US20110113067A1 - Rechargeable Media Distribution and Play System with Download Kiosk - Google Patents
- ️Thu May 12 2011
US20110113067A1 - Rechargeable Media Distribution and Play System with Download Kiosk - Google Patents
Rechargeable Media Distribution and Play System with Download Kiosk Download PDFInfo
-
Publication number
- US20110113067A1 US20110113067A1 US13/011,688 US201113011688A US2011113067A1 US 20110113067 A1 US20110113067 A1 US 20110113067A1 US 201113011688 A US201113011688 A US 201113011688A US 2011113067 A1 US2011113067 A1 US 2011113067A1 Authority
- US
- United States Prior art keywords
- file
- authorization
- access
- storage device
- digital Prior art date
- 2000-01-18 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000013475 authorization Methods 0.000 claims abstract description 105
- 238000000034 method Methods 0.000 claims abstract description 74
- 230000001413 cellular effect Effects 0.000 claims description 6
- 230000002452 interceptive effect Effects 0.000 claims description 4
- 238000004891 communication Methods 0.000 abstract description 17
- 230000026676 system process Effects 0.000 abstract description 2
- 238000012360 testing method Methods 0.000 description 57
- 230000008569 process Effects 0.000 description 18
- 238000012544 monitoring process Methods 0.000 description 7
- 239000000463 material Substances 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 230000003190 augmentative effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000002401 inhibitory effect Effects 0.000 description 3
- 230000000737 periodic effect Effects 0.000 description 3
- 230000000717 retained effect Effects 0.000 description 3
- 230000003213 activating effect Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003908 quality control method Methods 0.000 description 2
- 240000005020 Acaciella glauca Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 239000013642 negative control Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 235000003499 redwood Nutrition 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/3331—Query processing
- G06F16/334—Query execution
- G06F16/3344—Query execution using natural language analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/109—Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0603—Catalogue ordering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1078—Logging; Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99932—Access augmentation or optimizing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99944—Object-oriented database structure
- Y10S707/99945—Object-oriented database structure processing
Definitions
- the present invention relates to electronic media players, and more particularly to media that is downloadable over a communication network.
- U.S. Pat. No. 5,790,423 to Lau discloses a system for downloading and playing music wherein certain copyrighted material may only be used for a specific length of time.
- the system of Lau includes a service center having a user accessible library of selectable programs, a base unit from which user generated program selections are transmitted to the service center, and a cassette for storing programs downloaded by the base unit from the service center.
- the date and time of downloading and playing of particular program selections is stored in memory of the base unit and/or the cassette. Copyright information is programmed into a control program of the cassette to limit the usage of each selected program.
- U.S. Pat. No. 4,898,736 to Walker discloses downloadable information having access through a keyed device.
- the system includes a service facility having an electronically accessible catalog of electronic files, and an interface to a communications network.
- the system can transmit the catalog to a requesting user, and set up customer accounts, process payments from customers for establishing file access authorizations, and enables transmission user-selected files to customers.
- the system also provides a player program to each customer for metering access to received data files as limited by the authorization.
- the system is enabled for transmitting the selected files to the customer only while the authorization remains established.
- the system can also be implemented for receiving the user request and feeding the catalog to the user via the network interface. Also, or alternatively, communications with the user for defining the user account can be through the network interface.
- the system can set an authorization level of the customer's authorization to a first value corresponding to a first authorized plurality of the electronic files, and to a second value corresponding to a second plurality of the electronic files.
- the system can also provide augmenting the authorization in accordance with further processing of payments by the customer.
- the system can, in defining the customer account, identify existing file access software to be used by the customer, and the player program is in the form of a software patch to be used in conjunction with the existing file access software.
- the identifying of the existing file access software can be by electronically interrogating a computer being used by the user to determine a default media player setting of that computer, the system selecting the software patch from a stored plurality of player patches.
- the system enables transmissions of the data files and the player program in encrypted form, with the player program decrypting the received data files only while authorization remains established.
- the authorization is independent of both the selected files and the number of files selected among those that are authorized. Thus customers can freely access all of the files and play any of selected files, to the extent of a blanket authorization, which can also be recharged based on further payments.
- Authorization can be only for a period of time which can be calendar time, optionally commencing upon use of the player program. Alternatively, the time is measured only during the accessing data of the received data files by the player program. In another alternative, authorization can be for a collective number of accesses of data of the received data files, and the numbered accesses can be counted only after a threshold period of time of accessing the data files.
- the system processes renewals and extensions of customer authorizations in conjunction with processing of further payments from the customers.
- the system can have storage of at least some of the data files at the service facility.
- the system facilitates transmission of at least some of the electronic files to customers from remote locations, preferably further including means for redirecting customer communications to remote source facilities over the network.
- Another aspect of the invention provides a method for facilitating distribution of electronic files to be accessed, including providing the catalog of the electronic files for access by users of a communication network; defining a customer account for a user to identify the user as a customer, to process payments from the customer and to establish authorization for accessing an authorized plurality of the electronic files; enabling transmission of selected electronic files to the customer as received data files over the communication network in response to a customer order; and providing to the customer a player program for accessing and metering access to the received data files.
- the enabling can be for the selected electronic files to be transmitted in encrypted form, and providing with the player program means for decrypting the received data files.
- the invention also provides a process for playing electronic media using the method described above wherein the authorization is for a predetermined length of time, the method further including activating the player program; monitoring elapsed time; and inhibiting operation of the player program when the elapsed time reaches the predetermined period.
- the monitoring can be only during the accessing of the received data files.
- the inhibiting can be suppressed until the end of a currently accessed data file.
- the monitoring can be of calendar time, in which case the monitoring optionally commences only upon accessing of data of the received data files. Also, the inhibiting can be suppressed until the end of a currently accessed data file.
- FIG. 1 is a pictorial block diagram of an electronic media distribution system according to the present invention
- FIG. 2 is a block diagram of a distribution process using the system of FIG. 1 ;
- FIG. 3 is a computer flow chart of a service facility distribution program for implementing the process of FIG. 2 ;
- FIG. 4 is a flow chart of a customer facility media player program for implementing the process of FIG. 2 ;
- FIG. 5 is a flow chart portion showing an alternative configuration of the player program of FIG. 4 ;
- FIG. 6 is a flow chart showing another alternative configuration of the player program of FIG. 4 ;
- FIG. 7 is a flow chart showing an alternative configuration of a portion of the player program of FIGS. 6 ;
- FIG. 8 is a flow chart showing further details of the distribution program of FIG. 3 within region 7 thereof.
- a distribution system 10 includes a service facility 11 that can be implemented as a server computer 12 being connected to an electronic communication network 14 , there being a plurality of user facilities 15 that can also be connected to the network 14 , one such being designated customer facility 15 C and being implemented as a customer computer 16 . It is contemplated that a plurality of source or vendor facilities 17 are also connected to the communication network 14 , such facilities being operated by holders of works to be distributed as facilitated by the system 10 of the present invention and further described below. Connections to the network 14 are by respective communication lines 18 , which can be telephone utility lines.
- Connections can also be by satellite, cable, fiber, radio, cellular phone, in any combination.
- the service computer 12 includes an operator interface 20 having a screen display 21 , a keyboard 22 , a mouse 23 .
- the computer 12 also includes memory 24 and a modem interface 26 for connecting to the network through an available communication line 18 .
- the memory 24 has a web server program 28 and a library server program 30 having access to mass data storage 32 in accordance with the present invention.
- the mass data storage 32 is loaded with a library of data files (one such being designated 33 ) by an accession program 34 , the accession program also generating a catalog 35 that is periodically updated and saved in the data storage 32 .
- some or all of the data files can be retained in the vendor facilities 17 .
- the customer computer 16 includes a counterpart of the operator interface, designated 20 ′, the memory 24 , and the modem interface 26 .
- the operator interface 20 ′ includes a pair of audio speakers 25 , the computer 16 further including a media interface 36 for driving the speakers 25 .
- the memory 24 has a web browser 38 by which data made available by the service facility 11 is accessed and saved in a suitable mass storage device such as a conventional hard disk drive 40 .
- the memory 24 of the customer computer receives a media player program 42 for conditionally accessing received data as further described below.
- the player program 42 can be in the form of a program “patch” or “plug-in” to be used in conjunction with a commercially and/or publicly available media player.
- Media players are known devices for accessing media files.
- media files are electronic files that are typically digital in form, and include, without limitation: a) books and other text-only material; b) music, audio books, and other audio-only material; c) films, television programming, and other audio-visual material; d) games and other interactive material; and e) software programs.
- software programs it will be understood that the media player 42 functions somewhat as an operating system for encrypted programs.
- Suitable software media players to be patched with counterparts of the media player 42 include WINAMP PLAYER, available from AOL Time Warner of New York, N.Y.; WINDOWS MEDIA PLAYER, available from Microsoft Corp. of Redmond, Wash.; and REALPLAYER, available from RealNetworks, Inc., of Seattle, Wash. These players play music files, whether compressed in the known MP3 format or otherwise, and the WINDOWS and REALPLAYER players also play audio-visual files. Book and text-only files can be played on the Software Reader software of Gemstar eBook Group, Redwood City, Calif., and the Adobe Acrobat eBook Reader 2.2, available from Adobe Systems, Inc. of San. Francisco, Calif. Games and interactive material can be played on Dreamcast, available from Sega of America Dreamcast, Inc. of San Franciaco, Calif., and Sony PlayStation, available from Sony Corp. of New York, N.Y.
- accession program 34 maintains a library of recordings and a user of the customer computer 16 interacts with the library server program 30 of the server computer 12 over the network 14 .
- the library server program 30 and the accession program 34 can be respective modules of an integrated computer program.
- the accession program 34 is programmed to include a receive data step 52 in which bibliographic data and, optionally, full records, of one or more works to be distributed are received in computer-readable form such as on a digitally recorded compact disk.
- the data can also be transmitted from one or more of the vendor facilities 17 via the computer network 14 , or by any suitable means.
- test local step 55 is interposed after the receive data step 52 for bypassing the encrypt and store step 53 when the data includes bibliographic information but not the full record of particular works, the bibliographic information in such cases including URL fields or other suitable data for enabling subsequent user access to full encrypted records of such works. It will be understood that the test local step 55 can be omitted when all of the data either includes the full records or does not include any full records.
- catalog listings for new versions of previously accessioned works normally replace previous listings (except older versions for which further user access is to be permitted).
- the library server program 30 is entered for activating a network web page by which users can communicate with the distribution system 10 , in an activate web page step 56 .
- Such communication is diagramed in FIG. 2 .
- FIG. 8 shows further details of user communication including delivery of works from vendor facilities 17
- FIG. 8 shows communication that includes shared file transfer between users of the delivery system 10 .
- the process 50 includes a test catalog request step 58 for determining such user request, in which case the catalog is provided in a return catalog step 59 .
- the return catalog step 59 can be performed by simply transmitting a listing of the catalog 35 over the computer network 14 to the requesting user, the browser 38 automatically opening and displaying a file containing the listing in a conventional manner.
- an option can be provided for the user to request a hard copy of the catalog 35 to be mailed, in which case the process 50 proceeds to obtain appropriate mailing information from the user.
- Program control is passed from the return catalog step 59 to the test catalog request step 58 for handling further catalog requests by the user, if any, and as further described herein.
- a user accessing the web page is also presented with an election to place a new order.
- the process 50 includes a test order step 60 for determining such user request, which is processed as described below.
- the user is further presented with an election to open a new account.
- the process 50 includes a test account step 62 for determining such user request. If the user has not requested any of the three, control is returned to the request catalog step 58 , the process 50 thus looping and waiting for another user request.
- control is passed to a get user data step 64 in which the user provides identification data and payment authorization in a conventional manner and, optionally, a desired authorization level that can define a number of plays, a period of time (which can be play time or calendar time, for example), and premium options such as whether play of “new releases” is to be authorized. Also, the payment authorization can selectively enable automatic periodic or repeated payments for “recharging” of the authorization.
- a customer flag for that user is set in a set cflag step 65 with control passing to the test catalog request step 58 for further processing of that user's transactions.
- the customer flag (or other associated stored variable(s)) can be further set according to details of the authorization; and/or further to define that user's requirements regarding the player program 42 .
- the user's computer can be interrogated (and/or the user can be asked) to identify its default media player, for selection of a “plug-in” version of the media player 42 to be used as a software patch on the user's identified default media player. In either case a “stand-alone” counterpart media player 42 is optionally selectable.
- control is passed from the test new order step 60 to a test cflag step 66 . If the customer flag for that user has not yet been set, control passes to a logon step 68 in which the user enters a customer identifier and password which are compared in a test logon step 69 with data previously received in the get user data step 64 . If the logon is unsuccessful, control is passed to the get user data step 64 , it being assumed that the user had not previously established an account. In case the user had previously established an account yet failed to properly logon, the process 50 can include an appropriate recovery procedure according to methods known in the art.
- control is passed from the test logon step 69 to the set cflag step 65 in which the customer flag is set for that user (now confirmed as a customer) as described above.
- control is returned from the set cflag step 65 to the test catalog request step 58 as before in anticipation of the user requesting placement of a new order as a customer, control being passed successively by the new order step 60 to the test cflag step 66 which, in the case of the customer flag having been set, control is passed to a get list step 70 wherein the customer selects items from the catalog 35 to be downloaded over the computer network 14 to the mass storage device 40 of the customer computer 16 .
- a command can be transmitted for disabling the customer's media player 42 , the customer's authorization can be canceled, the customer's media player 42 can be reset or re-calibrated to block extension of the authorization, or the authorization can be reduced to match a correct remaining authorization as determined at the service facility 11 .
- the customer can search for particular works by category, author, artist, publisher, etc.
- searching can also be by lyrics and melody.
- searching can be by title, genre, actor, director, writer, producer, music composer, decade released, etc.
- searching can be by author, title, publisher, or text. It will be understood that when the customer flag (or associated customer data) contains restrictions on use, such as accessing catalog items that are not “new releases”, only items that are consistent with the customer's authorization level are permitted to be selected. Alternatively, other items can be selected and downloaded, but not accessed unless and until the customer's authorization is augmented appropriately.
- the customer is invited to approve of his selections in a test list step 71 from which control is returned to the get list step 70 in case the customer is dissatisfied with his previous selection; otherwise, control is passed to a set authorization level step 72 in which an authorization variable is set in accordance with previously established payment authorizations as determined in the get user data step 64 .
- control is passed to a do transaction step 74 in which selected files are copied from the data file 33 (for locally stored works).
- the selected data files are then further encrypted, preferably in a manner that permits decryption only by the particular customer, such as by public-private key encryption or other suitable means, in a second level encrypt step 76 .
- a second level encrypt step 76 Alternatively, such as when data files are to be encrypted alike for all customers, only a single encryption is needed, which can be done in the first level encrypt and store step 53 or the second level encrypt step 76 .
- the files as thus encrypted are then transmitted over the computer network 14 in an output files step 78 . Users that are new customers also receive appropriate codes and/or software (the player program 42 ) for enabling playback of the works.
