throbber
5,982,889
`[11] Patent Number:
`[19]
`Unlted States Patent
`
`DeMont
`[45] Date of Patent:
`Nov. 9, 1999
`
`U8005982889A
`
`[54] METHOD AND APPARATUS FOR
`DISTRIBUTING INFORMATION PRODUCTS
`
`[76]
`
`Inventor:
`
`Jason Paul DeMont, 244 English
`-
`-
`Place’ BaSkmg Rldge’ NJ’ 07920
`
`[21] Appl. No.: 08/845,805
`[22]
`Filed:
`Apr. 30, 1997
`
`6
`
`........................................................ H04L 9/00
`Int. Cl.
`[51]
`............................... 380/4; 380/23; 280/2864
`[52] US. Cl.
`[58] Field of Search .................................. 380/3, 4, 9, 21,
`380/23’ 44’ 45’ 49’ 59; 711/152; 395/218’
`186, 187.01, 188.01, 602, 609, 610, 612,
`71% 76% 729 725% 729> M 384-389;
`340/825'31’ 82334; 341/7849; 364/400’
`42355122237233/2/552282’652326280/22282694
`'
`'
`’
`'
`’
`'
`’
`'
`References Cited
`
`[56]
`
`U.S. PATENT DOCUMENTS
`8/1987 Applebaum et al.
`....................... 380/4
`7/1989 Francisco .............
`.. 371/53
`
`4/1992 Waite et a1
`380/4
`6/1993 Waite ...........
`380/4
`8/1994 Chou et al.
`................................. 380/4
`
`4,683,968
`4,845,715
`5,103,476
`5,222,134
`5,337,357
`
`5,343,526
`8/1994 Lassers ........................................ 380/4
`
`5,490,216
`.. 380/4
`2/1996 Richardson .
`5,553,139
`..... 380/4
`9/1996 Ross et al.
`
`
`39:23:33 fizz; 3141:1931} ~~~~~
`~ 393$;
`..............................
`,
`,
`10 e e a.
`5,636,277
`6/1997 Nagahama .................................. 380/4
`5,666,411
`9/1997 McCarty .....
`.. 380/4
`
`......... 380/4
`5,751,805
`5/1998 Otsuki et al.
`5/1998 Olsen ................................. 395/187.01
`5,758,069
`Primary Examiner—Tod R. Swann
`Assistant Examiner—Paul E. Callahan
`
`ABSTRACT
`[57]
`A method and apparatus for distributing information prod-
`t
`.
`d
`'b d th t
`.
`1 d
`th
`t
`f
`t'
`25$ lsneesifii Con :52? Eiffenniafiifiié’de831322583
`of ang’end-userZ:J idegntit
`an indicium of a firsf information
`product, and an indiciu3iil of a second information product
`With the string, R, as the key to create a launch code;
`decrypting the launch code with the string, R, to recover the
`authentlcatlon code, the lndlc1um of the end-user’s ldentlty,
`the indicium of the first information product and the indi-
`3min. (f the Second énfirmgttlfin pmd‘gi; fand “ftalhngdth‘:
`rs 1“ (”ma 10“ pro ‘1‘? an
`.6 sew“ 1“ (”ma 10“ pro “C
`onto a computer assoc1ated Wlth the end-user.
`
`4 Claims, 4 Drawing Sheets
`
`110
`______________£__________.________‘
`
`109
`F—__777‘________1’—_______—______-______"777__[’A‘|
`
`OBTAIN
`
`AUTHORIZATION
`400
`
`
`
`405
`
`
`
`
`
`
`
`
`
`INDICIUM OF
`ENCRYPT AUTHENTICATION CODE,
`END-USER’S NAME, AUTHORIZED PRODUCTS
`NAMES AND SUBSCRIPTION EXPIRATION DATES
`WITH R AS KEY TO CREATE LAUNCH CODE
`
`
`
`
`
`
`|——r-v—v->
`TRANSMIT LAUNCH CODE TO END-USER
`RECEIVE LAUNCH CODE FROM PUBLISHER
`|~f411
`
`409
`413
`I
`NOTIFY END-USER
`
`
`NO
`THAT LAUNCH CODE
`
`
`IS NOT ACCEPTABLE
`
`
`NOTIFY END-USER THAT LAUNCH CODE IS
`ACCEPTABLE AND WHICH PRODUCTS HAVE
`BEEN AUTHORIZED AND FOR HOW LONG
`
`DECRYPT LAUNCH CODE WITH R AS KEY
`
`
`
`
`Petitioner Apple - EX. 1001
`
`Petitioner Apple - Ex. 1001
`
`

`

`US. Patent
`
`N0V.9,1999
`
`Sheet 1 0f4
`
`5,982,889
`
`
`END-USER
`
`RECEIVE THE PRODUCTS
`
`105
`
`FIG.
`
`1
`
`i
`
`i|
`
`I|
`|
`I
`II
`I
`
`Ill
`
`EI
`
`I
`
`I
`I
`
`
`PUBLISHER
`
`START
`
`101
`
`CREATE THE
`INFORMATION PRODUCTS
`
`102
`
`BUILD THE ANCILLARY FILES
`
`103
`
`104
`
`PREPARE FOR DISTRIBUTION
`
`DISTRIBUTE THE PRODUCTS
`
`RUN THE INSTALLER
`
`106
`
`107
`
`108
`N0
`
`
`
`
`LOCATE AND CLEANSE TOKEN
`
`DOES USER DESIRE T0
`SUBSCRIBE OR RE-SUBSCRIBE
`
`TO PRODUCTS ?
`
`1 IO
`
`PROVIDE AUTHORIZATION
`
`OBTAIN AUTHORIZATION
`
`INSTALL PRODUCTS
`
`MEMORIALIZE AUTHORIZATION
`
`1 1 I
`
`I 12
`
`Petitioner Apple - EX. 1001
`
`Petitioner Apple - Ex. 1001
`
`

`

`
`
`Petitioner Apple - Ex. 1001
`
`

`

`US. Patent
`
`Nov. 9, 1999
`
`Sheet 3 0f 4
`
`5,982,889
`
`FIG. 3
`
`107
`
`: LOCATE AND CLEANSE TOKEN
`
`
`
`501
`
`303
`
`305
`
`SEARCH FOR TOKEN
`
`
`FILE LOCATED ?
`
`
`
`
`
`
`
`DECRYPT FILE
`
`
`
`
`IS THE CANDIDATE
`
`AUTHENTICATION CODE
`
`
`
`CORRECT ?
`
`
`
`HAVE ANY PRODUCT
`
`AUTHORIZATIONS EXPIRED ?
`
`
`
`NOTIFY END-USER WHICH
`
`PRODUCT AUTHORIZATIONS
`
`HAVE EXPIRED
`
`
`
`Petitioner Apple - EX. 1001
`
`Petitioner Apple - Ex. 1001
`
`

`

`US. Patent
`
`Nov. 9, 1999
`
`Sheet 4 0f 4
`
`5,982,889
`
`
`
`2:\<
`
`
`
`FIIIllllllllllllllllllllllllllll
`
`zgmo
`
`
`
`22295538wm2<zmtzmmznazmWEE
`
`.3m355sz
`
`mmzmzmiE82—E15oz<m5.25:
`
`$12.5228:$85225#58“
`
`mow
`
`.._o2552—.38zo=<o=2m15<EEozm
`
`Emzuozm2o”:85E15oz<mmagma
`mango”:8501::l$.22mEmznozm
`
`
`
`2225053ESQ:
`
`
`
`
`
`WEBzoEm—mxmzoEEommzmoz<332
`
`MES52:5HES8Exm<z1:;
`
`
`
`
`
`$8558WES102255625:
`
`59:303.52a881022525
`m:mm»
`
`
`
`m.vs”582220:5154“5.3525fl
`
`E855E52
`
`Exm<mTE;3852:5#589
`
`m2N
`
`
`m><_._30:8”:
`
`
`12:3oz<39552a3852:52+:$8-02“Czoz
`
`
`
`ozo._30:m8oz<8501::25m
`
`Petitioner Apple - EX. 1001
`
`Petitioner Apple - Ex. 1001
`
`
`
`
`
`
`

`

`5,982,889
`
`1
`METHOD AND APPARATUS FOR
`DISTRIBUTING INFORMATION PRODUCTS
`
`FIELD OF THE INVENTION
`
`The present invention relates to a method and apparatus
`for distributing information products in general, and, more
`particularly, to a method and apparatus for distributing and
`installing computer programs and data.
`
`BACKGROUND OF THE INVENTION
`
`For as long as publishers have been distributing informa-
`tion products, piracy has been a concern. For the purposes of
`this specification the term “information product” includes,
`but is not limited to computer software, data, images, music,
`applets, photographs, animations, video, audio, text, hyper-
`text and multimedia works.
`
`As a practical matter, large-scale piracy committed by
`professional thieves is easier for publishers to detect and
`police because of the inherently commercial and public
`aspects of large-scale piracy. Small-scale piracy committed
`by individuals who, for example, purchase one copy of a
`computer program and install it on three or four computers
`in a small office are more insidious and, in the aggregate,
`economically more harmful to publishers.
`Several
`techniques have been used by publishers of
`information products to impede piracy. When music was
`first distributed on CDs, CD duplicating equipment were
`expensive and rare and publishers implicitly relied on
`“physical security” to impede small-scale copyright infring-
`ers. The theory underlying physical security is that
`the
`difficulty in duplicating the media containing the informa-
`tion product is sufficient to stop most small-scale infringe-
`ment.
`
`When it is difficult for the end-user to duplicate the media,
`or to transfer the information product from one computer to
`another over a network,
`the publisher can be reasonably
`assured that widespread piracy is not occurring. Of course,
`the end-user could lend, lease or sell the media embodying
`the information product to another who would install it, and
`physical security could not prevent it.
`When the technology for duplicating the media embody-
`ing an information product becomes ubiquitous, or it
`becomes easy to copy the information product from one
`computer to another over a network, publishers often
`employ “cryptographic security” to thwart copyright
`infringers.
`According to one technique, the installer accompanying
`the software will not install the software on the end-user’s
`
`computer until an acceptable password is entered by the
`end-user at the time of installation. The password is received
`by the end-user from the publisher after the end-user regis-
`ters with the publisher and the publisher is assured that the
`end-user has paid for the software. Although this technique
`is widely used, it suffers from the weakness that the end-user
`can use the media and password again to install the software
`on another computer. Furthermore, the end-user can post the
`password publicly on an electronic bulletin-board and the
`advantage of the secret password are lost.
`SUMMARY OF THE INVENTION
`
`Some embodiments of the present invention are capable
`of distributing information products without many of the
`costs and restrictions associated with techniques in the prior
`art. In particular, some embodiments of the present invention
`are capable of distributing one or more information products
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`together (e.g., either on a single CD-ROM or electronically
`over a network) while reserving to the publisher the ability
`to control which products are actually installed on an
`end-user’s computer.
`An illustrative embodiment of the present invention com-
`prises the steps of: generating a string, R; encrypting a first
`authentication code, an indicium of an end-user’s identity,
`an indicium of a first information product, and an indicium
`of a second information product with said string, R, as the
`key to create a launch code; decrypting said launch code
`with said string, R, to recover said authentication code, said
`indicium of said end-user’s identity, said indicium of said
`first information product and said indicium of said second
`information product; and installing said first information
`product and said second information product onto a com-
`puter associated with said end-user.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 depicts a flowchart of the steps associated with
`distributing information products in accordance with the
`illustrative embodiment of the present invention.
`FIG. 2 depicts a directed graph that indicates which files
`in a group of files contain hypertext links to which other
`files.
`
`FIG. 3 depicts a flowchart of the detailed steps associated
`with the step of locating and cleansing the token in FIG. 1.
`FIG. 4 depicts a flowchart of the detailed steps associated
`with the steps of providing authorization and obtaining
`information in FIG. 1.
`
`DETAILED DESCRIPTION
`
`invention
`The illustrative embodiment of the present
`facilitates the distribution of a plurality of information
`products by a publisher in such a manner that each product
`can be licensed,
`installed and used independently or in
`combination with other
`information products.
`Advantageously, this is accomplished, in part, through the
`use of a program commonly known as an “installer.” As is
`well known to those skilled in the art, an installer is program
`that is prepared by the publisher of an information product,
`that is distributed along with the information product, and
`that controls the installation of the information product onto
`the end-user’s computer. Although the installer runs on the
`end-user’s computer, it acts as remote agent of the publisher
`to control how and under what circumstances the informa-
`
`tion products are installed on the end-user’s computer.
`Each information product associated with the illustrative
`embodiment constitutes a plurality of hypertext files or “web
`pages” that are accessed by the end-user through a browser
`such as Netscape Navigator or Internet Explorer. Although
`each information product comprises hypertext files, the files
`are not intended to be accessed by the end-user via the
`Internet. Instead, all of the information products are advan-
`tageously distributed together on a single medium (e.g., a
`CD-ROM) or electronically (e.g., via the Internet) and are
`installed on the end-user’s computer, or on an intranet server
`associated with the end-user. It will be clear to those skilled
`
`in the art how to use a browser such as Netscape Navigator
`or Internet Explorer to browse through web pages that are
`stored locally in contrast to using the browser to browse web
`pages that are stored on http servers across the Internet.
`One example of an information product that can be used
`with embodiments of the present
`invention comprises a
`plurality of web pages that constitute some of the legislative,
`administrative and judicial materials associated with patent
`
`Petitioner Apple - Ex. 1001
`
`Petitioner Apple - Ex. 1001
`
`

`

`5,982,889
`
`3
`law. Another example of an information product that can be
`used with embodiments of the present invention comprises
`a plurality of web pages that constitute some of the
`legislative, administrative and judicial materials associated
`with trademark law. And yet another example of an infor-
`mation product that can be used with embodiments of the
`present invention comprises a plurality of web pages that
`constitute some of the legislative, administrative and judicial
`materials associated with copyright law.
`Information products that work with embodiments of the
`present
`invention need not relate to law, or reference
`materials, or even text. Other information products could
`comprise music, video, multimedia, or data or other
`executables. It will be clear to those skilled in the art how to
`make and use the embodiments of the invention that are
`
`associated with information products that comprise other
`than hypertext files.
`Each information product associated with the illustrative
`embodiment constitutes a single issue of a periodical to
`which an end-user can subscribe and receive monthly
`updates. It will be clear to those skilled in the art that other
`embodiments of the present invention can be used to dis-
`tribute a single information product. It will also be clear to
`those skilled in the art that other embodiments of the present
`invention can be used to distribute one or more information
`
`products that are not part of a serialization or that are part of
`a serialization that issues sporadically, in contrast to peri-
`odically.
`FIG. 1 depicts a flowchart that outlines the steps associ-
`ated with distributing information products in accordance
`with the illustrative embodiment of the present invention.
`I. Create The Information Products
`
`In accordance with step 101, each information product is
`created by the publisher. To assist in describing the illustra-
`tive embodiment,
`three information products are created
`whose subject matter is related. For the purposes of this
`specification,
`the three products are named “Patent Law
`Library,” “Trademark Law Library” and “Copyright Law
`Library.” It will be clear to those skilled in the art how to
`make and use embodiments of the present invention when a
`different number of products are created, or when their
`subject matter is not related, or both.
`the
`For the purposes of the illustrative embodiment,
`Patent Law Library is a set of files that contain Title 35 of
`the United States Code as marked-up in the Hypertext
`Markup Language (“HTML”); the Trademark Law Library
`is a set of files that contain the Lanham Act as marked-up in
`HTML, and the Copyright Law Library is a set of files that
`contain Title 17 of the United States Code as marked-up in
`HTML. The files in each information product are advanta-
`geously viewed on an end-user’s computer through a
`browser such as Netscape Navigator or Internet Explorer.
`Although all three products are advantageously distrib-
`uted together, any one, two or all three of the products can
`be installed into an end-user’s computer. In other words, in
`accordance with the illustrative embodiment, one end-user
`can install just the Patent Law Library although another
`installs both Patent Law Library and Copyright Law Library.
`Because of the perishable nature of the subject matter of
`each of the illustrative products, the Patent Law Library,
`Trademark Law Library and Copyright Law Library are
`each a single issue of a periodical, which issues monthly.
`Each product advantageously comprises one or more files
`within one or more directories in a hierarchical file structure.
`
`When a product contains a large number of files, it is usually
`advantageous to arrange the files in multiple directories. It
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`will be clear to those skilled in the art how to determine
`
`when a specific information product should contain multiple
`directories. For pedagogical reasons, the files within each of
`the three illustrative information products are contained
`within a single directory.
`
`Some or all of the files in the illustrative information
`
`products advantageously contain hypertext links to items in
`other files. For example, the reference in 35 U.S.C. 42(c) to
`section 31 of the Lanham Act can be implemented as a
`hypertext link from the file containing 35 U.S.C. 42(c) in the
`Patent Law Library to the file containing section 31 in the
`Trademark Law Library.
`
`It will be clear to those skilled in the art
`
`that files
`
`associated with other embodiments of the present invention
`can contain, for example, executable programs, data and/or
`references to other files, which target files may be in the
`same or other products. It will also be clear to those skilled
`in the art that information products associated with other
`embodiments of the present
`invention need not contain
`references to other files. It will be clear to those skilled in the
`
`art how to create the files in each product.
`
`All of the files in all of the products are advantageously
`created and arranged in a file structure with the knowledge
`of the name and location in the file structure of each file it
`
`is capable of referencing, regardless of whether the files are
`part of the same information product or not.
`
`The Patent Law Library comprises five files in the hier-
`archical file structure shown in Table 1. The Trademark Law
`
`Library comprises three files in the hierarchical file structure
`shown in Table 2, and the Copyright Law Library comprises
`four files in the hierarchical file structure shown in Table 3.
`
`Advantageously, all three products are designed to install
`into the same hierarchical directory space, relative to what-
`ever the end-user defines, during installation, as the root
`directory for the product(s).
`
`TABLE 1
`
`The files that compose the Patent Law Library.
`File
`Location
`
`File 1
`File 2
`File 3
`File 4
`File 5
`
`\directory1\file1.htm
`\directory1\file2.htm
`\directory1\file3.htm
`\directory1\file4.htm
`\directory1\file5.htm
`
`TABLE 2
`
`The files that compose the Trademark Law Library.
`File
`Location
`
`File 6
`File 7
`File 8
`
`\directory2\file6.htm
`\directory2\file7.htm
`\directory2\file8.htm
`
`Petitioner Apple - Ex. 1001
`
`Petitioner Apple - Ex. 1001
`
`

`

`5,982,889
`
`5
`
`TABLE 3
`
`The files that compose the Copyright Law Library.
`File
`Location
`
`File 9
`File 10
`File 11
`File 12
`
`\directory3\file9.htm
`\directory3\file10.htm
`\directory3\file11.htm
`\directory3\file12.htm
`
`For pedagogical reasons, the three information products
`in the illustrative embodiment comprise a total of 12 files. In
`commercial applications, it will be clear to those skilled in
`the art
`that a single information product can comprise
`hundreds or thousands of files. It will be clear to those
`
`skilled in the art how to make and use the files that compose
`the three products.
`The books HTML Publishing for Netscape, Stuart Harris
`& Gayle Kidder, Ventana Communications Group, Inc.,
`Research Triangle Park, NC, and HTML: The Definitive
`Guide, Chuck Musciano & Bill Kennedy, O’Reilly &
`Associates, Inc., Sebastopol, Calif., provide an excellent
`overview the creation of files using HTML and are incor-
`porated by reference.
`II. Build The Ancillary Files
`Because (1) each file can contain a hypertext link to a
`target file that may not be in the same information product,
`and (2)
`the information products can be licensed and
`installed separately, the possibility exists that a file can be
`installed on a end-user’s computer that contains a hypertext
`link to a target file that is not installed on the end-user’s
`computer. The result is a hypertext link that, when executed,
`generates a run-time error because the target file is not
`installed on the computer.
`To preclude run-time errors, the installer advantageously
`installs a “dummy” or “nominal” file into the end-user’s
`computer in the same location and with the same name as
`each file that could be referenced but is not also installed.
`
`The nominal file advantageously does not contain the same
`information as the authentic file, but contains a notice that it
`is only a nominal file and that access to the authentic file
`requires the installation of another information product.
`At step 102, ancillary files are built to enable the installer
`to know where to install the nominal files. In the illustrative
`
`embodiment, one ancillary file is built for each information
`product and the ancillary files indicates the name and
`location of each nominal file to be installed when that
`
`information product is installed.
`There are two alternative techniques that can be used by
`the installer for installing the nominal files and the authentic
`files. According to the first technique, the installer installs all
`of the authentic files for all of the information products to be
`installed, and then installs all of the nominal files into those
`locations not containing an authentic file. According to the
`
`6
`second technique, the installer installs all of the nominal files
`for all of the information products to be installed, and then
`installs all of the authentic files to be installed over the
`
`nominal files, perhaps overwriting over some or all of the
`nominal files. The choice of technique advantageously does
`not affect how the ancillary files are built. The installer
`associated with the illustrative embodiment uses the first
`
`technique, but it will be clear to those skilled in the art how
`to make and use embodiments of the present invention that
`use the second technique.
`When the total number of files in all of the information
`
`products is small, each ancillary file associated with each
`information product can exhaustively list all of the files
`associated with every other information product. In contrast,
`when the total number of files in all of the information
`
`products is large, it is advantageous for each ancillary file to
`list only those files actually needed. To determine which files
`are needed, all of the files in all of the information products
`need to be examined to determine which files reference
`which other files.
`
`FIG. 2 depicts an illustrative directed graph that repre-
`sents all of the files in the three illustrative products and
`indicates which files contain hypertext links to other files. It
`will be clear to those skilled in the art how to determine the
`
`topology of the directed graph by examining all of the files
`in all of the products associated with an embodiment of the
`present invention.
`Each file in each product is represented by a polygon
`enclosing a number. Each of the five files associated with the
`Patent Law Library are depicted by a triangle; each of the
`three files associated with the Trademark Law Library are
`depicted by a square and each of the four files associated
`with the Copyright Law Library are depicted by a pentagon.
`The number inside the polygon indicates exactly which file
`it is associated with. For example, the file “file3.htm” is
`depicted by a triangle enclosing the number 3.
`An arrow from one polygon to another indicates that the
`file associated with the first polygon contains at least one
`hypertext link to the file associated with the second polygon.
`A double-ended arrow indicates that both files contain
`
`hypertext links to each other.
`Table 4 provides the same information as does FIG. 2, but
`in tabular format. Each row in Table 4 represents a file in one
`of the three products, and an “X” in a box means that the file
`associated with the row contains a hypertext link to the file
`associated with that column. Like the directed graph in FIG.
`2, the entries in Table 4 are illustrative only. It will be clear
`to those skilled in the art how to make a similar table by
`examining all of the files in all of the information products
`associated with an embodiment of the present invention.
`Although both the directed graph of FIG. 2 and Table 4
`illustrate a tendency for files within an information product
`to reference other files within the same product, there are
`occurrence of files within one product containing references
`to files in other products.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`Petitioner Apple - Ex. 1001
`
`Petitioner Apple - Ex. 1001
`
`

`

`5,982,889
`
`TABLE 4
`
`Which Files Externally Reference Which Files
`
`-
`
`-----n-nn---
`
`
`
`------ --
`------
`-------
`
`--
`--
`--
`m-
`--
`m-
`m-
`--
`
`--
`
`As both FIG. 2 and Table 4 indicate, there are three files
`(File 6, File 7 and File 11) not within the Patent Law Library
`that are referenced by files within Patent Law Library.
`Therefore, the Patent Law Library’s ancillary file is built as
`shown in Table 5. Whenever the Patent Law Library is
`installed, the files listed in the ancillary file are advanta-
`geously also installed as nominal files.
`
`TABLE 5
`
`Ancillar File assogiated with the Patent Law Libryr
`
`Ancillary File
`
`\directory2\file6.htm
`\directory2\file7.htm
`\directory3\file11.htm
`
`As both FIG. 2 and Table 4 indicate, there are four files
`(File 3, File 5, File 9 and File 10) not within the Trademark
`Law Library that are referenced by files within Trademark
`Law Library. Therefore, the Trademark Law Library’s ancil-
`lary file is built as shown in Table 6. Whenever the Trade-
`mark Law Library is installed, the files listed in the ancillary
`file are advantageously also installed as nominal files.
`
`TABLE 6
`
`Ancillary File associated with the Trademark Law Library
`
`Ancillary File
`
`\directory1\file3.htm
`\directory1\file5 .htm
`\directory3\file9.htm
`\directory3\file10.htm
`
`As both FIG. 2 and Table 4 indicate, there are four files
`(File 1, File 5, File 7 and File 8) not within the Copyright
`Law Library that are referenced by files within Copyright
`Law Library. Therefore, the Copyright Law Library’s ancil-
`lary file is built as shown in Table 7. Whenever the Copy-
`right Law Library is installed, the files listed in the ancillary
`file are advantageously also installed as nominal files.
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`TABLE 7
`
`Ancillary File associated with the Copyright Law Library
`
`Ancillary File
`
`\directory1\file1.htm
`\directory1\file5.htm
`\directory2\file7.htm
`\directory2\file8.htm
`
`III. Prepare For Distribution
`Referring again to step 103 in FIG. 1, when each infor-
`mation product and its associated ancillary file are built, the
`files are advantageously prepared for distribution. Because
`all of the information products are advantageously distrib-
`uted on the same medium (e.g., CD-ROM, DVD, diskette)
`or distributed electronically over a wide-area-network (e.g.,
`the Internet), each information product is advantageously
`compressed with a lossless compression technique and
`encrypted, in well-known fashion, with the string, S, as the
`key.
`The purpose of the compression is to reduce the amount
`of bandwidth each information product consumes during
`distribution and to reduce the entropy of the information
`products before encryption. The purpose of encryption is to
`enable the distribution of the information products without
`allowing unauthorized access to the information products
`after the information products have left
`the publisher’s
`possession. In other words, the encryption allows the pub-
`lisher to give a potential end-user a CD-ROM that contains
`all of information products but
`to retain control of the
`end-user’s access to the information products. The installer
`is advantageously knows the cryptosystem and key for
`decrypting each of the information products. How the pub-
`lisher grants access to the information products after they
`have left his or her control will be described in detail below.
`
`It will be clear to those skilled in the art how to prepare
`the information products and ancillary files for distribution.
`IV. Distribute the Information Products
`
`At step 104, the information products and ancillary files
`and the accompanying installer and its associated files are
`distributed on a single medium (e.g., a CD-ROM, DVD), on
`
`Petitioner Apple - EX. 1001
`
`Petitioner Apple - Ex. 1001
`
`

`

`9
`
`multiple media (e.g., diskettes) and/or electronically over a
`network (e.g., the Internet). It will be clear to those skilled
`in the art how to distribute the information products.
`V. Receive the Information Products
`
`At step 105, the information products and ancillary files
`and the accompanying installer and its associated files are
`received by the end-user.
`VI. Run the Installer
`
`At step 106, the end-user initiates the installation process.
`When the information products are distributed on one or
`more media, the end-user inserts the media into his or her
`computer and runs the installer in well-known fashion.
`When the information products are distributed electronically
`over a network, the end-user collects the files on his or her
`computer and then runs the installer in well-known fashion.
`VI. Locate and Cleanse the Token
`
`At step 107, the installer advantageously checks to deter-
`mine if the publisher has previously granted authorization to
`install one or more of the information products on the
`end-user’s computer. The installer determines if the pub-
`lisher has previously granted authorization by searching for
`a token on the end-user’s computer, which token would have
`been placed there by an earlier edition of the installer from
`the publisher.
`When an end-user obtains a subscription to one or more
`of the information products, the installer memorializes the
`authorization during the length of the subscription. This is
`advantageous because it relieves the publisher and the
`end-user from having to obtain explicit authorization for
`each issue during the length of the subscription.
`The token can be conceptualized as a secret, authenticated
`message from one installer to a subsequent installer that
`indicates to the subsequent
`installer that
`the end-user’s
`computer is granted access to certain of the information
`products for a given duration. How the token is created and
`placed on the end-user’s computer will be described in detail
`below.
`
`25
`
`30
`
`35
`
`the token is a file with a name and
`Advantageously,
`location that are known to the installer. The token advanta-
`
`40
`
`geously comprises a data structure comprising:
`(1) an authentication code;
`(2) an indication of the name of the end-user;
`(3) a list of the information products to which the end-user
`has been granted access; and
`(4) an indication of when the authorization for each
`information product expires.
`Furthermore, the token file is encrypted so as to impede an
`end-user from illicitly obtaining access to an information
`product by doctoring the token. The encryption is
`performed, in well-known fashion, and the installer advan-
`tageously knows the both the cryptosystem and the key, T,
`for decrypting the token. Table 8 depicts the contents of the
`illustrative token.
`
`TABLE 8
`
`Contents of the Illustrative Token
`
`Authentication code
`Indication of End-User’s Identity
`Information Product No. 1; Expiration Date
`Information Product No. 2; Expiration Date
`
`The authentication code is advantageously a 32-bit or
`longer string that is known to the installer and publisher and
`is not generally known to the public.
`
`45
`
`50
`
`55
`
`60
`
`65
`
`5,982,889
`
`10
`The indication of the name of the user can either be the
`
`actual name of the end-user or a code that represents the
`name of the end-user. When a user illicitly attempts to share
`the token with others or to post it on a bulletin board or the
`Internet, it indelibly bears an indicium of the name of the
`person to whom it was originally given. If the publisher sees
`the token posted publicly,
`the publisher can decrypt the
`token, learn the identity of the user to whom the token was
`given and then investigate whether that users is inducing
`copyright infringement of the publisher’s information prod-
`ucts.
`
`The list of information products to which the end-user has
`been authorized access can either list the products to which
`access has been authorized, or, alternatively, can list of all of
`the information products published and an indication of
`whether access has been authorized or not for each product.
`The indication of when the access for each information
`
`5
`
`10
`
`15
`
`product expires is advantageously based on the information
`products’ version numbers rather than on calendar dates.
`Each edition of the installer is told what is the version
`
`20
`
`number of the information products that accompany it.
`FIG. 3 depicts a flowchart of the illustrative steps con-
`ducted by the installer in locating and cleansing the token,
`which is step 107 in FIG. 1. At step 301,
`the installer
`searches the end-user’s computer for a file with the same
`name as the token and in the same location as expected. At
`step 303, if the installer locates a file with the same name as
`the token and in the same location as expected, then control
`passes to step 305, else the installer infers that authorization
`was not previously given. At step 305, the installer decrypts
`the found file,
`in well-known fashion, according to the
`cryptosystem and the key it knows. At step 307, the installer
`attempts to locate the candidate authentication code in the
`decrypted file and compares the candidate authentication
`code with the known authentication code, which the installer
`knows. If the installer determines that the candidate authen-
`tication code matches the known authentication code, the
`installer infers that the token is genuine and has not been
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket