |
5163091 | Graziano et al. | Nov 1992 | A |
5164988 | Matyas et al. | Nov 1992 | A |
5168147 | Bloomberg | Dec 1992 | A |
5185717 | Mori | Feb 1993 | A |
5187787 | Skeen et al. | Feb 1993 | A |
5191573 | Hair | Mar 1993 | A |
5199066 | Logan | Mar 1993 | A |
5199074 | Thor | Mar 1993 | A |
5201046 | Goldberg et al. | Apr 1993 | A |
5201047 | Maki et al. | Apr 1993 | A |
5204897 | Wyman | Apr 1993 | A |
5206951 | Khoyi et al. | Apr 1993 | A |
5208748 | Flores et al. | May 1993 | A |
5214700 | Pinkas et al. | May 1993 | A |
5214702 | Fischer | May 1993 | A |
5216603 | Flores et al. | Jun 1993 | A |
5218605 | Low et al. | Jun 1993 | A |
5221833 | Hecht | Jun 1993 | A |
5222134 | Waite et al. | Jun 1993 | A |
5224160 | Paulini et al. | Jun 1993 | A |
5224163 | Gasser et al. | Jun 1993 | A |
5227797 | Murphy | Jul 1993 | A |
5235642 | Wobber et al. | Aug 1993 | A |
5237614 | Weiss | Aug 1993 | A |
5241671 | Reed et al. | Aug 1993 | A |
5245165 | Zhang | Sep 1993 | A |
5247575 | Sprague et al. | Sep 1993 | A |
5251294 | Abelow | Oct 1993 | A |
5257369 | Skeen et al. | Oct 1993 | A |
5260999 | Wyman | Nov 1993 | A |
5263157 | Janis | Nov 1993 | A |
5263158 | Janis | Nov 1993 | A |
5263165 | Janis | Nov 1993 | A |
5265164 | Matyas et al. | Nov 1993 | A |
5276735 | Boebert et al. | Jan 1994 | A |
5276901 | Howell et al. | Jan 1994 | A |
5280479 | Mary | Jan 1994 | A |
5283830 | Hinsley et al. | Feb 1994 | A |
5285494 | Sprecher et al. | Feb 1994 | A |
5287407 | Holmes | Feb 1994 | A |
5291598 | Grundy | Mar 1994 | A |
5301231 | Abraham et al. | Apr 1994 | A |
5301326 | Linnett et al. | Apr 1994 | A |
5311591 | Fischer | May 1994 | A |
5315448 | Ryan | May 1994 | A |
5319705 | Halter et al. | Jun 1994 | A |
5319735 | Preuss et al. | Jun 1994 | A |
5319785 | Thaller | Jun 1994 | A |
5325524 | Black et al. | Jun 1994 | A |
5335169 | Chong | Aug 1994 | A |
5335346 | Fabbio | Aug 1994 | A |
5337357 | Chou et al. | Aug 1994 | A |
5337360 | Fischer | Aug 1994 | A |
5341429 | Stringer et al. | Aug 1994 | A |
5343526 | Lassers | Aug 1994 | A |
5343527 | Moore | Aug 1994 | A |
5347579 | Blandford | Sep 1994 | A |
5349642 | Kingdon | Sep 1994 | A |
5351293 | Michener et al. | Sep 1994 | A |
5354097 | Tel | Oct 1994 | A |
5355474 | Thuraisngham et al. | Oct 1994 | A |
5359721 | Kempf et al. | Oct 1994 | A |
5361359 | Tajalli et al. | Nov 1994 | A |
5365587 | Campbell et al. | Nov 1994 | A |
5367621 | Cohen et al. | Nov 1994 | A |
5369702 | Shanton | Nov 1994 | A |
5369707 | Follendore, III | Nov 1994 | A |
5371792 | Asai et al. | Dec 1994 | A |
5373440 | Cohen et al. | Dec 1994 | A |
5373561 | Haber et al. | Dec 1994 | A |
5375240 | Grundy | Dec 1994 | A |
5383113 | Kight et al. | Jan 1995 | A |
5388211 | Hornbuckle | Feb 1995 | A |
5390247 | Fischer | Feb 1995 | A |
5390297 | Barber et al. | Feb 1995 | A |
5390330 | Talati | Feb 1995 | A |
5392220 | Van den Hamer et al. | Feb 1995 | A |
5392390 | Crozier | Feb 1995 | A |
5394469 | Nagel et al. | Feb 1995 | A |
5408501 | Cornaby | Apr 1995 | A |
5410598 | Shear | Apr 1995 | A |
5412717 | Fischer | May 1995 | A |
5418713 | Allen | May 1995 | A |
5420927 | Micali | May 1995 | A |
5421006 | Jablon et al. | May 1995 | A |
5422645 | Nettleton et al. | Jun 1995 | A |
5422953 | Fischer | Jun 1995 | A |
5428606 | Moskowitz | Jun 1995 | A |
5428685 | Kadooka et al. | Jun 1995 | A |
5432851 | Scheidt et al. | Jul 1995 | A |
5432928 | Sherman | Jul 1995 | A |
5432950 | Sibigtroth | Jul 1995 | A |
5438508 | Wyman | Aug 1995 | A |
5440634 | Jones et al. | Aug 1995 | A |
5442645 | Ugon et al. | Aug 1995 | A |
5444779 | Daniele | Aug 1995 | A |
5449895 | Hecht et al. | Sep 1995 | A |
5449896 | Hecht et al. | Sep 1995 | A |
5450490 | Jensen et al. | Sep 1995 | A |
5450493 | Maher | Sep 1995 | A |
5453601 | Rosen | Sep 1995 | A |
5453605 | Hecht et al. | Sep 1995 | A |
5455407 | Rosen | Oct 1995 | A |
5455861 | Faucher et al. | Oct 1995 | A |
5455953 | Russell | Oct 1995 | A |
5457746 | Dolphin | Oct 1995 | A |
5457747 | Drexler et al. | Oct 1995 | A |
5458494 | Krohn et al. | Oct 1995 | A |
5463565 | Cookson et al. | Oct 1995 | A |
5473687 | Lipscomb et al. | Dec 1995 | A |
5473692 | Davis | Dec 1995 | A |
5479509 | Ugon | Dec 1995 | A |
5485622 | Yamaki | Jan 1996 | A |
5490216 | Ricahrdson, III | Feb 1996 | A |
5491800 | Goldsmith et al. | Feb 1996 | A |
5497479 | Hornbuckle | Mar 1996 | A |
5497491 | Mitchell et al. | Mar 1996 | A |
5499298 | Narasimhalu et al. | Mar 1996 | A |
5504757 | Cook et al. | Apr 1996 | A |
5504818 | Okano | Apr 1996 | A |
5504837 | Griffeth et al. | Apr 1996 | A |
5505461 | Bell et al. | Apr 1996 | A |
5508913 | Yamamoto et al. | Apr 1996 | A |
5509070 | Schull | Apr 1996 | A |
5513261 | Maher | Apr 1996 | A |
5517518 | Morson et al. | May 1996 | A |
5521815 | Rose, Jr. | May 1996 | A |
5524933 | Kunt et al. | Jun 1996 | A |
5530235 | Stefik et al. | Jun 1996 | A |
5530752 | Rubin | Jun 1996 | A |
5533123 | Force et al. | Jul 1996 | A |
5534855 | Shockley et al. | Jul 1996 | A |
5534975 | Stefik et al. | Jul 1996 | A |
5535322 | Hecht | Jul 1996 | A |
5537526 | Anderson et al. | Jul 1996 | A |
5539735 | Moskowitz | Jul 1996 | A |
5539828 | Davis | Jul 1996 | A |
5550971 | Brunner et al. | Aug 1996 | A |
5553282 | Parrish et al. | Sep 1996 | A |
5557518 | Rosen | Sep 1996 | A |
5557798 | Skeen et al. | Sep 1996 | A |
5563946 | Cooper et al. | Oct 1996 | A |
5568552 | Davis | Oct 1996 | A |
5572673 | Shurts | Nov 1996 | A |
5574962 | Fardeau et al. | Nov 1996 | A |
5577209 | Boyle et al. | Nov 1996 | A |
5581686 | Koppolu et al. | Dec 1996 | A |
5581800 | Fardeau et al. | Dec 1996 | A |
5592549 | Nagel et al. | Jan 1997 | A |
5603031 | White et al. | Feb 1997 | A |
5606609 | Houser et al. | Feb 1997 | A |
5613004 | Cooperman et al. | Mar 1997 | A |
5621797 | Rosen | Apr 1997 | A |
5625693 | Rohatgi et al. | Apr 1997 | A |
5629770 | Brassil et al. | May 1997 | A |
5629980 | Stefik et al. | May 1997 | A |
5633932 | Davis et al. | May 1997 | A |
5634012 | Stefik et al. | May 1997 | A |
5636276 | Brugger | Jun 1997 | A |
5636292 | Rhoads | Jun 1997 | A |
5638443 | Stefik et al. | Jun 1997 | A |
5638504 | Scott et al. | Jun 1997 | A |
5640546 | Gopinath et al. | Jun 1997 | A |
5644686 | Hekmatpour | Jul 1997 | A |
5646997 | Barton | Jul 1997 | A |
5649099 | Theimer et al. | Jul 1997 | A |
5655077 | Jones et al. | Aug 1997 | A |
5671279 | Elgamal | Sep 1997 | A |
5678170 | Grube et al. | Oct 1997 | A |
5687236 | Moskowitz et al. | Nov 1997 | A |
5689565 | Spies et al. | Nov 1997 | A |
5689566 | Nguyen | Nov 1997 | A |
5689587 | Bender et al. | Nov 1997 | A |
5692047 | McManis | Nov 1997 | A |
5692180 | Lee | Nov 1997 | A |
5692980 | Trotman | Dec 1997 | A |
5699427 | Chow et al. | Dec 1997 | A |
5710834 | Rhoads | Jan 1998 | A |
5715314 | Payne et al. | Feb 1998 | A |
5715403 | Stefik | Feb 1998 | A |
5717923 | Dedrick | Feb 1998 | A |
5721788 | Powell et al. | Feb 1998 | A |
5724424 | Gifford | Mar 1998 | A |
5724425 | Chang et al. | Mar 1998 | A |
5732398 | Tagawa | Mar 1998 | A |
5734719 | Tsevdos et al. | Mar 1998 | A |
5740549 | Reilly et al. | Apr 1998 | A |
5745569 | Moskowitz et al. | Apr 1998 | A |
5745604 | Rhoads | Apr 1998 | A |
5745678 | Herzberg et al. | Apr 1998 | A |
5748763 | Rhoads | May 1998 | A |
5748783 | Rhoads | May 1998 | A |
5748960 | Fischer | May 1998 | A |
5754849 | Dyer et al. | May 1998 | A |
5757914 | McManis | May 1998 | A |
5758152 | LeTourneau | May 1998 | A |
5759101 | Von Kohorn | Jun 1998 | A |
5765152 | Erickson | Jun 1998 | A |
5768426 | Rhoads | Jun 1998 | A |
5774452 | Wolosewicz | Jun 1998 | A |
5774872 | Golden et al. | Jun 1998 | A |
5778385 | Pratt | Jul 1998 | A |
5787334 | Fardeau et al. | Jul 1998 | A |
5802590 | Draves | Sep 1998 | A |
5819263 | Bromley et al. | Oct 1998 | A |
5832119 | Rhoads | Nov 1998 | A |
5842173 | Strum et al. | Nov 1998 | A |
5845281 | Benson et al. | Dec 1998 | A |
5878421 | Ferrel et al. | Mar 1999 | A |
5889868 | Moskowitz et al. | Mar 1999 | A |
5892899 | Aucsmith et al. | Apr 1999 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5896454 | Cookson et al. | Apr 1999 | A |
5910987 | Ginter et al. | Jun 1999 | A |
5915019 | Ginter et al. | Jun 1999 | A |
5917912 | Ginter et al. | Jun 1999 | A |
5920861 | Hall et al. | Jul 1999 | A |
5940504 | Griswold | Aug 1999 | A |
5940505 | Kanamaru | Aug 1999 | A |
5943422 | Van Wie et al. | Aug 1999 | A |
5949876 | Ginter et al. | Sep 1999 | A |
5956408 | Arnold | Sep 1999 | A |
5966440 | Hair | Oct 1999 | A |
5978484 | Apperson et al. | Nov 1999 | A |
5982891 | Ginter et al. | Nov 1999 | A |
5991876 | Johnson et al. | Nov 1999 | A |
5996756 | Schmodde et al. | Dec 1999 | A |
5999949 | Crandall | Dec 1999 | A |
6009170 | Sako et al. | Dec 1999 | A |
6016393 | White et al. | Jan 2000 | A |
6026193 | Rhoads | Feb 2000 | A |
6044205 | Reed et al. | Mar 2000 | A |
6085238 | Yuasa et al. | Jul 2000 | A |
6102965 | Dye et al. | Aug 2000 | A |
6112181 | Shear et al. | Aug 2000 | A |
6135646 | Kahn et al. | Oct 2000 | A |
6138119 | Hall et al. | Oct 2000 | A |
6157721 | Shear et al. | Dec 2000 | A |
6185683 | Ginter et al. | Feb 2001 | B1 |
6237786 | Ginter et al. | May 2001 | B1 |
6240185 | Van Wie et al. | May 2001 | B1 |
6253193 | Ginter et al. | Jun 2001 | B1 |
6292569 | Shear et al. | Sep 2001 | B1 |
6363488 | Ginter et al. | Mar 2002 | B1 |
6389402 | Ginter et al. | May 2002 | B1 |
6393484 | Massarani | May 2002 | B1 |
6427140 | Ginter et al. | Jul 2002 | B1 |
6449367 | Van Wie et al. | Sep 2002 | B2 |
6477559 | Veluvali et al. | Nov 2002 | B1 |
6519615 | Wollrath et al. | Feb 2003 | B1 |
6618484 | Van Wie et al. | Sep 2003 | B1 |
6640304 | Ginter et al. | Oct 2003 | B2 |
6658568 | Ginter et al. | Dec 2003 | B1 |
6668325 | Collberg et al. | Dec 2003 | B1 |
6785815 | Serret-Avila et al. | Aug 2004 | B1 |
6807534 | Erickson | Oct 2004 | B1 |
6832316 | Sibert | Dec 2004 | B1 |
6948070 | Ginter et al. | Sep 2005 | B1 |
6950867 | Strohwig et al. | Sep 2005 | B1 |
6959384 | Serret-Avila | Oct 2005 | B1 |
6973499 | Peden et al. | Dec 2005 | B1 |
7050586 | Shamoon | May 2006 | B1 |
7051212 | Ginter et al. | May 2006 | B2 |
7058805 | Sibert | Jun 2006 | B2 |
7062500 | Hall et al. | Jun 2006 | B1 |
7069451 | Ginter et al. | Jun 2006 | B1 |
7076652 | Ginter et al. | Jul 2006 | B2 |
7085839 | Baugher et al. | Aug 2006 | B1 |
7092914 | Shear et al. | Aug 2006 | B1 |
7095854 | Ginter et al. | Aug 2006 | B1 |
7100199 | Ginter et al. | Aug 2006 | B2 |
7362775 | Moskowitz | Apr 2008 | B1 |
20010042043 | Shear et al. | Nov 2001 | A1 |
20020023214 | Shear et al. | Feb 2002 | A1 |
20020048369 | Ginter et al. | Apr 2002 | A1 |
20020087859 | Weeks et al. | Jul 2002 | A1 |
20020112171 | Ginter et al. | Aug 2002 | A1 |
20020152173 | Rudd | Oct 2002 | A1 |
20030023856 | Horne et al. | Jan 2003 | A1 |
20030041239 | Shear et al. | Feb 2003 | A1 |
20030046244 | Shear et al. | Mar 2003 | A1 |
20030069748 | Shear et al. | Apr 2003 | A1 |
20030069749 | Shear et al. | Apr 2003 | A1 |
20030084003 | Pinkas et al. | May 2003 | A1 |
20030105721 | Ginter et al. | Jun 2003 | A1 |
20030163431 | Ginter et al. | Aug 2003 | A1 |
20040054630 | Ginter et al. | Mar 2004 | A1 |
20040059951 | Pinkas et al. | Mar 2004 | A1 |
20040073813 | Pinkas et al. | Apr 2004 | A1 |
20040103305 | Ginter et al. | May 2004 | A1 |
20040107356 | Shamoon et al. | Jun 2004 | A1 |
20040123129 | Ginter et al. | Jun 2004 | A1 |
20040133793 | Ginter et al. | Jul 2004 | A1 |
20050027871 | Bradley et al. | Feb 2005 | A1 |
20050050332 | Serret-Avila et al. | Mar 2005 | A1 |
20050060560 | Sibert | Mar 2005 | A1 |
20050060584 | Ginter et al. | Mar 2005 | A1 |
20050108555 | Sibert | May 2005 | A1 |
Number | Date | Country |
---|---|---|
A-3681597 | Feb 1998 | AU |
A-3681697 | Feb 1998 | AU |
A-3684097 | Feb 1998 | AU |
9 004 79 | Dec 1984 | BE |
29 43 436 | Oct 1979 | DE |
3 803 982 | Jan 1990 | DE |
0 084 441 | Jul 1983 | EP |
0 128 672 | Dec 1984 | EP |
0 135 422 | Mar 1985 | EP |
0 180 460 | May 1986 | EP |
0 367 700 | May 1990 | EP |
0 370 146 | May 1990 | EP |
0 398 645 | Nov 1990 | EP |
0 399 822 | Nov 1990 | EP |
0 421 409 | Apr 1991 | EP |
0 456 386 | Nov 1991 | EP |
0 469 864 | Feb 1992 | EP |
0 469 864 | Feb 1992 | EP |
0 565 314 | Oct 1993 | EP |
0 567 800 | Nov 1993 | EP |
0 570 123 | Nov 1993 | EP |
0 593 305 | Apr 1994 | EP |
0 651 554 | May 1995 | EP |
0 653 695 | May 1995 | EP |
0 668 695 | Aug 1995 | EP |
0 668 695 | Aug 1995 | EP |
0 695 985 | Feb 1996 | EP |
0 696 798 | Feb 1996 | EP |
0 727 727 | Feb 1996 | EP |
0 714 204 | May 1996 | EP |
0 715 243 | Jun 1996 | EP |
0 715 244 | Jun 1996 | EP |
0 715 245 | Jun 1996 | EP |
0 715 246 | Jun 1996 | EP |
0 715 247 | Jun 1996 | EP |
0 725 376 | Aug 1996 | EP |
0 749 081 | Dec 1996 | EP |
0 763 936 | Mar 1997 | EP |
0 778 513 | Jun 1997 | EP |
0 795 873 | Sep 1997 | EP |
0 800 312 | Oct 1997 | EP |
0 913 757 | May 1999 | EP |
2136175 | Sep 1984 | GB |
2264796 | Sep 1993 | GB |
2294348 | Apr 1996 | GB |
2295947 | Jun 1996 | GB |
57-000726 | Jan 1982 | JP |
61-121145 | Jun 1986 | JP |
62-225059 | Oct 1987 | JP |
62-241061 | Oct 1987 | JP |
63-129564 | Jun 1988 | JP |
63-289646 | Nov 1988 | JP |
01-068835 | Mar 1989 | JP |
01-068853 | Mar 1989 | JP |
64-068835 | Mar 1989 | JP |
01-248891 | Oct 1989 | JP |
01-296363 | Nov 1989 | JP |
02-242352 | Sep 1990 | JP |
02-247763 | Oct 1990 | JP |
02-294855 | Dec 1990 | JP |
04-117548 | Apr 1992 | JP |
04-504794 | Aug 1992 | JP |
04-369068 | Dec 1992 | JP |
05-020359 | Jan 1993 | JP |
05-173892 | Jul 1993 | JP |
05-181734 | Jul 1993 | JP |
05-257783 | Oct 1993 | JP |
05-258463 | Oct 1993 | JP |
05-268415 | Oct 1993 | JP |
06-501120 | Jan 1994 | JP |
06-152585 | May 1994 | JP |
06-161719 | Jun 1994 | JP |
06-175794 | Jun 1994 | JP |
06-215010 | Aug 1994 | JP |
06-225059 | Aug 1994 | JP |
06-250924 | Sep 1994 | JP |
07-056794 | Mar 1995 | JP |
07-084852 | Mar 1995 | JP |
07-141138 | Jun 1995 | JP |
07-200317 | Aug 1995 | JP |
07-200492 | Aug 1995 | JP |
07-244639 | Sep 1995 | JP |
07-319681 | Dec 1995 | JP |
08-137795 | May 1996 | JP |
08-152990 | Jun 1996 | JP |
08-185292 | Jul 1996 | JP |
08-185298 | Jul 1996 | JP |
WO 8502310 | May 1985 | WO |
WO 8503584 | Aug 1985 | WO |
WO 9002382 | Mar 1990 | WO |
WO 9206438 | Apr 1992 | WO |
WO 9220022 | Nov 1992 | WO |
WO 9222870 | Dec 1992 | WO |
WO 9301550 | Jan 1993 | WO |
WO 9401821 | Jan 1994 | WO |
WO 9403859 | Feb 1994 | WO |
WO 9406103 | Mar 1994 | WO |
WO 9416395 | Jul 1994 | WO |
WO 9418620 | Aug 1994 | WO |
WO 9422266 | Sep 1994 | WO |
WO 9427406 | Nov 1994 | WO |
WO 9514289 | May 1995 | WO |
WO 9600963 | Jan 1996 | WO |
WO 9603835 | Feb 1996 | WO |
WO 9605698 | Feb 1996 | WO |
WO 9606503 | Feb 1996 | WO |
WO 9613013 | May 1996 | WO |
WO 9617467 | Jun 1996 | WO |
WO 9621192 | Jul 1996 | WO |
WO 9624092 | Aug 1996 | WO |
WO 9627155 | Sep 1996 | WO |
WO 9703423 | Jan 1997 | WO |
WO 9707656 | Mar 1997 | WO |
WO 9722074 | Jun 1997 | WO |
WO 9725816 | Jul 1997 | WO |
WO 9732251 | Sep 1997 | WO |
WO 9743761 | Nov 1997 | WO |
WO 9748203 | Dec 1997 | WO |
WO 9809209 | Mar 1998 | WO |
WO 9810381 | Mar 1998 | WO |
WO 9837481 | Aug 1998 | WO |
WO 9845768 | Oct 1998 | WO |
WO 9901815 | Jan 1999 | WO |
WO 9924928 | May 1999 | WO |
WO 9948296 | Sep 1999 | WO |
WO 0075925 | Dec 2000 | WO |
WO 0106374 | Jan 2001 | WO |
WO 0109702 | Feb 2001 | WO |
WO 0110076 | Feb 2001 | WO |
Number | Date | Country | |
---|---|---|---|
20060120525 A1 | Jun 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10189231 | Jul 2002 | US |
Child | 10618427 | US | |
Parent | 09790566 | Feb 2001 | US |
Child | 10189231 | US | |
Parent | 09247328 | Feb 1999 | US |
Child | 09790566 | US | |
Parent | 08689606 | Aug 1996 | US |
Child | 09247328 | US |