- a new key or coding element can be added or substituted to both the media files and the media player 42 each month. (This addition or substitution is contemplated to be made to the player 42 one month prior to that for the media files to facilitate customer subscriptions for variable subscription months rather than the same month periods for all customers.) This helps insure against tampering with the player to render it perpetually charged, because it could then play files then resident but not those thereafter obtained. Also, a periodic integrity check would reveal a lack of current key(s) and/or coding, in which case the player can be disabled. It will be understood that the term “player program 42 ” is inclusive of stand-alone file access software, software patches including portions of the exemplary player program 42 as described below in connection with FIG.
- an exemplary configuration of the distribution process 50 has the transaction step 74 including a program loop executing, for each catalog selection, a counterpart of the test local step 55 for branching to a set link step 75 in which a universal resource locator (URL) is derived (or copied) from the catalog data for that selection.
- the URL is to an encrypted full record of the selection that is maintained at one of the vendor facilities 17 being accessible via the computer network 14 . It will be understood that more than one such URL may be associated with a particular work when the work is available from plural vendors, additional URLs facilitating access to such works when there is excessive network traffic directed to particular vendors.
- Encryption of the files at the vendor facilities can be done individually by counterparts of the second level encrypt step 76 as described above, or single encrypted copies of each work can be transmitted from the vendor facilities 17 as also described above in connection with FIG. 3 . Further, it is contemplated, particularly in implementations of the present invention that use the same encryption of data files for multiple customers, that customers will be permitted to copy and play encrypted files from other customers, so long as appropriate authorization remains in effect. Thus the vendor facilities 17 and the computers of other customers are sometimes collectively referred to as source facilities. In cases wherein the sharing customers do not operate web pages of their own, an e-mail request can be used in place of an ordinary URL.
- the transaction step 74 is completed, when the program loop is done processing the customer's library selections, by determining in an identify player step which, if any, counterpart of the player program 42 is to be transmitted to the customer. This determination is based on interrogation of the customer flag (described above in connection with the set cflag step 65 of FIG. 3 ) which can contain the identity of the customer's default media player, if any, as well as the customer's authorization level, and whether the customer is a new customer (not previously receiving a counterpart of the media player 42 ). Also or in the alternative, the customer flag (or other suitable variable) can signify whether the authorization level has changed and/or whether the customer's default (or otherwise identified) media player has changed, in which cases a new download of a media player 42 counterpart is to be performed.
- the customer flag (or other suitable variable) can signify whether the authorization level has changed and/or whether the customer's default (or otherwise identified) media player has changed, in which cases a new download of a media player 42 counterpart is to be
- the second level encrypt step 76 is repeated, if necessary, to uniquely encrypt the identified counterpart media player 42 for the currently requesting customer.
- this on-line encryption is not required if no media player counterpart is to be transmitted in the current session, or to the extent that the same encryption can be transmitted to plural customers, in which case it is contemplated that some other unique or quasi-unique code(s) are to be transmitted with a generically encrypted counterpart of the media player 42 .
- the customer's authorization is to be “recharged” an entirely new media player 42 can be downloaded, or merely codes or other control information to modify a previously downloaded player 42 .
- the media distribution system 10 of the present invention preferably provides for retention of some or all of the data files 33 at vendor facilities 17 , for facilitating quality control, record keeping, and marketing activities by operators of the vendor facilities 17 .
- Methods of record keeping include tracking of data by the host server, setting of cookies on customers' computers, either alone or’ in combination.
- the data can include customer identity (by real name or pseudonym), the number of downloads to the customer's computer, the number of uploads vrom the customer's computer, and the number of plays of each media file.
- the accession program 34 does not process and store the data, but does generate records of the catalog 35 as described above.
- Royalty payments to those having rights in the data files 33 can be made from funds received by the customers, and the payments can be allocated commensurate with conventional practice, being prorated for example according to the frequency of selection of particular works by the customers. Allocations can also be based on the number of plays of works belonging to particular copyright holders, the number of downloads of such works, the total playing time of such works, or any combination thereof.
- test account step 62 when the outcome of the test account step 62 is negative control may be returned to the receive data step 52 instead of the test request step 58 , with provision for an interrupt redirection to the return catalog step 59 , the user data step 64 , and the test cflag step 66 for servicing corresponding user requests being offered on the web page.
- the player program 42 is implemented for permitting the user to freely play whatever files of the catalog 35 he has downloaded from the server computer 12 and/or any of the vendor facilities 17 as enabled or otherwise facilitated by the delivery system 10 , until a composite authorization for play is expended.
- the composite authorization may change, such as when a customer account previously authorized to play “new releases” is recharged at a lower level.
- the system 10 may be implemented to play preview portions only of some works unless and until a higher authorization is purchased.
- the authorization is in the form of a total elapsed time of play.
- the player program 42 includes a display collection list step 80 in which all files previously downloaded from the server computer 12 are displayed on the screen display 21 of-the customer computer 16 .
- This list step 80 can also incorporate search and/or navigation capabilities for facilitating customer review of certain portions of the list when it is particularly long.
- the program 42 verifies current authorization to play a selected file in a test authorization step 82 . If authorization is not current, control is passed to a test server contact step 84 wherein the user is invited to establish network contact with the server computer 12 , in which case the program 42 waits in an obtain authorization step 85 for authorization to be obtained or appropriately augmented; otherwise, the player program 42 is terminated.
- control is returned to the test authorization step 82 for verification of the authorization, in which case control is passed to a select file step 86 for determining which of the listed files the user wishes to have played.
- control passes to a set meter step 88 , which in the case of the exemplary implementation of FIG. 3 , transfers a currently available play time as authorized to a clock register that is maintained by the player program 42 .
- an appropriate setting is the number of minutes of play authorization currently available to the user.
- the selected file is then accessed and played, with decryption, in a start play step 90 and a timer is activated in a start clock step 91 , with control passing to a test end step 92 for testing whether play of the selected file has run to completion, in which case termination of play is processed in a stop play step 93 (the clock is deactivated), with the user's currently remaining play authorization being updated, control being returned to the test authorization step 82 at which point the user is invited to select another file, etc. until he either terminates the program or runs out of authorization as described below.
- the user is also provided with an option to terminate play prior to the end of the file in a test user stop step 94 , in which case control is transferred to the stop play step 93 .
- a test tick step 95 determines whether the clock has run for a predetermined time (one minute in the current example), in which case the meter that was previously set in the set meter step 88 is decremented in a decrement meter step 96 . Otherwise, control is returned to the test end step 92 . Following the decrement meter step 96 , the meter is tested for underflow in a test timeout step 97 . If not, control is returned to the test end step 92 ; otherwise, control is passed to the stop play step 93 for termination of the play.
- the essential included elements are that portion of the start play step 90 that permits decryption of files being played, and means for terminating play upon expiration of necessary authorization (such as the steps 82 , 84 , 85 , 88 , 91 , 95 , 96 , and 97 of FIG. 4 ).
- Other aspects of navigation of the encrypted files can be controlled by the previously resident program, although the patch counterpart preferably is set for principally (such as by a default file folder) accessing only those files whose delivery is facilitated by the delivery system 10 of the present invention.
- the patch could also be set for exclusive access of files associated with the system 10 , it is also preferred that pre-existing functions of the customer's resident file access device remain operational. If the customer's authorization expires, the plug-in-patch implementation of the media player 42 ceases to function, preferably leaving the resident access device to function as if the patch had not been applied.
- an alternative implementation of the player program provides a predetermined number of plays ( 25 , for example) rather than a predetermined play time.
- the meter is set in the set meter step 88 to the current available number of plays.
- the program 42 ′ proceeds as described above in connection with FIG. 4 through the start clock step 91 , the test end step 92 , the test user stop step 94 to the test tick step 95 for testing whether a threshold period of time has elapsed from the start clock step 91 for avoiding debiting of the user's authorizations until play has proceeded for an introductory period of time.
- test tick step 95 reaches an affirmative result, with control passing to the decrement meter step 96 in which the play authorization is decremented by one.
- control passes from the decrement meter step 96 to a stop clock step 98 for stopping the clock so as to limit the decrementing of the meter to a single unit for each file played.
- the play authorization is for a period of time as in the implementation of FIG. 4 , but with play continuing to the end of a file being played when timeout occurs.
- the test timeout step 97 is omitted from the implementation of FIG. 4 , control returning directly from the decrement meter step 96 to the test end step 92 .
- the player program 82 can utilize a conventional clock of the customer computer 16 C in the start clock step 91 and the test tick step 95 , for example by storing a counterpart of the system time in the start clock step 91 , and comparing that counterpart with current system time in the test tick step 95 , finding a positive outcome when the time difference reaches a predetermined interval (one minute in the example described previously).
- a predetermined interval one minute in the example described previously.
- the stored counterpart of the system time can be incremented by one minute for subsequent comparisons in a next tick interval.
- the stored counterpart can alternatively be initially set in the start clock step 91 to one minute ahead of the system time for facilitating the comparison by detecting a change in sign of the difference between the values in the test tick step 95 .
- the library server program can be implemented to provide an encoded counterpart of the system time (and date) of the server computer 12 , as well as an expiration time, in the output files step 78 (whether for downloading data files or just for recharging).
- the player program 42 can then make comparisons between the system times, taking appropriate action in the event that there is a significant change in the difference. It will be understood that in implementations based on calendar time there is no requirement for monitoring elapsed playing time as described above in connection with FIGS. 4 and 5 . However, such monitoring can be utilized for allocating royalty payments' and/or for guarding against resetting of the system time (because usage time should never exceed elapsed calendar time).
- another counterpart of the player program designated 42 ′′, has a timer module 100 associated therewith, the timer module 100 being implemented to run when the customer computer 16 C is operating, notwithstanding the player program 42 ′′ being inactive.
- a determination is made of whether the program is being run for the first time by the customer computer 16 C in a test first play step 102 , in which case a launch timer module step 104 generates and stores appropriate files for implementing and running the timer module 100 , using programming elements that are known to those having skill in the art.
- the timer module 100 is restarted whenever the computer 16 C is subsequently booted-up or restarted, the module 100 monitoring a system date and time of the computer 16 C as well as separately maintaining a timer calendar date and time.
- the timer calendar date and time is automatically advanced by a difference between the system date and time and a corresponding date and time last saved in a previous period of running of the timer module 100 .
- test first play step 102 has a negative outcome (on a subsequent starting of the player program 42 ′′)
- control passes to a test timer step 106 , wherein the presence and operation of the timer module 100 is verified, and an appropriate match of the timer date and time with the system date and time is determined, in which case control is passed to the display list collection step 80 , described above in connection with FIG. 4 ; otherwise, the player program 42 ′′ is terminated based on unauthorized tampering with calendar/time settings.
- the player program 42 ′′ of FIG. 6 is implemented for operation with authorizations based on calendar time, with the set meter, start clock, test tick, and decrement meter steps 88 , 91 , 95 , and 96 of FIG. 4 being omitted.
- control passes directly from the select file step 86 to the start play step 90 ; from the start play step 90 to the test end stop 92 ; and from a negative outcome of the test user stop step 94 to a counterpart of the timeout test step, designated 97 ′.
- the calendar date and time of the timer module 100 is compared with termination date and time as currently authorized, with control returning to the test end step 92 or the stop play step 93 as described above in connection with FIG. 4 .
- timeout test step 97 ′ (as well as the test user stop step 94 ) can be omitted when it is desired that play continue to the end of a particular data file, control passing from a negative result of the test user stop step 94 to the test end step 92 .
- the player program 42 ′′ as shown in FIG. 6 provides additional protection against unauthorized tampering with calendar and time settings of the customer computer 16 C. Further protection can be provided by including, in the obtain authorization step 85 , a comparison of the calendar date and time of the timer module 100 and/or the system time of the customer computer 16 C with the system time and date of the server computer 12 , with termination in the event that tampering is detected. Similarly, the above comparison would be performed in the get list step 70 , the set authorization step 72 and/or the do transaction step 74 of the distribution process 50 , with the process being terminated as to customers that are determined to have attempted to misuse the process.
- an alternative configuration of the player program 42 ′′ has a counterpart of the test authorization step, designated 82 ′, implemented for determining authorization but not for the selected file.
- the select file step precedes the test authorization step 82 ′, and if the authorization is insufficient (low), control is returned to the display list step 80 . If sufficient authorization is present, control passes to the start play step 90 ; otherwise, the test server contact step 84 is performed as before in the implementation of FIG. 6 .
- a standalone device can be provided for implementing all or appropriate functions of the customer computer 16 C, in which case a battery powered system clock can be implemented in a secure manner for setting only in accordance with the system time of the server computer 12 . (Such device in implementations according to FIGS. 4 and 5 would not require the clock to be settable to date and time of day.)
- authorizations can be purchased by customers on a monthly basis, with payments either made conventionally by check, etc., by phone, or on-line, with the system being configured for automatic debiting of bank accounts and credit accounts as authorized by the customers. While the authorizations remain in effect, customers are free to visit the service facility web site, download unlimited encrypted digital media files as authorized, play those files unlimited times, and share those files with friends (who are able to play them when and so long as THEY have purchased authorization).
- the plug-in enables the customer's player to play encrypted music files, or more generally to access encrypted electronic files of any supported type.
- the patch preferably provides additional buttons in the user's player, including “Company Home,” “Share Music,” and “Burn CD.”
- the “Company Home” button opens the Company homepage, wherefrom the customer can search for and download music files as the encrypted data files 33 , and purchase authorizations.
- the “Share Music” button launches an e-mail dialogue box with a space for destination addressee, a space for a message, and a menu of the sender's music files and compilations for easy attachment to the message. More particularly, the attachment only has a set of links to the music files on servers of the service facility 11 and/or source facilities such as vendor facilities 17 . Recipients would then download the files directly from such server. Preferably the service facility 11 is copied with these e-mails for maintenance of such links as alternate sources for the encrypted data files 33 . Alternatively, actual media file attachments to e-mail communications between customers are possible, such “peer-to-peer” transfers correspondingly reducing communication traffic with the service facility 11 and the vendor facilities 17 .
- the “Burn CD” feature invites the customer to burn an encrypted music file or compilation from his hard drive. Any user of the “burned” CD would still be required to be an authorized customer to access such copied media files.
- the present invention includes up to three software components which can be delivered to the customer's computer via download from a central server, via download from other customers on a “peer-to-peer” (P2P) basis, or via a removable drive medium such as a disk or CD-ROM.
- These three components are: (a) the media player 42 , as a stand-alone application or as a patch; (b) a program that simultaneously compresses media files for efficient transfer (such as compression of CD files to MP3 format) and encrypts the result into a proprietary format; and (c) a program that encrypts unencrypted media files into the proprietary format as and when such files are downloaded to the customer's computer.
- the above-described ability of the service facility 11 to provide network links to remote source facilities from which customers receive selections as encrypted files advantageously allows vendors such as record companies to house encrypted music files on their own servers, for enhanced quality control, record keeping, and marketing options.
- the distribution system 10 of the present invention does this while providing a single catalog (or portions thereof) in which to search the offerings of multiple suppliers of electronic files.
- the link occurs through the Company domain and/or a back channel and preferably retains a frame around the user's screen with buttons for “Company Home,” “Search Music,” “Browse Music,” etc., the browse option providing preview play of possible selections.
- kiosks can be provided for dispensing and/or recharging standalone devices that serve in place of at least some of the customer computer 16 C.
- the data files can be provided from the service facility 11 or other suitable source in the form of a CD or other form of removable drive medium, for play on the standalone devices and/or customer computers 16 C.
- usage can be limited or metered based on the number of media files downloaded, or the total size of the files downloaded, as well as elapsed calendar time and elapsed usage time, or any combination of these measures. Therefore, the spirit and scope of the appended claims should not necessarily be limited to the description of the preferred versions contained herein.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Game Theory and Decision Science (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Computational Linguistics (AREA)
- Artificial Intelligence (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The catalog is sent over the network to requesting users, and the system processes payments from customers in establishing file access authorizations. Encrypted user-selected files and a player program are transmitted to each customer for metered access to received data files as limited by the authorization, and customers can make additional selections and play the encrypted files freely while the authorization remains established. The system can transmit the data files from local storage, and also provide links to encrypted files that are stored at remote vendor facilities. Authorizations can be for selected portions or class levels of the catalog, and for terms measured as calendar time, play time, and collective number of plays. Also disclosed is a method for facilitating the distribution and accessing of electronic files.
Description
-
CROSS-REFERENCE TO RELATED APPLICATIONS
-
This patent application is a continuation of U.S. patent application Ser. No. 10/908,373, filed May 9, 2005, issued as U.S. Pat. No. 7,877,412 on Jan. 25, 2011, which is a continuation of U.S. patent application Ser. No. 09/910,438, filed Jul. 19, 2001, issued as U.S. Pat. No. 6,912,528 on Jun. 28, 2005, which is a continuation-in-part of U.S. patent application Ser. No. 09/484,632, filed Jan. 18, 2000, which are incorporated by reference.
BACKGROUND OF THE INVENTION
-
The present invention relates to electronic media players, and more particularly to media that is downloadable over a communication network.
-
The distribution of software such as computer programs to be executed and data to be accessed has traditionally been by means of physical media that is either sold or rented. For example, computer programs are distributed on magnetic disks, and more recently on optical compact disks. Audio works such as musical recordings have been distributed on grooved records, magnetic tape, and compact disks; and movies have been distributed on magnetic tape and video disks of various formats. Often it is desired to restrict operation of the software to authorized users and/or for authorized uses. U.S. Pat. Nos. 5,014,234 to Edwards, Jr., 5,564,038 to Grantz et al., and 5,715,169 to Noguchi, for example, disclose various schemes for restricting copying and use of the software.
-
More recently, public access communication channels such as the Internet have been developed to the point that distribution of large volumes of software is feasible electronically. However, the protection of the software against unauthorized use and copying is typically awkward, bothersome, and ineffective. U.S. Pat. No. 5,790,423 to Lau discloses a system for downloading and playing music wherein certain copyrighted material may only be used for a specific length of time. The system of Lau includes a service center having a user accessible library of selectable programs, a base unit from which user generated program selections are transmitted to the service center, and a cassette for storing programs downloaded by the base unit from the service center. In one implementation, the date and time of downloading and playing of particular program selections is stored in memory of the base unit and/or the cassette. Copyright information is programmed into a control program of the cassette to limit the usage of each selected program. U.S. Pat. No. 4,898,736 to Walker discloses downloadable information having access through a keyed device.
-
These systems of the prior art exhibit a number of shortcomings, including one or more of the following:
-
They are difficult to use in that they require physical delivery of media and/or keys;
-
They are expensive to manage in that uses must be metered separately for particular works; and
-
They require undesirable compromises between the number of available works and the cost of obtaining access.
-
Thus there is a need for an electronic media distribution system that overcomes the disadvantages of the prior art.
BRIEF SUMMARY OF THE INVENTION
-
The present invention meets this need by providing a rechargeable media distribution and play system that is particularly efficient, versatile, and easy to use. In one aspect of the invention, the system includes a service facility having an electronically accessible catalog of electronic files, and an interface to a communications network. The system can transmit the catalog to a requesting user, and set up customer accounts, process payments from customers for establishing file access authorizations, and enables transmission user-selected files to customers. The system also provides a player program to each customer for metering access to received data files as limited by the authorization. Optionally, the system is enabled for transmitting the selected files to the customer only while the authorization remains established. The system can also be implemented for receiving the user request and feeding the catalog to the user via the network interface. Also, or alternatively, communications with the user for defining the user account can be through the network interface.
-
Preferably the system can set an authorization level of the customer's authorization to a first value corresponding to a first authorized plurality of the electronic files, and to a second value corresponding to a second plurality of the electronic files. The system can also provide augmenting the authorization in accordance with further processing of payments by the customer.
-
Preferably the system can, in defining the customer account, identify existing file access software to be used by the customer, and the player program is in the form of a software patch to be used in conjunction with the existing file access software. The identifying of the existing file access software can be by electronically interrogating a computer being used by the user to determine a default media player setting of that computer, the system selecting the software patch from a stored plurality of player patches.
-
Preferably the system enables transmissions of the data files and the player program in encrypted form, with the player program decrypting the received data files only while authorization remains established. Preferably the authorization is independent of both the selected files and the number of files selected among those that are authorized. Thus customers can freely access all of the files and play any of selected files, to the extent of a blanket authorization, which can also be recharged based on further payments.
-
Authorization can be only for a period of time which can be calendar time, optionally commencing upon use of the player program. Alternatively, the time is measured only during the accessing data of the received data files by the player program. In another alternative, authorization can be for a collective number of accesses of data of the received data files, and the numbered accesses can be counted only after a threshold period of time of accessing the data files.
-
Preferably the system processes renewals and extensions of customer authorizations in conjunction with processing of further payments from the customers.
-
The system can have storage of at least some of the data files at the service facility. Preferably the system facilitates transmission of at least some of the electronic files to customers from remote locations, preferably further including means for redirecting customer communications to remote source facilities over the network.
-
Another aspect of the invention provides a method for facilitating distribution of electronic files to be accessed, including providing the catalog of the electronic files for access by users of a communication network; defining a customer account for a user to identify the user as a customer, to process payments from the customer and to establish authorization for accessing an authorized plurality of the electronic files; enabling transmission of selected electronic files to the customer as received data files over the communication network in response to a customer order; and providing to the customer a player program for accessing and metering access to the received data files. The enabling can be for the selected electronic files to be transmitted in encrypted form, and providing with the player program means for decrypting the received data files.
-
The invention also provides a process for playing electronic media using the method described above wherein the authorization is for a predetermined length of time, the method further including activating the player program; monitoring elapsed time; and inhibiting operation of the player program when the elapsed time reaches the predetermined period. The monitoring can be only during the accessing of the received data files. The inhibiting can be suppressed until the end of a currently accessed data file.
-
The monitoring can be of calendar time, in which case the monitoring optionally commences only upon accessing of data of the received data files. Also, the inhibiting can be suppressed until the end of a currently accessed data file.
-
Other objects, features, and advantages of the present invention will become apparent upon consideration of the following detailed description and the accompanying drawings, in which like reference designations represent like features throughout the figures.
BRIEF DESCRIPTION OF THE DRAWINGS
-
These and other features, aspects, and advantages of the present invention will become better understood with reference to the following description, appended claims, and accompanying drawings, where:
- FIG. 1
is a pictorial block diagram of an electronic media distribution system according to the present invention;
- FIG. 2
is a block diagram of a distribution process using the system of
FIG. 1;
- FIG. 3
is a computer flow chart of a service facility distribution program for implementing the process of
FIG. 2;
- FIG. 4
is a flow chart of a customer facility media player program for implementing the process of
FIG. 2;
- FIG. 5
is a flow chart portion showing an alternative configuration of the player program of
FIG. 4;
- FIG. 6
is a flow chart showing another alternative configuration of the player program of
FIG. 4;
- FIG. 7
is a flow chart showing an alternative configuration of a portion of the player program of
FIGS. 6; and
- FIG. 8
is a flow chart showing further details of the distribution program of
FIG. 3within region 7 thereof.
DETAILED DESCRIPTION OF THE INVENTION
-
The present invention is directed to a system for distributing and playing electronic media that is particularly efficient, easy to use, and effective in accommodating differing patterns of use. With reference to
FIG. 1of the drawings, a
distribution system10 includes a
service facility11 that can be implemented as a
server computer12 being connected to an
electronic communication network14, there being a plurality of
user facilities15 that can also be connected to the
network14, one such being designated
customer facility15C and being implemented as a
customer computer16. It is contemplated that a plurality of source or
vendor facilities17 are also connected to the
communication network14, such facilities being operated by holders of works to be distributed as facilitated by the
system10 of the present invention and further described below. Connections to the
network14 are by
respective communication lines18, which can be telephone utility lines. Connections can also be by satellite, cable, fiber, radio, cellular phone, in any combination. As shown in
FIG. 2, the
service computer12 includes an
operator interface20 having a
screen display21, a
keyboard22, a
mouse23. The
computer12 also includes
memory24 and a
modem interface26 for connecting to the network through an
available communication line18.
-
The
memory24, at least some of which is typically non-volatile, has a
web server program28 and a
library server program30 having access to
mass data storage32 in accordance with the present invention. The
mass data storage32 is loaded with a library of data files (one such being designated 33) by an
accession program34, the accession program also generating a
catalog35 that is periodically updated and saved in the
data storage32. As further described below in connection with
FIGS. 3 and 7, some or all of the data files can be retained in the
vendor facilities17.
-
The
customer computer16 includes a counterpart of the operator interface, designated 20′, the
memory24, and the
modem interface26. In addition to having counterparts of the
screen display21,
keyboard22,
mouse23, the
operator interface20′ includes a pair of
audio speakers25, the
computer16 further including a
media interface36 for driving the
speakers25. In an exemplary implementation of the
customer computer16, the
memory24 has a
web browser38 by which data made available by the
service facility11 is accessed and saved in a suitable mass storage device such as a conventional
hard disk drive40. In further accordance with the present invention, the
memory24 of the customer computer receives a
media player program42 for conditionally accessing received data as further described below. It will be understood that the
player program42 can be in the form of a program “patch” or “plug-in” to be used in conjunction with a commercially and/or publicly available media player. Media players are known devices for accessing media files. In the context of this application, media files are electronic files that are typically digital in form, and include, without limitation: a) books and other text-only material; b) music, audio books, and other audio-only material; c) films, television programming, and other audio-visual material; d) games and other interactive material; and e) software programs. In the case of software programs, it will be understood that the
media player42 functions somewhat as an operating system for encrypted programs. Suitable software media players to be patched with counterparts of the
media player42 include WINAMP PLAYER, available from AOL Time Warner of New York, N.Y.; WINDOWS MEDIA PLAYER, available from Microsoft Corp. of Redmond, Wash.; and REALPLAYER, available from RealNetworks, Inc., of Seattle, Wash. These players play music files, whether compressed in the known MP3 format or otherwise, and the WINDOWS and REALPLAYER players also play audio-visual files. Book and text-only files can be played on the Software Reader software of Gemstar eBook Group, Redwood City, Calif., and the Adobe Acrobat eBook Reader 2.2, available from Adobe Systems, Inc. of San. Francisco, Calif. Games and interactive material can be played on Dreamcast, available from Sega of America Dreamcast, Inc. of San Franciaco, Calif., and Sony PlayStation, available from Sony Corp. of New York, N.Y.
-
With further reference to
FIGS. 2-4and 8, a
distribution process50 is provided wherein the
accession program34 maintains a library of recordings and a user of the
customer computer16 interacts with the
library server program30 of the
server computer12 over the
network14. It will be understood that the
library server program30 and the
accession program34 can be respective modules of an integrated computer program. As shown in
FIG. 3, the
accession program34 is programmed to include a receive
data step52 in which bibliographic data and, optionally, full records, of one or more works to be distributed are received in computer-readable form such as on a digitally recorded compact disk. As described above in connection with
FIG. 1, the data can also be transmitted from one or more of the
vendor facilities17 via the
computer network14, or by any suitable means. When the complete work is included, the data is subjected to a first level of encryption, being stored in the data file 33 in an encrypt and
store step53. Finally, the
catalog35 is updated in a maintain
catalog step54 for including the new work(s). A test
local step55 is interposed after the receive
data step52 for bypassing the encrypt and
store step53 when the data includes bibliographic information but not the full record of particular works, the bibliographic information in such cases including URL fields or other suitable data for enabling subsequent user access to full encrypted records of such works. It will be understood that the test
local step55 can be omitted when all of the data either includes the full records or does not include any full records. Also, catalog listings for new versions of previously accessioned works normally replace previous listings (except older versions for which further user access is to be permitted). Once the
catalog35 reflects current status of the data file 33, the
library server program30 is entered for activating a network web page by which users can communicate with the
distribution system10, in an activate
web page step56. Such communication is diagramed in
FIG. 2.
FIG. 8shows further details of user communication including delivery of works from
vendor facilities17, and
FIG. 8shows communication that includes shared file transfer between users of the
delivery system10.
-
A user accessing the web page is presented with an election to receive a listing of the
catalog35. Accordingly, the
process50 includes a test
catalog request step58 for determining such user request, in which case the catalog is provided in a
return catalog step59. It will be understood that the
return catalog step59 can be performed by simply transmitting a listing of the
catalog35 over the
computer network14 to the requesting user, the
browser38 automatically opening and displaying a file containing the listing in a conventional manner. Alternatively, an option can be provided for the user to request a hard copy of the
catalog35 to be mailed, in which case the
process50 proceeds to obtain appropriate mailing information from the user. It will be understood that in either case, the user can be given the option to select a portion only of the catalog that contains one or more categories of subject matter, author, artist, publisher, etc., and whether or not “new releases” are to be included. Program control is passed from the
return catalog step59 to the test
catalog request step58 for handling further catalog requests by the user, if any, and as further described herein. A user accessing the web page is also presented with an election to place a new order. Accordingly, the
process50 includes a
test order step60 for determining such user request, which is processed as described below. The user is further presented with an election to open a new account. Accordingly, the
process50 includes a
test account step62 for determining such user request. If the user has not requested any of the three, control is returned to the
request catalog step58, the
process50 thus looping and waiting for another user request.
-
When the user has requested a new account, control is passed to a get user data step 64 in which the user provides identification data and payment authorization in a conventional manner and, optionally, a desired authorization level that can define a number of plays, a period of time (which can be play time or calendar time, for example), and premium options such as whether play of “new releases” is to be authorized. Also, the payment authorization can selectively enable automatic periodic or repeated payments for “recharging” of the authorization. Once the user's account is established, a customer flag for that user is set in a
set cflag step65 with control passing to the test
catalog request step58 for further processing of that user's transactions. It will be understood that the customer flag (or other associated stored variable(s)) can be further set according to details of the authorization; and/or further to define that user's requirements regarding the
player program42. For example, the user's computer can be interrogated (and/or the user can be asked) to identify its default media player, for selection of a “plug-in” version of the
media player42 to be used as a software patch on the user's identified default media player. In either case a “stand-alone”
counterpart media player42 is optionally selectable.
-
In the case that the user requests a new order, control is passed from the test
new order step60 to a
test cflag step66. If the customer flag for that user has not yet been set, control passes to a
logon step68 in which the user enters a customer identifier and password which are compared in a
test logon step69 with data previously received in the get
user data step64. If the logon is unsuccessful, control is passed to the get
user data step64, it being assumed that the user had not previously established an account. In case the user had previously established an account yet failed to properly logon, the
process50 can include an appropriate recovery procedure according to methods known in the art. Once logon is successfully completed, control is passed from the
test logon step69 to the
set cflag step65 in which the customer flag is set for that user (now confirmed as a customer) as described above. As further described above, control is returned from the
set cflag step65 to the test
catalog request step58 as before in anticipation of the user requesting placement of a new order as a customer, control being passed successively by the
new order step60 to the
test cflag step66 which, in the case of the customer flag having been set, control is passed to a
get list step70 wherein the customer selects items from the
catalog35 to be downloaded over the
computer network14 to the
mass storage device40 of the
customer computer16. (It is also contemplated that integrity checks of customers can be made at any time the customers are communicating on the
network14.) Upon a detected violation of customer integrity, a command can be transmitted for disabling the customer's
media player42, the customer's authorization can be canceled, the customer's
media player42 can be reset or re-calibrated to block extension of the authorization, or the authorization can be reduced to match a correct remaining authorization as determined at the
service facility11.
-
In making selections, the customer can search for particular works by category, author, artist, publisher, etc. In the case of music, searching can also be by lyrics and melody. In the case of films, searching can be by title, genre, actor, director, writer, producer, music composer, decade released, etc. In the case of books, searching can be by author, title, publisher, or text. It will be understood that when the customer flag (or associated customer data) contains restrictions on use, such as accessing catalog items that are not “new releases”, only items that are consistent with the customer's authorization level are permitted to be selected. Alternatively, other items can be selected and downloaded, but not accessed unless and until the customer's authorization is augmented appropriately. The customer is invited to approve of his selections in a
test list step71 from which control is returned to the
get list step70 in case the customer is dissatisfied with his previous selection; otherwise, control is passed to a set
authorization level step72 in which an authorization variable is set in accordance with previously established payment authorizations as determined in the get
user data step64.
-
Next, control is passed to a
do transaction step74 in which selected files are copied from the data file 33 (for locally stored works). The selected data files are then further encrypted, preferably in a manner that permits decryption only by the particular customer, such as by public-private key encryption or other suitable means, in a second
level encrypt step76. Alternatively, such as when data files are to be encrypted alike for all customers, only a single encryption is needed, which can be done in the first level encrypt and
store step53 or the second
level encrypt step76. The files as thus encrypted are then transmitted over the
computer network14 in an
output files step78. Users that are new customers also receive appropriate codes and/or software (the player program 42) for enabling playback of the works. As further security against unauthorized file access, a new key or coding element can be added or substituted to both the media files and the
media player42 each month. (This addition or substitution is contemplated to be made to the
player42 one month prior to that for the media files to facilitate customer subscriptions for variable subscription months rather than the same month periods for all customers.) This helps insure against tampering with the player to render it perpetually charged, because it could then play files then resident but not those thereafter obtained. Also, a periodic integrity check would reveal a lack of current key(s) and/or coding, in which case the player can be disabled. It will be understood that the term “
player program42” is inclusive of stand-alone file access software, software patches including portions of the
exemplary player program42 as described below in connection with
FIG. 4, and variant counterparts thereof as further described in connection with
FIGS. 5 and 6, to be used in conjunction with a conventional or commercial media player or other file access software to be run by the customer computer 16C, or otherwise operated by the customer. The term is further inclusive of any hardware and/or software device or appliance that the customer may use to access encrypted files having been delivered as facilitated by operation of the
system10 of the present invention.
-
With particular reference to
FIG. 8, an exemplary configuration of the
distribution process50 has the
transaction step74 including a program loop executing, for each catalog selection, a counterpart of the test
local step55 for branching to a
set link step75 in which a universal resource locator (URL) is derived (or copied) from the catalog data for that selection. Typically, the URL is to an encrypted full record of the selection that is maintained at one of the
vendor facilities17 being accessible via the
computer network14. It will be understood that more than one such URL may be associated with a particular work when the work is available from plural vendors, additional URLs facilitating access to such works when there is excessive network traffic directed to particular vendors. Encryption of the files at the vendor facilities can be done individually by counterparts of the second
level encrypt step76 as described above, or single encrypted copies of each work can be transmitted from the
vendor facilities17 as also described above in connection with
FIG. 3. Further, it is contemplated, particularly in implementations of the present invention that use the same encryption of data files for multiple customers, that customers will be permitted to copy and play encrypted files from other customers, so long as appropriate authorization remains in effect. Thus the
vendor facilities17 and the computers of other customers are sometimes collectively referred to as source facilities. In cases wherein the sharing customers do not operate web pages of their own, an e-mail request can be used in place of an ordinary URL. The
transaction step74 is completed, when the program loop is done processing the customer's library selections, by determining in an identify player step which, if any, counterpart of the
player program42 is to be transmitted to the customer. This determination is based on interrogation of the customer flag (described above in connection with the
set cflag step65 of
FIG. 3) which can contain the identity of the customer's default media player, if any, as well as the customer's authorization level, and whether the customer is a new customer (not previously receiving a counterpart of the media player 42). Also or in the alternative, the customer flag (or other suitable variable) can signify whether the authorization level has changed and/or whether the customer's default (or otherwise identified) media player has changed, in which cases a new download of a
media player42 counterpart is to be performed.
-
Following the
transaction step74 as implemented in
FIG. 8, the second
level encrypt step76 is repeated, if necessary, to uniquely encrypt the identified
counterpart media player42 for the currently requesting customer. As described before, this on-line encryption is not required if no media player counterpart is to be transmitted in the current session, or to the extent that the same encryption can be transmitted to plural customers, in which case it is contemplated that some other unique or quasi-unique code(s) are to be transmitted with a generically encrypted counterpart of the
media player42. When the customer's authorization is to be “recharged” an entirely
new media player42 can be downloaded, or merely codes or other control information to modify a previously downloaded
player42.
-
Thus the
media distribution system10 of the present invention preferably provides for retention of some or all of the data files 33 at
vendor facilities17, for facilitating quality control, record keeping, and marketing activities by operators of the
vendor facilities17. Methods of record keeping include tracking of data by the host server, setting of cookies on customers' computers, either alone or’ in combination. The data can include customer identity (by real name or pseudonym), the number of downloads to the customer's computer, the number of uploads vrom the customer's computer, and the number of plays of each media file. With respect to the data files 33 being retained at
vendor facilities17, the
accession program34 does not process and store the data, but does generate records of the
catalog35 as described above. Royalty payments to those having rights in the data files 33, whether stored at the
service facility11, at
vendor facilities17, or elsewhere, can be made from funds received by the customers, and the payments can be allocated commensurate with conventional practice, being prorated for example according to the frequency of selection of particular works by the customers. Allocations can also be based on the number of plays of works belonging to particular copyright holders, the number of downloads of such works, the total playing time of such works, or any combination thereof.
-
It will be understood that in implementations integrating the library accession and
server programs30 and 34, when the outcome of the
test account step62 is negative control may be returned to the receive
data step52 instead of the
test request step58, with provision for an interrupt redirection to the
return catalog step59, the
user data step64, and the
test cflag step66 for servicing corresponding user requests being offered on the web page.
-
With particular reference to
FIG. 4, the
player program42 is implemented for permitting the user to freely play whatever files of the
catalog35 he has downloaded from the
server computer12 and/or any of the
vendor facilities17 as enabled or otherwise facilitated by the
delivery system10, until a composite authorization for play is expended. It will be understood that the composite authorization may change, such as when a customer account previously authorized to play “new releases” is recharged at a lower level. Also, the
system10 may be implemented to play preview portions only of some works unless and until a higher authorization is purchased. In the exemplary implementation of
FIG. 4, the authorization is in the form of a total elapsed time of play. Accordingly, the
player program42 includes a display
collection list step80 in which all files previously downloaded from the
server computer12 are displayed on the
screen display21 of-the
customer computer16. This
list step80 can also incorporate search and/or navigation capabilities for facilitating customer review of certain portions of the list when it is particularly long. Next, the
program42 verifies current authorization to play a selected file in a
test authorization step82. If authorization is not current, control is passed to a test
server contact step84 wherein the user is invited to establish network contact with the
server computer12, in which case the
program42 waits in an obtain
authorization step85 for authorization to be obtained or appropriately augmented; otherwise, the
player program42 is terminated. From the obtain
authorization step85 control is returned to the
test authorization step82 for verification of the authorization, in which case control is passed to a
select file step86 for determining which of the listed files the user wishes to have played. Once the selection is made, control passes to a
set meter step88, which in the case of the exemplary implementation of
FIG. 3, transfers a currently available play time as authorized to a clock register that is maintained by the
player program42. In this implementation an appropriate setting is the number of minutes of play authorization currently available to the user. The selected file is then accessed and played, with decryption, in a
start play step90 and a timer is activated in a
start clock step91, with control passing to a
test end step92 for testing whether play of the selected file has run to completion, in which case termination of play is processed in a stop play step 93 (the clock is deactivated), with the user's currently remaining play authorization being updated, control being returned to the
test authorization step82 at which point the user is invited to select another file, etc. until he either terminates the program or runs out of authorization as described below.
-
The user is also provided with an option to terminate play prior to the end of the file in a test
user stop step94, in which case control is transferred to the
stop play step93. As play continues, with negative outcomes of the
test end step92 and the test
user stop step94, a
test tick step95 determines whether the clock has run for a predetermined time (one minute in the current example), in which case the meter that was previously set in the
set meter step88 is decremented in a
decrement meter step96. Otherwise, control is returned to the
test end step92. Following the
decrement meter step96, the meter is tested for underflow in a
test timeout step97. If not, control is returned to the
test end step92; otherwise, control is passed to the
stop play step93 for termination of the play.
-
When the
media player42 is to be supplied as a patch counterpart to be run in conjunction with an existing media player or other resident file access device of the customer, the essential included elements are that portion of the
start play step90 that permits decryption of files being played, and means for terminating play upon expiration of necessary authorization (such as the
steps82, 84, 85, 88, 91, 95, 96, and 97 of
FIG. 4). Other aspects of navigation of the encrypted files can be controlled by the previously resident program, although the patch counterpart preferably is set for principally (such as by a default file folder) accessing only those files whose delivery is facilitated by the
delivery system10 of the present invention. Although the patch could also be set for exclusive access of files associated with the
system10, it is also preferred that pre-existing functions of the customer's resident file access device remain operational. If the customer's authorization expires, the plug-in-patch implementation of the
media player42 ceases to function, preferably leaving the resident access device to function as if the patch had not been applied.
-
With further reference to
FIG. 5, an alternative implementation of the player program, designated 42′, provides a predetermined number of plays (25, for example) rather than a predetermined play time. In this implementation, the meter is set in the
set meter step88 to the current available number of plays. The
program42′ proceeds as described above in connection with
FIG. 4through the
start clock step91, the
test end step92, the test
user stop step94 to the
test tick step95 for testing whether a threshold period of time has elapsed from the
start clock step91 for avoiding debiting of the user's authorizations until play has proceeded for an introductory period of time. Once that introductory time has elapsed, the
test tick step95 reaches an affirmative result, with control passing to the
decrement meter step96 in which the play authorization is decremented by one. In the alternative implementation of
FIG. 5, control passes from the
decrement meter step96 to a
stop clock step98 for stopping the clock so as to limit the decrementing of the meter to a single unit for each file played.
-
In another alternative, the play authorization is for a period of time as in the implementation of
FIG. 4, but with play continuing to the end of a file being played when timeout occurs. In this case, the
test timeout step97 is omitted from the implementation of
FIG. 4, control returning directly from the
decrement meter step96 to the
test end step92.
-
The
player program82 can utilize a conventional clock of the customer computer 16C in the
start clock step91 and the
test tick step95, for example by storing a counterpart of the system time in the
start clock step91, and comparing that counterpart with current system time in the
test tick step95, finding a positive outcome when the time difference reaches a predetermined interval (one minute in the example described previously). In connection with the positive outcome, the stored counterpart of the system time can be incremented by one minute for subsequent comparisons in a next tick interval. Of course, the stored counterpart can alternatively be initially set in the
start clock step91 to one minute ahead of the system time for facilitating the comparison by detecting a change in sign of the difference between the values in the
test tick step95. This approach is impervious to errors or intentional offsetting of the system time from actual time that may be present in the customer computer 16C prior to execution of the
start clock step91. To guard against unauthorized resetting of system time during playing time, there are several alternatives. For example:
-
1. Use a separate software clock that is responsive to a system timer interrupt;
-
2. The above in combination with a periodic integrity check of the software clock program instructions;
-
3. Either of the above in combination with periodically relocating the software clock program instructions and registers;
-
4. Any of the above in combination with downloading of new encrypted timer software in each activation of the output files step of the
library server program30; and
-
5. Requiring use of a clock or system time of the
server computer12 during operation of the
player program42.
-
Instead of having the authorizations be for a predetermined amount of playing time, it is also contemplated, even preferred, to have authorizations based on calendar time, in which case there is a need to guard against resetting of system time whether or not the
player program42 is in operation. For this purpose, the library server program can be implemented to provide an encoded counterpart of the system time (and date) of the
server computer12, as well as an expiration time, in the output files step 78 (whether for downloading data files or just for recharging). The
player program42 can then make comparisons between the system times, taking appropriate action in the event that there is a significant change in the difference. It will be understood that in implementations based on calendar time there is no requirement for monitoring elapsed playing time as described above in connection with
FIGS. 4 and 5. However, such monitoring can be utilized for allocating royalty payments' and/or for guarding against resetting of the system time (because usage time should never exceed elapsed calendar time).
-
With further reference to
FIG. 6, another counterpart of the player program, designated 42″, has a
timer module100 associated therewith, the
timer module100 being implemented to run when the customer computer 16C is operating, notwithstanding the
player program42″ being inactive. As shown in
FIG. 6, upon starting the
player program42″, a determination is made of whether the program is being run for the first time by the customer computer 16C in a test
first play step102, in which case a launch
timer module step104 generates and stores appropriate files for implementing and running the
timer module100, using programming elements that are known to those having skill in the art. Accordingly, the
timer module100 is restarted whenever the computer 16C is subsequently booted-up or restarted, the
module100 monitoring a system date and time of the computer 16C as well as separately maintaining a timer calendar date and time. The timer calendar date and time is automatically advanced by a difference between the system date and time and a corresponding date and time last saved in a previous period of running of the
timer module100.
-
When the test
first play step102 has a negative outcome (on a subsequent starting of the
player program42″) control passes to a
test timer step106, wherein the presence and operation of the
timer module100 is verified, and an appropriate match of the timer date and time with the system date and time is determined, in which case control is passed to the display
list collection step80, described above in connection with
FIG. 4; otherwise, the
player program42″ is terminated based on unauthorized tampering with calendar/time settings. The
player program42″ of
FIG. 6is implemented for operation with authorizations based on calendar time, with the set meter, start clock, test tick, and decrement meter steps 88, 91, 95, and 96 of
FIG. 4being omitted. Thus control passes directly from the
select file step86 to the
start play step90; from the
start play step90 to the
test end stop92; and from a negative outcome of the test
user stop step94 to a counterpart of the timeout test step, designated 97′. In the
timeout test step97′, the calendar date and time of the
timer module100 is compared with termination date and time as currently authorized, with control returning to the
test end step92 or the
stop play step93 as described above in connection with
FIG. 4. It will be understood the
timeout test step97′ (as well as the test user stop step 94) can be omitted when it is desired that play continue to the end of a particular data file, control passing from a negative result of the test
user stop step94 to the
test end step92.
-
Thus the
player program42″ as shown in
FIG. 6provides additional protection against unauthorized tampering with calendar and time settings of the customer computer 16C. Further protection can be provided by including, in the obtain
authorization step85, a comparison of the calendar date and time of the
timer module100 and/or the system time of the customer computer 16C with the system time and date of the
server computer12, with termination in the event that tampering is detected. Similarly, the above comparison would be performed in the
get list step70, the
set authorization step72 and/or the do transaction step 74 of the
distribution process50, with the process being terminated as to customers that are determined to have attempted to misuse the process.
-
With further reference to
FIG. 7, an alternative configuration of the
player program42″ has a counterpart of the test authorization step, designated 82′, implemented for determining authorization but not for the selected file. In this alternative, the select file step precedes the
test authorization step82′, and if the authorization is insufficient (low), control is returned to the
display list step80. If sufficient authorization is present, control passes to the
start play step90; otherwise, the test
server contact step84 is performed as before in the implementation of
FIG. 6.
-
It is further contemplated that a standalone device can be provided for implementing all or appropriate functions of the customer computer 16C, in which case a battery powered system clock can be implemented in a secure manner for setting only in accordance with the system time of the
server computer12. (Such device in implementations according to
FIGS. 4 and 5would not require the clock to be settable to date and time of day.)
-
In a most preferred implementation of the present invention, authorizations can be purchased by customers on a monthly basis, with payments either made conventionally by check, etc., by phone, or on-line, with the system being configured for automatic debiting of bank accounts and credit accounts as authorized by the customers. While the authorizations remain in effect, customers are free to visit the service facility web site, download unlimited encrypted digital media files as authorized, play those files unlimited times, and share those files with friends (who are able to play them when and so long as THEY have purchased authorization).
-
Rather than require prospective customers to learn a new media player, they are invited user to visit the service facility website, identify their default music player, and download the
media player42 in the form of a software plug-in for that player. The plug-in enables the customer's player to play encrypted music files, or more generally to access encrypted electronic files of any supported type. The patch preferably provides additional buttons in the user's player, including “Company Home,” “Share Music,” and “Burn CD.” The “Company Home” button opens the Company homepage, wherefrom the customer can search for and download music files as the encrypted data files 33, and purchase authorizations. The “Share Music” button launches an e-mail dialogue box with a space for destination addressee, a space for a message, and a menu of the sender's music files and compilations for easy attachment to the message. More particularly, the attachment only has a set of links to the music files on servers of the
service facility11 and/or source facilities such as
vendor facilities17. Recipients would then download the files directly from such server. Preferably the
service facility11 is copied with these e-mails for maintenance of such links as alternate sources for the encrypted data files 33. Alternatively, actual media file attachments to e-mail communications between customers are possible, such “peer-to-peer” transfers correspondingly reducing communication traffic with the
service facility11 and the
vendor facilities17.
-
The “Burn CD” feature invites the customer to burn an encrypted music file or compilation from his hard drive. Any user of the “burned” CD would still be required to be an authorized customer to access such copied media files.
-
In summary, the present invention includes up to three software components which can be delivered to the customer's computer via download from a central server, via download from other customers on a “peer-to-peer” (P2P) basis, or via a removable drive medium such as a disk or CD-ROM. These three components are: (a) the
media player42, as a stand-alone application or as a patch; (b) a program that simultaneously compresses media files for efficient transfer (such as compression of CD files to MP3 format) and encrypts the result into a proprietary format; and (c) a program that encrypts unencrypted media files into the proprietary format as and when such files are downloaded to the customer's computer. Other software elements, such as those for maintaining the
catalog35, and for establishing and maintaining customer accounts, are not contemplated to be delivered to customers, although some or all of these elements can potentially be distributed to one or more of the
vendor facilities17, and/or being retained at the
service facility11.
-
The above-described ability of the
service facility11 to provide network links to remote source facilities from which customers receive selections as encrypted files advantageously allows vendors such as record companies to house encrypted music files on their own servers, for enhanced quality control, record keeping, and marketing options. The
distribution system10 of the present invention does this while providing a single catalog (or portions thereof) in which to search the offerings of multiple suppliers of electronic files. The link occurs through the Company domain and/or a back channel and preferably retains a frame around the user's screen with buttons for “Company Home,” “Search Music,” “Browse Music,” etc., the browse option providing preview play of possible selections.
-
Although the present invention has been described in considerable detail with reference to certain preferred versions thereof, other versions are possible. For example, kiosks can be provided for dispensing and/or recharging standalone devices that serve in place of at least some of the customer computer 16C. Also, the data files, suitably encrypted, can be provided from the
service facility11 or other suitable source in the form of a CD or other form of removable drive medium, for play on the standalone devices and/or customer computers 16C. Further, usage can be limited or metered based on the number of media files downloaded, or the total size of the files downloaded, as well as elapsed calendar time and elapsed usage time, or any combination of these measures. Therefore, the spirit and scope of the appended claims should not necessarily be limited to the description of the preferred versions contained herein.
-
This description of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form described, and many modifications and variations are possible in light of the teaching above. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications. This description will enable others skilled in the art to best utilize and practice the invention in various embodiments and with various modifications as are suited to a particular use. The scope of the invention is defined by the following claims.
Claims (99)
1. A system for distributing a digital file to a storage device comprising:
means for delivering the digital file to a kiosk, and
wherein at least a portion of the digital file is available for download from the kiosk to the storage device.
2. A system for distributing a digital file to a storage device comprising:
means for providing a kiosk,
wherein the digital file can be delivered to the kiosk, and
at least a portion of the digital file is available for download from the kiosk to the storage device.
3. The system of
claim 1wherein the means for delivering comprises at least one of cable, Internet, telephone, satellite, microwave, cellular, radio, light, laser, CD-ROM, removable drive medium, regular mail, or e-mail.
4. The system of
claim 2wherein the means for delivering comprises at least one of cable, Internet, telephone, satellite, microwave, cellular, radio, light, laser, CD-ROM, removable drive medium, regular mail, or e-mail.
5. The system of
claim 2wherein the means for delivering comprises at least one of cable, Internet, telephone, satellite, microwave, cellular, radio, light, laser, CD-ROM, removable drive medium, regular mail, or e-mail.
6. The system of
claim 1wherein the digital file is capable of generating at least one of sound, spoken words, music, moving images, still images, or human-readable text.
7. The system of
claim 2wherein the digital file is capable of generating at least one of sound, spoken words, music, moving images, still images, or human-readable text.
8. The system of
claim 1wherein the digital file comprises a software program.
9. The system of
claim 2wherein the digital file comprises a software program.
10. The system of
claim 8wherein the software program is a media player.
11. The system of
claim 10wherein the media player is full program.
12. The system of
claim 10wherein the media player is plug-in.
13. The system of
claim 10wherein the media player is patch.
14. The system of
claim 8wherein the software program comprises at least one of system software, programming software, or application software.
15. The system of
claim 1wherein the digital file comprises an authorization.
16. The system of
claim 2wherein the digital file comprises an authorization.
17. The system of
claim 1wherein the digital file is encoded.
18. The system of
claim 2wherein the digital file is encoded.
19. The system of
claim 17wherein the manner of encoding is encryption.
20. The system of
claim 17wherein the manner of encoding is an encoded file.
21. The system of
claim 17wherein the manner of encoding is and encoded file format.
22. The system of
claim 1wherein the availability of the file for download does not require authorization.
23. The system of
claim 2wherein the availability of the file for download does not require authorization.
24. The system of
claim 1wherein the availability of the file for download requires authorization.
25. The system of
claim 2wherein the availability of the file for download requires authorization.
26. The system of
claim 24wherein the authorization comprises payment.
27. The system of
claim 24wherein the authorization comprises a key.
28. The system of
claim 27wherein the key comprise an electronic key.
29. The system of
claim 27wherein the key comprise a digital key.
30. The system of
claim 27wherein the key comprise a software key.
31. The system of
claim 27wherein the key comprise a hardware key.
32. The system of
claim 24wherein the authorization comprises a password.
33. The system of
claim 24wherein the parameters of the authorization are based at least in part on calendar time.
34. The system of
claim 24wherein the parameters of the authorization are based at least in part on play time.
35. The system of
claim 24wherein the parameters of the authorization are based at least in part on the number of plays.
36. The system of
claim 24wherein file access is limited to extent it exceeds the authorization.
37. The system of
claim 36wherein limiting file access comprises preventing play of at least a portion of the file.
38. The system of
claim 36wherein limiting file access comprises interrupting the continuity of play of at least a portion of the file.
39. The system of
claim 36wherein limiting file access comprises interfering with play of at least a portion of the file.
40. The system of
claim 36wherein limiting file access comprises disabling at least a portion of the functionality of the player program.
41. The system of
claim 36wherein limiting file access comprises disabling access to at least a portion of the file.
42. The system of
claim 36wherein the manner limiting file access in the absence of the authorization is the same as the manner limiting file access to the extent access to the file exceeds the parameters of the authorization.
43. The system of
claim 36wherein the manner limiting file access in the absence of the authorization is different, at least in part, from the manner limiting file access to the extent access to the file exceeds the parameters of the authorization.
44. The system of
claim 1wherein the storage device comprises a hard drive.
45. The system of
claim 2wherein the storage device comprises a hard drive.
46. The system of
claim 1wherein the storage device comprises a removable drive medium.
47. The system of
claim 2wherein the storage device comprises a removable drive medium.
48. The system of
claim 46wherein the removable drive medium comprises at least one of a CD-ROM or disk.
49. The system of
claim 1wherein the storage device comprises at least one of a computer or handheld device.
50. The system of
claim 2wherein the storage device comprises at least one of a computer or handheld device.
51. A method for distributing a digital file to a storage device comprising:
delivering the digital file to the kiosk, wherein at least a portion of the digital file is available for download from the kiosk to the storage device.
52. A method for distributing a digital file to a storage device comprising:
providing a kiosk,
wherein the digital file can be delivered to the kiosk, and
at least a portion of the digital file is available for download from the kiosk to the storage device.
53. The method of
claim 51wherein the means for delivering comprises at least one of cable, Internet, telephone, satellite, microwave, cellular, radio, light, laser, CD-ROM, removable drive medium, regular mail, or e-mail.
54. The method of
claim 52wherein the means for delivering comprises at least one of cable, Internet, telephone, satellite, microwave, cellular, radio, light, laser, CD-ROM, removable drive medium, regular mail, or e-mail.
55. The method of
claim 51wherein the digital file is capable of generating at least one of sound, spoken words, music, moving images, still images, or human-readable text.
56. The method of
claim 52wherein the digital file is capable of generating at least one of sound, spoken words, music, moving images, still images, or human-readable text.
57. The method of
claim 51wherein the digital file comprises a software program.
58. The method of
claim 52wherein the digital file comprises a software program.
59. The method of
claim 57wherein the software program is a media player.
60. The method of
claim 59wherein the media player is full program.
61. The method of
claim 59wherein the media player is plug-in.
62. The method of
claim 59wherein the media player is patch.
63. The method of
claim 57wherein the software program comprises at least one of method software, programming software, or application software.
64. The method of
claim 51wherein the digital file comprises an authorization.
65. The method of
claim 52wherein the digital file comprises an authorization.
66. The method of
claim 51wherein the digital file is encoded.
67. The method of
claims 52wherein the digital file is encoded.
68. The method of
claim 66wherein the manner of encoding is encryption.
69. The method of
claim 66wherein the manner of encoding is an encoded file.
70. The method of
claim 66wherein the manner of encoding is and encoded file format.
71. The method of
claim 51wherein the availability of the file for download does not require authorization.
72. The method of
claim 52wherein the availability of the file for download does not require authorization.
73. The method of
claim 51wherein the availability of the file for download requires authorization.
74. The method of
claim 52wherein the availability of the file for download requires authorization.
75. The method of
claim 73wherein the authorization comprises payment.
76. The method of
claim 73wherein the authorization comprises a key.
77. The method of
claim 76wherein the key comprise an electronic key.
78. The method of
claim 76wherein the key comprise a digital key.
79. The method of
claim 76wherein the key comprise a software key.
80. The method of
claim 76wherein the key comprise a hardware key.
81. The method of
claim 73wherein the authorization comprises a password.
82. The method of
claim 73wherein the parameters of the authorization are based at least in part on calendar time.
83. The method of
claim 73wherein the parameters of the authorization are based at least in part on play time.
84. The method of
claim 73wherein the parameters of the authorization are based at least in part on the number of plays.
85. The method of
claim 73wherein file access is limited to extent it exceeds the authorization.
86. The method of
claim 85wherein limiting file access comprises preventing play of at least a portion of the file.
87. The method of
claim 85wherein limiting file access comprises interrupting the continuity of play of at least a portion of the file.
88. The method of
claim 85wherein limiting file access comprises interfering with play of at least a portion of the file.
89. The method of
claim 85wherein limiting file access comprises disabling at least a portion of the functionality of the software program used to play the file.
90. The method of
claim 85wherein limiting file access comprises disabling access to at least a portion of the file.
91. The method of
claim 85wherein the manner limiting file access in the absence of the authorization is the same as the manner limiting file access to the extent access to the file exceeds the parameters of the authorization.
92. The method of
claim 85wherein the manner limiting file access in the absence of the authorization is different, at least in part, from the manner limiting file access to the extent access to the file exceeds the parameters of the authorization.
93. The method of
claim 51wherein the storage device comprises a hard drive.
94. The method of
claim 52wherein the storage device comprises a hard drive.
95. The method of
claim 51wherein the storage device comprises a removable drive medium.
96. The method of
claim 52wherein the storage device comprises a removable drive medium.
97. The method of
claim 95wherein the removable drive medium comprises at least one of a CD-ROM or disk.
98. The method of
claim 51wherein the storage device comprises at least one of a computer or handheld device.
99. The method of
claim 52wherein the storage device comprises at least one of a computer or handheld device.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/011,688 US20110113067A1 (en) | 2000-01-18 | 2011-01-21 | Rechargeable Media Distribution and Play System with Download Kiosk |
US14/481,558 US9330242B2 (en) | 2000-01-18 | 2014-09-09 | Even more subscription media on demand |
US15/002,141 US9553880B2 (en) | 2000-01-18 | 2016-01-20 | Subscription media on demand VII |
US15/376,364 US9900323B2 (en) | 2000-01-18 | 2016-12-12 | Subscription media on demand VIII (offline mode) |
US15/867,668 US10866979B2 (en) | 2000-01-18 | 2018-01-10 | Subscription media on demand IX |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US48463200A | 2000-01-18 | 2000-01-18 | |
US09/910,438 US6912528B2 (en) | 2000-01-18 | 2001-07-19 | Rechargeable media distribution and play system |
US10/908,373 US7877412B2 (en) | 2000-01-18 | 2005-05-09 | Rechargeable media distribution and play system |
US13/011,688 US20110113067A1 (en) | 2000-01-18 | 2011-01-21 | Rechargeable Media Distribution and Play System with Download Kiosk |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/908,373 Continuation US7877412B2 (en) | 2000-01-18 | 2005-05-09 | Rechargeable media distribution and play system |
US10/908,373 Division US7877412B2 (en) | 2000-01-18 | 2005-05-09 | Rechargeable media distribution and play system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/011,702 Division US9031985B2 (en) | 2000-01-18 | 2011-01-21 | More subscription media on demand |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110113067A1 true US20110113067A1 (en) | 2011-05-12 |
Family
ID=25428781
Family Applications (9)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/910,438 Expired - Lifetime US6912528B2 (en) | 2000-01-18 | 2001-07-19 | Rechargeable media distribution and play system |
US10/908,373 Expired - Fee Related US7877412B2 (en) | 2000-01-18 | 2005-05-09 | Rechargeable media distribution and play system |
US13/011,624 Expired - Fee Related US8832149B2 (en) | 2000-01-18 | 2011-01-21 | Method for subscription media on-demand |
US13/011,688 Abandoned US20110113067A1 (en) | 2000-01-18 | 2011-01-21 | Rechargeable Media Distribution and Play System with Download Kiosk |
US13/011,702 Expired - Fee Related US9031985B2 (en) | 2000-01-18 | 2011-01-21 | More subscription media on demand |
US14/481,558 Expired - Fee Related US9330242B2 (en) | 2000-01-18 | 2014-09-09 | Even more subscription media on demand |
US15/002,141 Expired - Lifetime US9553880B2 (en) | 2000-01-18 | 2016-01-20 | Subscription media on demand VII |
US15/376,364 Expired - Fee Related US9900323B2 (en) | 2000-01-18 | 2016-12-12 | Subscription media on demand VIII (offline mode) |
US15/867,668 Expired - Fee Related US10866979B2 (en) | 2000-01-18 | 2018-01-10 | Subscription media on demand IX |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/910,438 Expired - Lifetime US6912528B2 (en) | 2000-01-18 | 2001-07-19 | Rechargeable media distribution and play system |
US10/908,373 Expired - Fee Related US7877412B2 (en) | 2000-01-18 | 2005-05-09 | Rechargeable media distribution and play system |
US13/011,624 Expired - Fee Related US8832149B2 (en) | 2000-01-18 | 2011-01-21 | Method for subscription media on-demand |
Family Applications After (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/011,702 Expired - Fee Related US9031985B2 (en) | 2000-01-18 | 2011-01-21 | More subscription media on demand |
US14/481,558 Expired - Fee Related US9330242B2 (en) | 2000-01-18 | 2014-09-09 | Even more subscription media on demand |
US15/002,141 Expired - Lifetime US9553880B2 (en) | 2000-01-18 | 2016-01-20 | Subscription media on demand VII |
US15/376,364 Expired - Fee Related US9900323B2 (en) | 2000-01-18 | 2016-12-12 | Subscription media on demand VIII (offline mode) |
US15/867,668 Expired - Fee Related US10866979B2 (en) | 2000-01-18 | 2018-01-10 | Subscription media on demand IX |
Country Status (5)
Country | Link |
---|---|
US (9) | US6912528B2 (en) |
EP (1) | EP1421513A4 (en) |
JP (1) | JP2005523487A (en) |
CA (1) | CA2454225A1 (en) |
WO (1) | WO2003009166A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100310069A1 (en) * | 2008-12-09 | 2010-12-09 | Wincor Nixdorf International Gmbh | System and method for secure communication of components inside self-service automats |
US8095392B1 (en) | 2005-01-20 | 2012-01-10 | Owen Daniel L | System, method and computer program product for facilitating informed decisions relating to family risk |
US8160988B1 (en) | 1999-11-08 | 2012-04-17 | Aloft Media, Llc | System, method and computer program product for a collaborative decision platform |
US8463625B1 (en) | 2005-01-20 | 2013-06-11 | Daniel L. Owen | System, method and computer program product for facilitating informed decisions relating to the fair sharing of the costs of insurance between a group and a third party |
US9117096B2 (en) | 2011-12-08 | 2015-08-25 | Wincor Nixdorf International Gmbh | Protection of safety token against malware |
Families Citing this family (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10083674T1 (en) * | 1999-11-05 | 2002-01-31 | Sony Corp | Device and method for data decoding, device and method for processing debit information, device and method for data reproduction, electronic money, electronic right of use and terminal |
US6912528B2 (en) | 2000-01-18 | 2005-06-28 | Gregg S. Homer | Rechargeable media distribution and play system |
JP2002196988A (en) * | 2000-12-27 | 2002-07-12 | Sharp Corp | Storage medium |
US20030055914A1 (en) * | 2001-08-01 | 2003-03-20 | Izuru Tanaka | Communication apparatus and method, recording medium, program, and content providing apparatus |
US7580972B2 (en) * | 2001-12-12 | 2009-08-25 | Valve Corporation | Method and system for controlling bandwidth on client and server |
US8108687B2 (en) * | 2001-12-12 | 2012-01-31 | Valve Corporation | Method and system for granting access to system and content |
AU2002950345A0 (en) * | 2002-07-24 | 2002-09-12 | Scott Murphy | Method and system for supplying digital files to a customer |
US7263610B2 (en) * | 2002-07-30 | 2007-08-28 | Imagictv, Inc. | Secure multicast flow |
JP3841413B2 (en) * | 2003-02-19 | 2006-11-01 | 任天堂株式会社 | GAME SYSTEM, GAME DEVICE, AND GAME PROGRAM |
US20040215534A1 (en) * | 2003-04-25 | 2004-10-28 | Apple Computer, Inc. | Method and system for network-based allowance control |
EP2357623A1 (en) | 2003-04-25 | 2011-08-17 | Apple Inc. | Graphical user interface for browsing, searching and presenting media items |
KR20070046171A (en) * | 2003-04-25 | 2007-05-02 | 애플 컴퓨터, 인코포레이티드 | Method and system for distributing content through secure network |
US7496623B2 (en) * | 2004-04-23 | 2009-02-24 | Yahoo! Inc. | System and method for enhanced messaging including a displayable status indicator |
TW200604849A (en) * | 2004-07-30 | 2006-02-01 | Hon Hai Prec Ind Co Ltd | Apparatus and method for automatically building RCD |
US7539647B2 (en) * | 2005-08-25 | 2009-05-26 | Microsoft Corporation | Using power state to enforce software metering state |
US20070067241A1 (en) * | 2005-09-19 | 2007-03-22 | Bellsouth Intellectual Property Corporation | Trial access terms for media files |
US9311454B2 (en) | 2005-09-19 | 2016-04-12 | At&T Intellectual Property I, L.P. | Trial use of a collection of media files |
US7702590B2 (en) * | 2005-09-19 | 2010-04-20 | At&T Intellectual Property I, Lp | Trial access for media files from a media list |
US8879856B2 (en) | 2005-09-27 | 2014-11-04 | Qualcomm Incorporated | Content driven transcoder that orchestrates multimedia transcoding using content information |
CN101322344B (en) | 2005-10-21 | 2013-01-02 | 尼尔逊媒介研究股份有限公司 | Methods and apparatus for metering portable media players |
US7512792B2 (en) * | 2005-12-15 | 2009-03-31 | International Business Machines Corporation | Reference monitor method for enforcing information flow policies |
US20070143601A1 (en) * | 2005-12-15 | 2007-06-21 | Arroyo Diana J | System and method for authorizing information flows |
US7647630B2 (en) | 2005-12-15 | 2010-01-12 | International Business Machines Corporation | Associating security information with information objects in a data processing system |
US20070143419A1 (en) * | 2005-12-19 | 2007-06-21 | Lucent Technologies Inc. | E-mail attachment as one-time clickable link |
US20070191975A1 (en) * | 2006-01-20 | 2007-08-16 | Sanmina-Sci, A Delaware Corporation | Secure content delivery device |
CA2841017C (en) | 2006-03-27 | 2016-12-20 | The Nielsen Company (Us), Llc | Methods and systems to meter media content presented on a wireless communication device |
US9131164B2 (en) | 2006-04-04 | 2015-09-08 | Qualcomm Incorporated | Preprocessor method and apparatus |
US8903843B2 (en) | 2006-06-21 | 2014-12-02 | Napo Enterprises, Llc | Historical media recommendation service |
US8327266B2 (en) | 2006-07-11 | 2012-12-04 | Napo Enterprises, Llc | Graphical user interface system for allowing management of a media item playlist based on a preference scoring system |
US9003056B2 (en) | 2006-07-11 | 2015-04-07 | Napo Enterprises, Llc | Maintaining a minimum level of real time media recommendations in the absence of online friends |
US8059646B2 (en) | 2006-07-11 | 2011-11-15 | Napo Enterprises, Llc | System and method for identifying music content in a P2P real time recommendation network |
US7970922B2 (en) | 2006-07-11 | 2011-06-28 | Napo Enterprises, Llc | P2P real time media recommendations |
US8620699B2 (en) | 2006-08-08 | 2013-12-31 | Napo Enterprises, Llc | Heavy influencer media recommendations |
US8090606B2 (en) | 2006-08-08 | 2012-01-03 | Napo Enterprises, Llc | Embedded media recommendations |
JP5185271B2 (en) * | 2006-08-21 | 2013-04-17 | イルデト・コーポレート・ビー・ヴイ | Digital content distribution control |
US9224427B2 (en) | 2007-04-02 | 2015-12-29 | Napo Enterprises LLC | Rating media item recommendations using recommendation paths and/or media item usage |
US8112720B2 (en) | 2007-04-05 | 2012-02-07 | Napo Enterprises, Llc | System and method for automatically and graphically associating programmatically-generated media item recommendations related to a user's socially recommended media items |
US20080263648A1 (en) * | 2007-04-17 | 2008-10-23 | Infosys Technologies Ltd. | Secure conferencing over ip-based networks |
US8285776B2 (en) | 2007-06-01 | 2012-10-09 | Napo Enterprises, Llc | System and method for processing a received media item recommendation message comprising recommender presence information |
US20090049045A1 (en) | 2007-06-01 | 2009-02-19 | Concert Technology Corporation | Method and system for sorting media items in a playlist on a media device |
US8839141B2 (en) | 2007-06-01 | 2014-09-16 | Napo Enterprises, Llc | Method and system for visually indicating a replay status of media items on a media device |
US9037632B2 (en) | 2007-06-01 | 2015-05-19 | Napo Enterprises, Llc | System and method of generating a media item recommendation message with recommender presence information |
US9164993B2 (en) | 2007-06-01 | 2015-10-20 | Napo Enterprises, Llc | System and method for propagating a media item recommendation message comprising recommender presence information |
US20080301187A1 (en) * | 2007-06-01 | 2008-12-04 | Concert Technology Corporation | Enhanced media item playlist comprising presence information |
US7865522B2 (en) | 2007-11-07 | 2011-01-04 | Napo Enterprises, Llc | System and method for hyping media recommendations in a media recommendation system |
US9060034B2 (en) | 2007-11-09 | 2015-06-16 | Napo Enterprises, Llc | System and method of filtering recommenders in a media item recommendation system |
US9224150B2 (en) | 2007-12-18 | 2015-12-29 | Napo Enterprises, Llc | Identifying highly valued recommendations of users in a media recommendation network |
US8396951B2 (en) | 2007-12-20 | 2013-03-12 | Napo Enterprises, Llc | Method and system for populating a content repository for an internet radio service based on a recommendation network |
US9734507B2 (en) | 2007-12-20 | 2017-08-15 | Napo Enterprise, Llc | Method and system for simulating recommendations in a social network for an offline user |
US8316015B2 (en) | 2007-12-21 | 2012-11-20 | Lemi Technology, Llc | Tunersphere |
US8060525B2 (en) | 2007-12-21 | 2011-11-15 | Napo Enterprises, Llc | Method and system for generating media recommendations in a distributed environment based on tagging play history information with location information |
US8117193B2 (en) | 2007-12-21 | 2012-02-14 | Lemi Technology, Llc | Tunersphere |
US8725740B2 (en) | 2008-03-24 | 2014-05-13 | Napo Enterprises, Llc | Active playlist having dynamic media item groups |
US8484311B2 (en) | 2008-04-17 | 2013-07-09 | Eloy Technology, Llc | Pruning an aggregate media collection |
US8497601B2 (en) * | 2008-09-27 | 2013-07-30 | Witricity Corporation | Wireless energy transfer converters |
US8484227B2 (en) | 2008-10-15 | 2013-07-09 | Eloy Technology, Llc | Caching and synching process for a media sharing system |
US8880599B2 (en) | 2008-10-15 | 2014-11-04 | Eloy Technology, Llc | Collection digest for a media sharing system |
US8200602B2 (en) | 2009-02-02 | 2012-06-12 | Napo Enterprises, Llc | System and method for creating thematic listening experiences in a networked peer media recommendation environment |
AU2011247050B2 (en) * | 2010-04-30 | 2015-11-26 | Now Technologies (Ip) Limited | Content management apparatus |
US8930277B2 (en) | 2010-04-30 | 2015-01-06 | Now Technologies (Ip) Limited | Content management apparatus |
US8584198B2 (en) * | 2010-11-12 | 2013-11-12 | Google Inc. | Syndication including melody recognition and opt out |
US8584197B2 (en) | 2010-11-12 | 2013-11-12 | Google Inc. | Media rights management using melody identification |
US9576046B2 (en) * | 2011-11-16 | 2017-02-21 | Ptc Inc. | Methods for integrating semantic search, query, and analysis across heterogeneous data types and devices thereof |
US10744034B2 (en) | 2012-04-25 | 2020-08-18 | Gregg S. Homer | Method for laser treatment for glaucoma |
US9075960B2 (en) | 2013-03-15 | 2015-07-07 | Now Technologies (Ip) Limited | Digital media content management apparatus and method |
US9325381B2 (en) | 2013-03-15 | 2016-04-26 | The Nielsen Company (Us), Llc | Methods, apparatus and articles of manufacture to monitor mobile devices |
WO2016003402A1 (en) * | 2014-06-30 | 2016-01-07 | Schneider Electric It Cororation | Data center modeling for facility operations |
KR20160101826A (en) * | 2015-02-17 | 2016-08-26 | 삼성전자주식회사 | Multi-Users Based Device |
US10706233B2 (en) * | 2015-03-06 | 2020-07-07 | M-Files Oy | System and method for extracting and utilizing information from digital communications |
US9483805B1 (en) * | 2015-04-23 | 2016-11-01 | Study Social, Inc. | Limited tokens in online education |
US20180182052A1 (en) * | 2016-12-20 | 2018-06-28 | Microshare, Inc. | Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment |
US10951599B2 (en) | 2017-06-02 | 2021-03-16 | Arris Enterprises Llc | Secure shell (SSH) server public key validation by a SSH client in a high volume device deployment |
US10951467B2 (en) * | 2017-06-02 | 2021-03-16 | Arris Enterprises Llc | Secure enabling and disabling points of entry on a device remotely or locally |
US9912676B1 (en) | 2017-06-30 | 2018-03-06 | Study Social, Inc. | Account sharing prevention and detection in online education |
WO2019069959A1 (en) * | 2017-10-03 | 2019-04-11 | 日本電気株式会社 | Server device, method for analyzing odor sensor data, and computer-readable storage medium |
US11128482B2 (en) * | 2019-04-19 | 2021-09-21 | Microsoft Technology Licensing, Llc | Metering cloud workloads at edge computing devices |
GB2586785A (en) * | 2019-08-30 | 2021-03-10 | Mobilise Consulting Ltd | Authentication |
Citations (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3718906A (en) * | 1971-06-01 | 1973-02-27 | R Lightner | Vending system for remotely accessible stored information |
US4323921A (en) * | 1979-02-06 | 1982-04-06 | Etablissement Public De Diffusion Dit "Telediffusion De France" | System for transmitting information provided with means for controlling access to the information transmitted |
US4528643A (en) * | 1983-01-10 | 1985-07-09 | Fpdc, Inc. | System for reproducing information in material objects at a point of sale location |
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4683553A (en) * | 1982-03-18 | 1987-07-28 | Cii Honeywell Bull (Societe Anonyme) | Method and device for protecting software delivered to a user by a supplier |
US4695975A (en) * | 1984-10-23 | 1987-09-22 | Profit Technology, Inc. | Multi-image communications system |
US4827508A (en) * | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4868736A (en) * | 1986-08-16 | 1989-09-19 | Runtime Innovations Limited | Code operated access control system for electronic data store |
US4898736A (en) * | 1988-03-09 | 1990-02-06 | Merck & Co., Inc. | Method for tablet preparation |
US4916738A (en) * | 1986-11-05 | 1990-04-10 | International Business Machines Corp. | Remote access terminal security |
US4953209A (en) * | 1988-10-31 | 1990-08-28 | International Business Machines Corp. | Self-verifying receipt and acceptance system for electronically delivered data objects |
US4977594A (en) * | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US5050213A (en) * | 1986-10-14 | 1991-09-17 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5103476A (en) * | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
US5103392A (en) * | 1983-10-05 | 1992-04-07 | Fujitsu Limited | System for storing history of use of programs including user credit data and having access by the proprietor |
US5109413A (en) * | 1986-11-05 | 1992-04-28 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
US5117457A (en) * | 1986-11-05 | 1992-05-26 | International Business Machines Corp. | Tamper resistant packaging for information protection in electronic circuitry |
US5222134A (en) * | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5414455A (en) * | 1993-07-07 | 1995-05-09 | Digital Equipment Corporation | Segmented video on demand system |
US5455953A (en) * | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5510844A (en) * | 1994-11-18 | 1996-04-23 | At&T Corp. | Video bitstream regeneration using previously agreed to high priority segments |
US5564038A (en) * | 1994-05-20 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period |
US5600573A (en) * | 1992-12-09 | 1997-02-04 | Discovery Communications, Inc. | Operations center with video storage for a television program packaging and delivery system |
US5613089A (en) * | 1989-04-28 | 1997-03-18 | Softel, Inc. | Method and apparatus for remotely controlling and monitoring the use of computer software |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5659530A (en) * | 1993-09-20 | 1997-08-19 | Sony Corporation | Recording and/or reproducing apparatus for a cartridge accomodating a recording medium and an eject mechanism thereof |
US5666479A (en) * | 1990-05-30 | 1997-09-09 | Fujitsu Limited | Issue processing system and method for a right to use a data processsing system resource |
US5673316A (en) * | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5710887A (en) * | 1995-08-29 | 1998-01-20 | Broadvision | Computer system and method for electronic commerce |
US5715169A (en) * | 1994-03-07 | 1998-02-03 | Csk Research Institute Corp. | Software rental method and apparatus, and circulating medium therefor |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5734720A (en) * | 1994-11-29 | 1998-03-31 | Salganicoff; Marcos | System and method for providing digital communications between a head end and a set top terminal |
US5754649A (en) * | 1995-05-12 | 1998-05-19 | Macrovision Corp. | Video media security and tracking system |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5773741A (en) * | 1996-09-19 | 1998-06-30 | Sunhawk Corporation, Inc. | Method and apparatus for nonsequential storage of and access to digital musical score and performance information |
US5784609A (en) * | 1994-07-08 | 1998-07-21 | Sony Corporation | System for remotely authenticating access to local software |
US5790664A (en) * | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
US5790423A (en) * | 1995-06-14 | 1998-08-04 | Audible, Inc. | Interactive audio transmission receiving and playback system |
US5802283A (en) * | 1991-09-27 | 1998-09-01 | Bell Atlantic Network Services, Inc. | Method and system for accessing multimedia data over public switched telephone network |
US5809144A (en) * | 1995-08-24 | 1998-09-15 | Carnegie Mellon University | Method and apparatus for purchasing and delivering digital goods over a network |
WO1998040826A2 (en) * | 1997-03-13 | 1998-09-17 | International Business Machines Corporation | Kiosk and server connected to computer network |
US5845281A (en) * | 1995-02-01 | 1998-12-01 | Mediadna, Inc. | Method and system for managing a data object so as to comply with predetermined conditions for usage |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5898778A (en) * | 1995-07-05 | 1999-04-27 | Antonini; Pierre | Method and device for temporarily authorizing the use of a programme protected by an electronic cartridge |
US5910987A (en) * | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5920861A (en) * | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US5926624A (en) * | 1996-09-12 | 1999-07-20 | Audible, Inc. | Digital information library and delivery system with logic for generating files targeted to the playback device |
US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5949411A (en) * | 1996-02-16 | 1999-09-07 | Cyber Marketing, Inc. | Remote interactive multimedia preview and data collection kiosk system |
US5953005A (en) * | 1996-06-28 | 1999-09-14 | Sun Microsystems, Inc. | System and method for on-line multimedia access |
US6006332A (en) * | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
US6049671A (en) * | 1996-04-18 | 2000-04-11 | Microsoft Corporation | Method for identifying and obtaining computer software from a network computer |
US6073124A (en) * | 1997-01-29 | 2000-06-06 | Shopnow.Com Inc. | Method and system for securely incorporating electronic information into an online purchasing application |
US6112181A (en) * | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6195694B1 (en) * | 1997-03-13 | 2001-02-27 | International Business Machines Corporation | Server for reconfiguring control of a subset of devices on one or more kiosks |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6289333B1 (en) * | 1998-01-16 | 2001-09-11 | Aspect Communications Corp. | Methods and apparatus enabling dynamic resource collaboration when collaboration session host is distinct from resource host |
US6298356B1 (en) * | 1998-01-16 | 2001-10-02 | Aspect Communications Corp. | Methods and apparatus for enabling dynamic resource collaboration |
US6449599B1 (en) * | 1994-10-24 | 2002-09-10 | Open Market, Inc. | Network sales system |
US6490720B1 (en) * | 2001-05-11 | 2002-12-03 | Sospita As | Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications |
US20030105718A1 (en) * | 1998-08-13 | 2003-06-05 | Marco M. Hurtado | Secure electronic content distribution on cds and dvds |
US20030135464A1 (en) * | 1999-12-09 | 2003-07-17 | International Business Machines Corporation | Digital content distribution using web broadcasting services |
US6625581B1 (en) * | 1994-04-22 | 2003-09-23 | Ipf, Inc. | Method of and system for enabling the access of consumer product related information and the purchase of consumer products at points of consumer presence on the world wide web (www) at which consumer product information request (cpir) enabling servlet tags are embedded within html-encoded documents |
US20040064351A1 (en) * | 1999-11-22 | 2004-04-01 | Mikurak Michael G. | Increased visibility during order management in a network-based supply chain environment |
US6721713B1 (en) * | 1999-05-27 | 2004-04-13 | Andersen Consulting Llp | Business alliance identification in a web architecture framework |
US20040073515A1 (en) * | 1994-11-23 | 2004-04-15 | Stefik Mark J. | Method for metering and pricing of digital works |
US6772340B1 (en) * | 2000-01-14 | 2004-08-03 | Microsoft Corporation | Digital rights management system operating on computing device and having black box tied to computing device |
US20040204941A1 (en) * | 2003-03-28 | 2004-10-14 | Wetype4U | Digital transcription system and method |
US6912528B2 (en) * | 2000-01-18 | 2005-06-28 | Gregg S. Homer | Rechargeable media distribution and play system |
US7302465B2 (en) * | 2001-10-22 | 2007-11-27 | Comverse, Inc. | Distributed multimedia transfer |
US8626581B2 (en) * | 1995-06-16 | 2014-01-07 | Catalina Marketing Corporation | Virtual couponing method and apparatus for use with consumer kiosk |
Family Cites Families (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4754649A (en) * | 1985-08-12 | 1988-07-05 | Lew Hyok S | Tandem wing universal vortex shedding flow meter |
JPH0281516A (en) | 1988-09-19 | 1990-03-22 | Fuji Photo Film Co Ltd | Initializing system for coefficient multiplier |
US5659350A (en) | 1992-12-09 | 1997-08-19 | Discovery Communications, Inc. | Operations center for a television program packaging and delivery system |
US5480799A (en) * | 1993-12-10 | 1996-01-02 | The University Of North Carolina At Chapel Hill | Sperm antigen corresponding to a sperm zona binding protein autoantigenic epitope |
JPH08137768A (en) | 1994-11-11 | 1996-05-31 | Hitachi Ltd | Remote distribution management network system |
US6311214B1 (en) * | 1995-07-27 | 2001-10-30 | Digimarc Corporation | Linking of computers based on optical sensing of digital data |
US5790432A (en) * | 1995-08-21 | 1998-08-04 | Solar Light Company, Inc. | Universal measuring instrument with signal processing algorithm encapsulated into interchangeable intelligent detectors |
JP3552807B2 (en) | 1995-09-14 | 2004-08-11 | 株式会社東芝 | Information equipment and information provision method |
JPH09114783A (en) * | 1995-10-13 | 1997-05-02 | Sony Corp | Device and method for processing information |
EP0880840A4 (en) | 1996-01-11 | 2002-10-23 | Mrj Inc | System for controlling access and distribution of digital property |
ATE359562T1 (en) | 1996-05-15 | 2007-05-15 | Intertrust Tech Corp | METHOD AND APPARATUS FOR ACCESSING DVD CONTENT |
US6125352A (en) | 1996-06-28 | 2000-09-26 | Microsoft Corporation | System and method for conducting commerce over a distributed network |
US6374270B1 (en) * | 1996-08-29 | 2002-04-16 | Japan Infonet, Inc. | Corporate disclosure and repository system utilizing inference synthesis as applied to a database |
JP3527596B2 (en) | 1996-10-11 | 2004-05-17 | 三菱電機株式会社 | Distributed database management system |
JPH10118293A (en) | 1996-10-18 | 1998-05-12 | Ace Denken:Kk | Game house managing device |
JPH10133668A (en) | 1996-10-31 | 1998-05-22 | Sekisui Chem Co Ltd | Noise and vibration simulation device |
CA2271012A1 (en) | 1996-11-25 | 1998-06-04 | Hyperlock Technologies, Inc. | Method for securely triggering the playing of crippled local media through the web |
US6038545A (en) * | 1997-03-17 | 2000-03-14 | Frankel & Company | Systems, methods and computer program products for generating digital multimedia store displays and menu boards |
US6049871A (en) * | 1997-05-30 | 2000-04-11 | Compaq Corporation Corporation | Method and apparatus for display control bootup |
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6421675B1 (en) * | 1998-03-16 | 2002-07-16 | S. L. I. Systems, Inc. | Search engine |
US6477707B1 (en) | 1998-03-24 | 2002-11-05 | Fantastic Corporation | Method and system for broadcast transmission of media objects |
JPH11296583A (en) * | 1998-04-09 | 1999-10-29 | Nippon Telegr & Teleph Corp <Ntt> | Contents charging method, its system, alternative server and medium for storing contents charging program |
US6311269B2 (en) * | 1998-06-15 | 2001-10-30 | Lockheed Martin Corporation | Trusted services broker for web page fine-grained security labeling |
US6330566B1 (en) * | 1998-06-22 | 2001-12-11 | Microsoft Corporation | Apparatus and method for optimizing client-state data storage |
US6487663B1 (en) * | 1998-10-19 | 2002-11-26 | Realnetworks, Inc. | System and method for regulating the transmission of media data |
US6763370B1 (en) * | 1998-11-16 | 2004-07-13 | Softricity, Inc. | Method and apparatus for content protection in a secure content delivery system |
US6973444B1 (en) * | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
CA2368858A1 (en) * | 1999-04-12 | 2000-10-19 | Digital Media On Demand, Inc. | Secure electronic commerce system |
US6058372A (en) * | 1999-06-11 | 2000-05-02 | Sweet; Stephen R. | Interactive self-service hard drive copying system |
KR20020003541A (en) * | 1999-10-29 | 2002-01-12 | 이데이 노부유끼 | Digital data transmitting method and apparatus, digital data reproducing method and apparatus, digital data copying method and apparatus, data recorded medium, and digital data storing/reproducing method |
US6601169B2 (en) * | 1999-12-30 | 2003-07-29 | Clyde Riley Wallace, Jr. | Key-based secure network user states |
US6601170B1 (en) * | 1999-12-30 | 2003-07-29 | Clyde Riley Wallace, Jr. | Secure internet user state creation method and system with user supplied key and seeding |
US6732100B1 (en) * | 2000-03-31 | 2004-05-04 | Siebel Systems, Inc. | Database access method and system for user role defined access |
US7200575B2 (en) * | 2001-02-27 | 2007-04-03 | Hewlett-Packard Development Company, L.P. | Managing access to digital content |
US7783665B1 (en) * | 2002-03-27 | 2010-08-24 | Parallels Holdings, Ltd. | Effective file-sharing among virtual environments |
JP2005530250A (en) * | 2002-06-12 | 2005-10-06 | ジェナ ジョーダル, | Data storage, retrieval, operation, and display tools that realize a multi-level perspective |
US7171618B2 (en) * | 2003-07-30 | 2007-01-30 | Xerox Corporation | Multi-versioned documents and method for creation and use thereof |
US8347202B1 (en) * | 2007-03-14 | 2013-01-01 | Google Inc. | Determining geographic locations for place names in a fact repository |
US8429096B1 (en) * | 2008-03-31 | 2013-04-23 | Amazon Technologies, Inc. | Resource isolation through reinforcement learning |
US9456054B2 (en) * | 2008-05-16 | 2016-09-27 | Palo Alto Research Center Incorporated | Controlling the spread of interests and content in a content centric network |
US7917463B2 (en) * | 2008-10-10 | 2011-03-29 | Business.Com, Inc. | System and method for data warehousing and analytics on a distributed file system |
US8620899B2 (en) * | 2010-02-09 | 2013-12-31 | International Business Machines Corporation | Generating materialized query table candidates |
US20120159234A1 (en) * | 2010-12-15 | 2012-06-21 | Microsoft Corporation | Providing resilient services |
US10552774B2 (en) * | 2013-02-11 | 2020-02-04 | Amazon Technologies, Inc. | Cost-minimizing task scheduler |
US9672259B2 (en) * | 2013-05-29 | 2017-06-06 | Ebay Inc. | Methods and systems to refine search information |
CN104699725B (en) * | 2013-12-10 | 2018-10-09 | 阿里巴巴集团控股有限公司 | data search processing method and system |
WO2016000018A1 (en) * | 2014-06-30 | 2016-01-07 | Jagonal Pty Ltd | Searching system and method |
-
2001
- 2001-07-19 US US09/910,438 patent/US6912528B2/en not_active Expired - Lifetime
-
2002
- 2002-07-19 JP JP2003514440A patent/JP2005523487A/en active Pending
- 2002-07-19 WO PCT/US2002/022963 patent/WO2003009166A1/en not_active Application Discontinuation
- 2002-07-19 EP EP02747057A patent/EP1421513A4/en not_active Ceased
- 2002-07-19 CA CA002454225A patent/CA2454225A1/en not_active Abandoned
-
2005
- 2005-05-09 US US10/908,373 patent/US7877412B2/en not_active Expired - Fee Related
-
2011
- 2011-01-21 US US13/011,624 patent/US8832149B2/en not_active Expired - Fee Related
- 2011-01-21 US US13/011,688 patent/US20110113067A1/en not_active Abandoned
- 2011-01-21 US US13/011,702 patent/US9031985B2/en not_active Expired - Fee Related
-
2014
- 2014-09-09 US US14/481,558 patent/US9330242B2/en not_active Expired - Fee Related
-
2016
- 2016-01-20 US US15/002,141 patent/US9553880B2/en not_active Expired - Lifetime
- 2016-12-12 US US15/376,364 patent/US9900323B2/en not_active Expired - Fee Related
-
2018
- 2018-01-10 US US15/867,668 patent/US10866979B2/en not_active Expired - Fee Related
Patent Citations (90)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3718906A (en) * | 1971-06-01 | 1973-02-27 | R Lightner | Vending system for remotely accessible stored information |
US4323921A (en) * | 1979-02-06 | 1982-04-06 | Etablissement Public De Diffusion Dit "Telediffusion De France" | System for transmitting information provided with means for controlling access to the information transmitted |
US4683553A (en) * | 1982-03-18 | 1987-07-28 | Cii Honeywell Bull (Societe Anonyme) | Method and device for protecting software delivered to a user by a supplier |
US4528643A (en) * | 1983-01-10 | 1985-07-09 | Fpdc, Inc. | System for reproducing information in material objects at a point of sale location |
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US5103392A (en) * | 1983-10-05 | 1992-04-07 | Fujitsu Limited | System for storing history of use of programs including user credit data and having access by the proprietor |
US4695975A (en) * | 1984-10-23 | 1987-09-22 | Profit Technology, Inc. | Multi-image communications system |
US4868736A (en) * | 1986-08-16 | 1989-09-19 | Runtime Innovations Limited | Code operated access control system for electronic data store |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US4827508A (en) * | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US5050213A (en) * | 1986-10-14 | 1991-09-17 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4977594A (en) * | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5109413A (en) * | 1986-11-05 | 1992-04-28 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
US5117457A (en) * | 1986-11-05 | 1992-05-26 | International Business Machines Corp. | Tamper resistant packaging for information protection in electronic circuitry |
US4916738A (en) * | 1986-11-05 | 1990-04-10 | International Business Machines Corp. | Remote access terminal security |
US4898736A (en) * | 1988-03-09 | 1990-02-06 | Merck & Co., Inc. | Method for tablet preparation |
US4953209A (en) * | 1988-10-31 | 1990-08-28 | International Business Machines Corp. | Self-verifying receipt and acceptance system for electronically delivered data objects |
US5613089A (en) * | 1989-04-28 | 1997-03-18 | Softel, Inc. | Method and apparatus for remotely controlling and monitoring the use of computer software |
US5666479A (en) * | 1990-05-30 | 1997-09-09 | Fujitsu Limited | Issue processing system and method for a right to use a data processsing system resource |
US5103476A (en) * | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
US5222134A (en) * | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
US5802283A (en) * | 1991-09-27 | 1998-09-01 | Bell Atlantic Network Services, Inc. | Method and system for accessing multimedia data over public switched telephone network |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5600573A (en) * | 1992-12-09 | 1997-02-04 | Discovery Communications, Inc. | Operations center with video storage for a television program packaging and delivery system |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5414455A (en) * | 1993-07-07 | 1995-05-09 | Digital Equipment Corporation | Segmented video on demand system |
US5659530A (en) * | 1993-09-20 | 1997-08-19 | Sony Corporation | Recording and/or reproducing apparatus for a cartridge accomodating a recording medium and an eject mechanism thereof |
US5455953A (en) * | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5715169A (en) * | 1994-03-07 | 1998-02-03 | Csk Research Institute Corp. | Software rental method and apparatus, and circulating medium therefor |
US6625581B1 (en) * | 1994-04-22 | 2003-09-23 | Ipf, Inc. | Method of and system for enabling the access of consumer product related information and the purchase of consumer products at points of consumer presence on the world wide web (www) at which consumer product information request (cpir) enabling servlet tags are embedded within html-encoded documents |
US5564038A (en) * | 1994-05-20 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period |
US5784609A (en) * | 1994-07-08 | 1998-07-21 | Sony Corporation | System for remotely authenticating access to local software |
US6449599B1 (en) * | 1994-10-24 | 2002-09-10 | Open Market, Inc. | Network sales system |
US5510844A (en) * | 1994-11-18 | 1996-04-23 | At&T Corp. | Video bitstream regeneration using previously agreed to high priority segments |
US20040073515A1 (en) * | 1994-11-23 | 2004-04-15 | Stefik Mark J. | Method for metering and pricing of digital works |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5734720A (en) * | 1994-11-29 | 1998-03-31 | Salganicoff; Marcos | System and method for providing digital communications between a head end and a set top terminal |
US6020883A (en) * | 1994-11-29 | 2000-02-01 | Fred Herz | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US6088722A (en) * | 1994-11-29 | 2000-07-11 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5845281A (en) * | 1995-02-01 | 1998-12-01 | Mediadna, Inc. | Method and system for managing a data object so as to comply with predetermined conditions for usage |
US5949876A (en) * | 1995-02-13 | 1999-09-07 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US6185683B1 (en) * | 1995-02-13 | 2001-02-06 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US6253193B1 (en) * | 1995-02-13 | 2001-06-26 | Intertrust Technologies Corporation | Systems and methods for the secure transaction management and electronic rights protection |
US5982891A (en) * | 1995-02-13 | 1999-11-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6237786B1 (en) * | 1995-02-13 | 2001-05-29 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5910987A (en) * | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5915019A (en) * | 1995-02-13 | 1999-06-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5917912A (en) * | 1995-02-13 | 1999-06-29 | Intertrust Technologies Corporation | System and methods for secure transaction management and electronic rights protection |
US5754649A (en) * | 1995-05-12 | 1998-05-19 | Macrovision Corp. | Video media security and tracking system |
US5790423A (en) * | 1995-06-14 | 1998-08-04 | Audible, Inc. | Interactive audio transmission receiving and playback system |
US8626581B2 (en) * | 1995-06-16 | 2014-01-07 | Catalina Marketing Corporation | Virtual couponing method and apparatus for use with consumer kiosk |
US5898778A (en) * | 1995-07-05 | 1999-04-27 | Antonini; Pierre | Method and device for temporarily authorizing the use of a programme protected by an electronic cartridge |
US5809144A (en) * | 1995-08-24 | 1998-09-15 | Carnegie Mellon University | Method and apparatus for purchasing and delivering digital goods over a network |
US5710887A (en) * | 1995-08-29 | 1998-01-20 | Broadvision | Computer system and method for electronic commerce |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5949411A (en) * | 1996-02-16 | 1999-09-07 | Cyber Marketing, Inc. | Remote interactive multimedia preview and data collection kiosk system |
US5790664A (en) * | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
US5673316A (en) * | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
US6049671A (en) * | 1996-04-18 | 2000-04-11 | Microsoft Corporation | Method for identifying and obtaining computer software from a network computer |
US5953005A (en) * | 1996-06-28 | 1999-09-14 | Sun Microsystems, Inc. | System and method for on-line multimedia access |
US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6240185B1 (en) * | 1996-08-12 | 2001-05-29 | Intertrust Technologies Corporation | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5926624A (en) * | 1996-09-12 | 1999-07-20 | Audible, Inc. | Digital information library and delivery system with logic for generating files targeted to the playback device |
US5773741A (en) * | 1996-09-19 | 1998-06-30 | Sunhawk Corporation, Inc. | Method and apparatus for nonsequential storage of and access to digital musical score and performance information |
US6006332A (en) * | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
US6073124A (en) * | 1997-01-29 | 2000-06-06 | Shopnow.Com Inc. | Method and system for securely incorporating electronic information into an online purchasing application |
US5920861A (en) * | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
WO1998040826A2 (en) * | 1997-03-13 | 1998-09-17 | International Business Machines Corporation | Kiosk and server connected to computer network |
US6195694B1 (en) * | 1997-03-13 | 2001-02-27 | International Business Machines Corporation | Server for reconfiguring control of a subset of devices on one or more kiosks |
US6112181A (en) * | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6289333B1 (en) * | 1998-01-16 | 2001-09-11 | Aspect Communications Corp. | Methods and apparatus enabling dynamic resource collaboration when collaboration session host is distinct from resource host |
US6298356B1 (en) * | 1998-01-16 | 2001-10-02 | Aspect Communications Corp. | Methods and apparatus for enabling dynamic resource collaboration |
US20030105718A1 (en) * | 1998-08-13 | 2003-06-05 | Marco M. Hurtado | Secure electronic content distribution on cds and dvds |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6721713B1 (en) * | 1999-05-27 | 2004-04-13 | Andersen Consulting Llp | Business alliance identification in a web architecture framework |
US20040064351A1 (en) * | 1999-11-22 | 2004-04-01 | Mikurak Michael G. | Increased visibility during order management in a network-based supply chain environment |
US20030135464A1 (en) * | 1999-12-09 | 2003-07-17 | International Business Machines Corporation | Digital content distribution using web broadcasting services |
US6772340B1 (en) * | 2000-01-14 | 2004-08-03 | Microsoft Corporation | Digital rights management system operating on computing device and having black box tied to computing device |
US6912528B2 (en) * | 2000-01-18 | 2005-06-28 | Gregg S. Homer | Rechargeable media distribution and play system |
US6490720B1 (en) * | 2001-05-11 | 2002-12-03 | Sospita As | Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications |
US7302465B2 (en) * | 2001-10-22 | 2007-11-27 | Comverse, Inc. | Distributed multimedia transfer |
US20040204941A1 (en) * | 2003-03-28 | 2004-10-14 | Wetype4U | Digital transcription system and method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8160988B1 (en) | 1999-11-08 | 2012-04-17 | Aloft Media, Llc | System, method and computer program product for a collaborative decision platform |
US8095392B1 (en) | 2005-01-20 | 2012-01-10 | Owen Daniel L | System, method and computer program product for facilitating informed decisions relating to family risk |
US8165903B1 (en) | 2005-01-20 | 2012-04-24 | Owen Daniel L | System, method and computer program product for facilitating informed decisions relating to family risk |
US8463625B1 (en) | 2005-01-20 | 2013-06-11 | Daniel L. Owen | System, method and computer program product for facilitating informed decisions relating to the fair sharing of the costs of insurance between a group and a third party |
US20100310069A1 (en) * | 2008-12-09 | 2010-12-09 | Wincor Nixdorf International Gmbh | System and method for secure communication of components inside self-service automats |
US8787569B2 (en) * | 2008-12-09 | 2014-07-22 | Wincor Nixdorf International Gmbh | System and method for secure communication of components inside self-service automats |
US9117096B2 (en) | 2011-12-08 | 2015-08-25 | Wincor Nixdorf International Gmbh | Protection of safety token against malware |
Also Published As
Publication number | Publication date |
---|---|
US20050187936A1 (en) | 2005-08-25 |
US9031985B2 (en) | 2015-05-12 |
US7877412B2 (en) | 2011-01-25 |
US20140380509A1 (en) | 2014-12-25 |
JP2005523487A (en) | 2005-08-04 |
US9900323B2 (en) | 2018-02-20 |
EP1421513A4 (en) | 2004-10-20 |
US9330242B2 (en) | 2016-05-03 |
US20180139212A1 (en) | 2018-05-17 |
US20110119308A1 (en) | 2011-05-19 |
EP1421513A1 (en) | 2004-05-26 |
US10866979B2 (en) | 2020-12-15 |
US8832149B2 (en) | 2014-09-09 |
WO2003009166A1 (en) | 2003-01-30 |
US20160156634A1 (en) | 2016-06-02 |
US9553880B2 (en) | 2017-01-24 |
US6912528B2 (en) | 2005-06-28 |
US20170093881A1 (en) | 2017-03-30 |
US20020042730A1 (en) | 2002-04-11 |
CA2454225A1 (en) | 2003-01-30 |
US20110119769A1 (en) | 2011-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10866979B2 (en) | 2020-12-15 | Subscription media on demand IX |
US20040133600A1 (en) | 2004-07-08 | Rechargeable media distribution and play system |
US8577808B2 (en) | 2013-11-05 | Methods for securely distributing computer software products |
US8626838B2 (en) | 2014-01-07 | Digital media asset identification system and method |
JP4624354B2 (en) | 2011-02-02 | Music purchasing and playback system and method |
JP2003524264A (en) | 2003-08-12 | Method and apparatus for storing, distributing and accessing intellectual property in digital form |
US8584249B2 (en) | 2013-11-12 | System for preventing unauthorized use of digital content |
JP2001229229A (en) | 2001-08-24 | Digital contents distribution system, digital contents distribution method and recording medium with computer program for browsing digital contents distributed from the distribution system recorded thereon |
JP2002324170A (en) | 2002-11-08 | Contents distribution system and method thereof |
WO2001079971A2 (en) | 2001-10-25 | Method and system for securely downloading content to users |
JP2002353953A (en) | 2002-12-06 | Contents-providing system having utilization form control function, contents utilization form control method, program for provider device, program for user device, recording medium for program for the provider device, recording medium for program for the user device and partial vending system for contents |
JP2003297011A (en) | 2003-10-17 | Recording disk medium, management method for recording disk medium, and management system thereof |
AU2002316727A1 (en) | 2003-03-03 | Rechargeable media distribution and play system |
JP2003280833A (en) | 2003-10-02 | Print service providing system, print service providing method, and print service providing program |
CA2397717A1 (en) | 2001-07-26 | Rechargeable media distribution and play system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2014-12-15 | AS | Assignment |
Owner name: B# ON DEMAND, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HOMER, GREGG S.;REEL/FRAME:034507/0759 Effective date: 20141215 |
2016-11-23 | STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |