throbber
United States Patent
`Mages et al.
`
`[19]
`
`[54]
`
`METHOD OF SECURE SERVER CONTROL
`OF LOCAL MEDIA VIA A TRIGGER
`THROUGH A NETWORK FOR INSTANT
`LOCAL ACCESS OF ENCRYPTED DATA ON
`LOCAL MEDIA
`
`[76]
`
`Inventors: Kenneth G. Mages, 1671 Strath Erin,
`Highland Park, Ill. 60035; J ie Feng,
`1414 Ebmwood, #3E, Evanston, Ill.
`60201
`
`Appl. No.: 756,162
`
`Filed:
`
`Nov. 25, 1996
`
`Related US. Application Data
`
`Continuation-in-part of Ser. No. 645,022, May 15, 1996,
`abandoned.
`
`Int. Cl.6 ...................................................... .. H04L 9/08
`
`.. 380/3; 380/4; 380/5; 380/21
`US. Cl.
`Field of Search ...................................... .. 380/3—5, 21
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`8/1974 Freeny, Jr. ........................ .. 340/149 R
`3,829,833
`3,911,397 10/1975 Freeny, Jr.
`340/147 MD
`3,924,065 12/1975 Freeny, Jr. .......................... .. 178/66 R
`3,946,220
`3/1976 Brobeck et al. ...................... .. 235/168
`3,970,992
`7/1976 Boothroyd et al.
`340/172.5
`4,070,692
`1/1978 Parks ............... ..
`358/107
`4,071,911
`1/1978 MaZur ..... ..
`364/900
`4,112,421
`9/1978 Freeny, Jr. ........................ .. 343/112 D
`4,209,787
`6/1980 Freeny, Jr ......................... .. 343/112 R
`4,217,588
`8/1980 Freeny, Jr.
`343/112D
`4,220,991
`9/1980 Hamano et al.
`..... .. 364/405
`4,232,317 11/1980 Freeny, Jr.
`343/112 R
`4,270,182
`5/1981 Asija
`364/900
`4,305,098 12/1981 Mitchell
`358/131
`4,528,643
`7/1985 Freeny, Jr.
`364/900
`4,555,803 11/1985 Hirose ..................................... .. 382/61
`
`US005892825A
`Patent Number:
`Date of Patent:
`
`[11]
`[45]
`
`5,892,825
`Apr. 6, 1999
`
`OTHER PUBLICATIONS
`
`“Overview of CD—ROM Encryption, Copy Protection, and
`Metering”;Disc Mfg., Inc., Oct. 19, 1996.
`“CD—ROM/Online Hybrids—The Missing Link”, Richard
`R. Reisman, CD—ROM Professional, vol. 8, No. 4, Apr.
`1995.
`“All Power to the Web—CD—ROM is dead , or is it”, Richard
`R. Reisman; New York Media Association News, , Jan.
`1996.
`Spin Webs around a CD—ROM :The Next Generation of
`CD/Web Hybirds, Richard R. Reisman, Mass High Tech.,
`Sep. 1996.
`
`Primary Examiner—Salvatore Cangialosi
`[57]
`ABSTRACT
`
`A method of triggering video imaging and/or audio data on
`a “HyperCD” (CD-ROM) via a trigger through a network
`for instant local access of encrypted data on local media. The
`CD—ROM contains video/audio ?les that have been crippled
`by removing the critical information thereof. The CD—ROM
`also contains programs for directly and automatically con
`necting the end-user’s computer to a targeted server (URL)
`a network (such as the Internet).
`
`The method of the invention includes the separation of
`critical information/key from media data, the storage of
`encrypted keys on a remote server, the storage of crippled
`chunky media data on CD-ROM’s, the socket-to-socket
`connection between the end-user’s computer and the remote
`server and the request from user to server, the authorization
`and transmission of the uncrippling key through a network
`to the end-user’s computers, the combining in RAM of the
`trigger and the crippled data from CD—ROM for instant
`rendering/playback, the storing of the uncrippling key on the
`end-user’s computers non-volatile media for owning the
`data on the CD—ROM for later access authorized by the
`remote server. Since the uncrippling trigger is much smaller
`than the entire media ?le, it saves considerable amount of
`transmission time, thereby instantly combining the trigger
`with the crippled data on the CD—ROM, after which instantly
`playing the designated track from end-user’s computer.
`
`(List continued on next page.)
`
`19 Claims, 7 Drawing Sheets
`
`RAW DATA- GRAPHIC,
`TEXT, VIDEEI, AUDID,
`BINARY, HTHLIAPPLETS
`SCRIPTS. APPUCATIEINS, ETCv
`
`INTERNET WEB PAGE LAYEIUT
`RESIDES DN THE HDS'T SERVER,
`URL INFDRHATIDN IN PAGE
`LAYDUT uSED YD CREATE
`A MAP FDR THE HYPER cD.
`
`SDuRcE DATA IS DIGITIZED
`AND CRIPPLED, A TRIGGER FREIM
`A HDST SERVER IS REuuIRED
`Tu UNLDCK/UNCRIPPLE DATA.
`
`HvPERcD IS ENcDDED wITH
`CRIPPLED DATA AND UNIuuE
`URL'S TD LDcATE SuuRcE DATA
`DN HvPERcD AND cLlENT'S WEB
`PAGES DN HDST SERVER.
`
`HvRERcD AUTDHATICALLY
`INvDRES CLIENTS WEB PAGE.
`
`THE USER IS SENT A REQUESTED
`TRIGGER FRDM THE SERVER.
`
`22
`
`24
`
`TRIBEER IS THEN DDHBIIEB
`
`VI
`THAT ALLDVS THE URIGINAL
`DATA TD DE AccESSED.
`
`INTERACTIVE
`WEB PAGE
`RESPDNSE
`
`CEIHBINED DATA IS ACCESSED DN
`HDNITUR AND SPEAKERS
`1N REAL TIME Tu USER.
`
`PETITIONER EX. 1005 Page 1
`
`

`
`5,892,825
`Page 2
`
`US. PATENT DOCUMENTS
`
`3/1986 (iomerford etal- ------------------ -- 364/900
`4,577,289
`4,633,207 12/1986 Best .......................................... .. 380/4
`5,027,396
`6/1991 Platteter et a1.
`.. 380/4
`5,222,134
`6/1993 Waited et a1.
`.. 380/4
`5,319,705
`6/1994 Halter et a1.
`.. 380/4
`5,321,750
`6/1994 Nadan ...... ..
`. 380/20
`5,365,272 11/1994 Siracusa ..
`.. 348/426
`5,375,068 12/1994 Palmer et a1. .
`.. 364/514
`5,388,097
`2/1995 Baugher et a1.
`. 370/85.5
`5,400,403
`3/1995 Fahn ......... ..
`380/4
`5,410,354
`4/1995 UZ ................ ..
`.. 348/426
`5,410,698
`4/1995 Danneels et a1. .
`.. 395/650
`5,450,489
`9/1995 Ostrover et a1. ..
`.. 380/4
`
`5,457,668 10/1995 Hibino et a1. ............................. .. 380/4
`5,457,746 10/1995 Dolphin
`380/4
`5,499,252
`3/1996 Watanabe ............................. .. 371/401
`5,509,070
`4/1996 schull _______________________________________ __ 380/4
`5,535,199
`7/1996 Amri et a1.
`370/60
`5,535,327
`7/1996 Verinsky et al.
`395/182.03
`5,550,577
`8/1996 Verbiest et a1.
`.... .. 348/7
`5,553,139
`9/1996 Ross et a1.
`. 380/4
`5,553,143
`9/1996 Ross et a1. .
`380/25
`5,559,608
`9/1996 Kunihiro .
`358/343
`5,563,947 10/1996 Kikinis ........ ..
`380/4
`5,613,004
`3/1997 Cooperman et al.
`380/4
`5,629,980
`5/1997 Ste?k e161.
`380/4
`5,636,276
`6/1997 Brugger
`380/4
`5,638,443
`6/1997 Ste?k et al.
`380/4
`
`PETITIONER EX. 1005 Page 2
`
`

`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 1 0f 7
`
`5,892,825
`
`PETITIONER EX. 1005 Page 3
`
`

`
`U.S. Patent
`
`Apr. 6
`
`9
`
`1999
`
`Sheet 2 of 7
`
`5,892,825
`
`n83.
`
`555
`
`mzu:.§z2,_z8
`
`H:>mn
`
`b
`
`mN
`
`
`
`~_m>¢4é2w»:n_
`
`
`
`M23.228.5
`
`mu.&Em
`
`Sam:
`
`PETITIONER EX. ‘I005 Page 4
`
`PETITIONER EX. 1005 Page 4
`
`
`
`
`

`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet3 0f7
`
`5,892,825
`
`START
`
`6O /
`usER SUBMIT I/
`REQUEST
`
`NUT APPRUVED
`NI] TRIGGER
`
`USER
`WAIT FIIR
`TRIGGER
`
`62
`
`64
`USER RECEIVE/
`TRIGGER ’ ~————1
`
`uNcRIPPLING DATA {'2
`UN CD-RDM ‘V55
`
`DISPLAY/USE/“BB
`
`NU
`
`YES
`
`END
`
`PETITIONER EX. 1005 Page 5
`
`

`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 4 of7
`
`5,892,825
`
`START
`
`70
`SUPPLY VEB//
`PAGES
`
`NE]
`
`T
`
`USER
`REQUEST T
`
`72
`
`EVALUATE J74
`
`REQUEST -
`
`NU
`
`SEND
`TRIGGER ?
`
`76
`
`r78
`SEND UNCRIPPLING
`TRIGGER DATA “ \1
`
`PETITIONER EX. 1005 Page 6
`
`

`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 5 0f 7
`
`5,892,825
`
`START
`
`12
`RAV DATAI GRAPHIC,
`TEXT, vInEn, AUDIT], /
`BINARY, HTML,APPLETS, /
`scRIPTs, APPLIcATInNs, ETC.
`
`INTERNET vEB PAGE LAYUUT
`14
`REsInEs [IN THE HusT sERvER,
`URL INFDRMATIDN IN PAGE /
`LAYDUT usEn Tu cREATE
`/
`A MAP FDR THE HYPER on.
`
`SDURCE DATA IS DIGITIZED
`10
`AND CRIPPLED, A TRIGGER FREIM
`A HDST SERVER IS REQUIRED //
`TU UNLDCK/UNCRIPPLE DATA. /
`T
`HYPERCD IS ENCEIDED \v/ITH
`16
`CRIPPLED DATA AND UNIQUE
`URL’S TD LDCATE SETURCE DATA /
`UN HYPERCD AND CLIENT’S VEB/
`PAGES UN HDST SERVER.
`T
`HYPERCD AUTOMATICALLY
`INVDKES CLIENTS WEB PAGE.
`
`/_,_~_‘18
`
`THE USER Is sENT A REQUESTED C: ____ __
`TRIGGER PRuM THE sERvER.
`"
`l
`T
`:
`INTERAcTIvE ,
`wEB PAGE |
`RESPEINSE {
`l
`l
`|
`-'- ————————— ——
`
`T
`THE TRIGGER 1:: THEN cuHBINEn
`WITH CRIPPLED suuRcE nATA
`22
`; THAT ALLDVS THE [JRIGINAL
`-'
`DATA Tu BE AccEssEn.
`T
`24 CETMBINED DATA IS ACCESSED [TN
`Q-w MUNITEIR AND SPEAKERS
`IN REAL TIME TD USER.
`
`ET" E5
`
`PETITIONER EX. 1005 Page 7
`
`

`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 6 0f 7
`
`5,892,825
`
`CRIPPLING SDURCE DATA '
`
`32
`
`DIGITIZING AND ENDDDING
`SUURCE DATA FDR HYPERCD »/ 30
`T
`T
`MAPPING URL'S TEI SUURCE
`DATA AND WEB SITE
`T
`ENCUDING CD WITH CRIPPLED
`SEIURCE DATA AND URL’S ’
`
`/-/34
`’
`
`E6
`
`40
`
`RECEIVING DR END USER'S PC,
`I
`USER INVUKES HYPERCD AND
`IS AUTOMATICALLY SENT //”“42
`TU PRUPER WEB SITE
`T
`USER REQUESTS DATA AND A f 44
`TRIGGER FREIM THE SERVER)
`IS SENT TU THE USER
`
`I
`THE TRIGGER LUCATES AND ’
`UNCRIPPLES THE SUURCE DATA
`I
`USER CAN Nnw ACCESS
`ORIGINAL SEIURCE DATA “W48
`I
`DIGITAL-ANALOGUE cuNvERTER1~/_\ 50
`
`46
`
`PETITIONER EX. 1005 Page 8
`
`

`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 7 0f 7
`
`5,892,825
`
`1\‘ SERVER
`
`,7
`
`’
`O #8
`
`CD-REIM
`
`HARD DRIVE]
`I /
`
`PETITIONER EX. 1005 Page 9
`
`

`
`1
`METHOD OF SECURE SERVER CONTROL
`OF LOCAL MEDIA VIA A TRIGGER
`THROUGH A NETWORK FOR INSTANT
`LOCAL ACCESS OF ENCRYPTED DATA ON
`LOCAL MEDIA
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`The present application is a continuation-in-part of appli
`cation Ser. No. 08/645,022, ?led on May 15, 1996 noW
`abandoned.
`A portion of the disclosure of this patent document
`contains material Which is subject to copyright protection.
`The copyright oWner has no objection to facsimile repro
`duction by anyone of the patent document or the patent
`disclosure, as it appears in the Patent & Trademark Office
`patent ?le or records, but otherWise reserves all copyright
`rights Whatsoever.
`
`BACKGROUND OF THE INVENTION
`
`The present invention is directed to a method of trans
`mitting “triggering data” over a netWork to cause video
`and/or audio information data on a CD-ROM at an end
`user’s computer to be made readable. In addition, the
`CD-ROM comprises program ?les for automatically dialing
`and connecting the end-user’s computer to a targeted host’s
`server using an operating system such as “WindoWs 95”.
`The CD-ROM Will only alloW the end-user access to the
`video/ and or audio on it by logging onto the host’s server via
`a netWork such as the Internet.
`The Internet is a conglomeration of computer netWorks
`that are linked together. Each netWork of the Internet may
`have one or more servers, and an operating system that may
`be different from that of others in the Internet. To link one
`netWork to another, and in order to overcome these operating
`differences betWeen computer netWorks, the Internet system
`utiliZes hardWare and softWare devices called: bridges,
`routers, and gateWays, all of Which adapt the information
`being sent on one netWork to the operating and protocol
`requirements of the receiving netWork. For example, a
`gateWay Will connect, or “splice” a netWork operating on the
`Novell protocol to a netWork that operates on a DECnet or
`SNA protocol.
`There are currently more than 10,000 computer netWorks
`that are linked together, WorldWide, Which together consti
`tute the “Internet”. Because they do not all operate on the
`same operating system, and because of different protocols,
`the data sent from one host computer of one netWork to a
`receiving computer of another netWork—Which may be
`many thousands of miles aWay from the host computer—
`may take a relatively long time, since the gateWays, bridges
`and routers must conform or adapt the protocol of the
`sending host computer to the receiving computer’s protocol.
`In addition to the time-delays associated With protocol
`variances, the Internet When connecting to an end-user via
`Plain Old Telephone Service (POTS), has a maximum
`data-transmission capacity of 3.6 kbytes per second, Which
`is not enough for sending video images in real time.
`The Internet system utiliZes tWo types of ?le-transfer
`protocols
`for copying a ?le from a host computer to
`the receiving computer: ASCII and binary. An ASCII ?le is
`a text ?le, While every other kind of ?le is binary. ASCII ?les
`are transmitted in seven-digit ASCII codes, While the binary
`?les are transmitted in binary code. Because all data stored
`in computer memory is stored in binary format, When one
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`5,892,825
`
`2
`sends a ?le in the Internet, it is sent in binary format.
`HoWever, as discussed above, oWing to the data
`transmission constraints imposed by the Internet system
`because of the differing operating systems, and a multitude
`of gateWays, routers, and bridges, the ?le data must be sent
`out in packets of a siZe no greater than 1536 bytes. Since the
`siZe of just a thirty-second video may be as great as 2.5
`megabytes, it may take up to one-half hour or more to send
`a thirty-second video over the Internet from a host computer
`to a receiving computer. Presently, there are compression
`techniques that compress the ?les in order to reduce this
`playback-time, Which data is decompressed at the receiving
`computer. An example of such a system is VDOLive,
`manufactured by VDOnet Corp. of Santa Clara, Calif.
`HoWever, these compression-systems still send the data in
`binary format, requiring packet-data siZes of no greater than
`1536 bytes. Thus, even With these compression-systems, the
`length of time to receive a thirty-second video over the
`Internet after being buffered in the user’s computer is near
`real time, but is unstable, choppy and drops as much as 96%
`of the video data over a conventional phone line.
`In the Internet, there is an electronic-mail delivery system
`called E-mail. The E-mail system utiliZes addresses to direct
`a message to the recipient, With each address having a
`mailbox code and a daemon, With the mail box and daemon
`being separated by the symbol @. In the E-mail delivery
`system, all of the messages or “mail” are routed through
`selected routers and gateWays, until it reaches What may be
`called a “post office” that services the recipient to Whom the
`electronic mail is to be delivered. The “post of?ce” is a local
`server. The need for these local “post of?ces” is because
`there is every reason to assume that the recipient-computer,
`to Which the mail is being sent, is either not poWered up, or
`is performing a different task. Since most computers in the
`Internet are not multi-tasking machines, such as, for
`example, computers running on the DOS operating system,
`if such a computer be engaged in performing a task, it is not
`possible for it to receive the E-mail data at that time. Thus,
`the local “post of?ce” or server stores the message until such
`a time as it may be delivered to the end-user to Whom it is
`intended.
`In the E-mail system, there has really been only one
`format standard for Internet messages. Avariation has been
`the MIME version, Which stands for Multipurpose Internet
`Mail Extensions, Which de?nes a neW header-?eld, Which is
`intended for use to send non-text messages, such as multi
`media messages that might include audio or images, by
`encoding the binary into seven-digit ASCII code. Before
`MIME, the limitation of E-mail systems Was the fact that it
`Would limit the contents of electronic mail messages to
`relatively short lines of seven-bit ASCII. This has forced
`users to convert any non-textual data that they may Wish to
`send into seven-bit bytes representable as printable ASCII
`characters before invoking a local mail UA (User Agent, a
`program With Which human users send and receive mail).
`Examples of such encodings currently used in the Internet
`include pure hexadecimal, uuencoded, the 3-in-4 base 64
`scheme speci?ed in RFC 1421, the AndreW Toolkit Repre
`sentation [ATK], and many others. Even though a user’s UA
`may not have the capability of dealing With the non-textual
`body part, the user might have some mechanism external to
`the UA that can extract useful information from the body
`part. Moreover, it does not alloW for the fact that the
`message may eventually be gateWayed back into an X.400
`message handling system (i.e., the X400 message is “tun
`neled” through Internet mail), Where the non-textual infor
`mation Would de?nitely become useful again. With MIME,
`
`PETITIONER EX. 1005 Page 10
`
`

`
`3
`video and/or audio data may be sent using the E-mail
`system. MIME uses a number of header-?elds, such as
`“Content-Type” header ?eld, Which can be used to specify
`the type and subtype of data in the body of a message and
`to fully specify the native representation (encoding) of such
`data; “text” Content-Type value header ?eld, Which an be
`used to represent textual information in a number of char
`acter sets and formatted teXt description languages in a
`standardiZed manner; “multi-part” Content-Type value,
`Which can be used to combine several body parts, possibly
`of differing types of data, into a single message; “applica
`tion” Content-Type value, Which an be used to transmit
`application data or binary data, and hence, among other
`users, to implement an electronic mail ?le transfer service;
`“message” Content-Type value, for encapsulating another
`mail message; “image” Content-Type value, for transmitting
`still image (picture) data; “audio” Content-Type value, for
`transmitting audio or voice data; “video” Content-Type
`value, for transmitting video or moving image data, possibly
`With audio as part of the composite video data format;
`“Content-Transfer-Encoding” header ?eld, Which can be
`used to specify an auXiliary encoding that Was applied to the
`data in order to alloW it to pass through mail transport
`mechanisms Which may have data or character set limita
`tions. TWo additional header ?elds may be used to further
`describe the data in a message body: The “Content-ID” and
`“Content Description” header ?elds.
`HoWever, there are considerable draWbacks and de?cien
`cies in transmitting video images and/or audio data over the
`Internet using E-mail’s MIME. Firstly, there is often con
`siderable time delays, such that it may take up to ten or more
`minutes to send a thirty-second video clip over the E-mail
`system. In times of high-traf?c usage, the delay may even be
`more than ten minutes. Secondly, the video image or audio
`data cannot be vieWed or listened to by the end-user, or
`recipient, until all of the data of the entire video or audio ?le
`has been received by the receiving computer, Which, also,
`adds a considerable time lag to the actual vieWing or
`listening. Thirdly, the end-user or recipient computer must
`have the necessary E-mail and MIME softWare for decoding
`the data. Fourthly, since MIME is an E-mail protocol
`system, the data is transmitted via the E-mail system,
`meaning that it is routed through one or more post of?ces
`and servers, Which delay the transmission of the data, and
`Which require that no other task be performed by the
`receiving computer if it is a single-tasking machine, like
`DOS-operating system machines. Fifthly, like all E-mail
`deliveries, the requisite E-mail softWare at the recipient
`computer must decode the encoded data received, and then
`cut-and-paste the data into a neW ?le, such as NOTEPAD,
`Which is time-consuming, before the neW ?le is played back
`by a vieWer or player.
`In commonly-oWned application Ser. No. 08/568,631,
`?led on Dec. 7, 1995, noW abandoned there is disclosed a
`“catcher”, Which is a method and softWare code for catching
`a stream of data at a personal computer from the Internet for
`alloWing substantially instant playback thereof by the per
`sonal computer, Which “catcher” is utiliZed in the invention
`of the present application, as set forth hereinbeloW.
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`SUMMARY OF THE INVENTION
`It is the primary objective of the present invention to
`separate keys and data by providing a CD-ROM having its
`informational data of video and/or audio that is crippled,
`Which data may only be read after it has been “uncrippled”
`by receiving “uncrippling” triggering data over the Internet
`from a server of a host system, so that a company’s host
`
`65
`
`5,892,825
`
`4
`computer serving the Internet may transmit the “uncrip
`pling” data over the Internet to an end-user’s receiving
`computer in order to uncripple and, thereby, actuate the
`CD-ROM, so that the data thereon may be read by the
`end-user’s receiving computer only in volatile memory such
`as RAM.
`It is another objective of the present invention to enable
`server control of the local media data by providing such a
`“crippled” CD-ROM With video and/or audio data thereon,
`Whereby content by a company on the Internet may be better
`controlled, and Whereby in conjunction With the content,
`video and/or audio playback may be combined With any
`updated, teXtual information, such as current price of a
`product or products, location of a store or stores in the
`vicinity of the end-user’s residence, etc. Speci?c tracks on
`the CD-ROM can thereby be controlled by the remote
`server.
`It is another objective of the present invention to provide
`such a “crippled” CD-ROM With video and/or audio data
`thereon, Whereby the CD-ROM is inherently provided With
`Internet start-up and connecting program that automatically
`and directly connects the end-user’s computer to the com
`pany’s or content provider’s host server via the Internet,
`Whereby, not only does such facilitate and encourage the
`connection of the end-user to the content provider’s Web
`page, but also provides the content provider With valuable
`marketing information, such as the physical location of the
`caller, Whereby selected information unique to that caller
`may be doWnloaded to him over the Internet, such as name
`and addresses of stores of the company or advertiser nearest
`to the caller, etc.
`It is another objective of the present invention to provide
`such video imaging, With or Without audio, such that the use
`of the E-mail system or the Internet system itself is entirely
`obviated.
`It is another objective of the present invention to provide
`such video imaging, With or Without audio, such that the data
`representing the video and/or audio is accessed off the
`end-user’s CD-ROM, With the transmitted de-crippling trig
`gering data from the content provider’s host server (URL)
`being a trigger as small as a feW bytes.
`It is another objective of the present invention to alloW by
`server permission only, the end-user the ability to store said
`trigger on non-volatile media for permanent oWnership of
`said data.
`ToWard these and other ends, the method of the invention
`for transmitting the de-crippling triggering data for video
`and/or audio off a CD-ROM (“HyperCD”) over the Internet
`consists of encoding the data representing critical informa
`tion of the ?le keys such as the header of the video/audio
`?les on the CD-ROM, and transmitting that encoded key to
`the local server of the local Web of the Internet serving the
`caller, or end-user computer. The local server then estab
`lishes a point-to-point socket-connection betWeen the
`transmitting, host computer, and the receiving or end-user
`computer, thereby obviating the need to send the actual
`video data over the Internet. When the encoded key is
`received by the receiving, or end-user, computer, the data is
`decoded and matched to the video/audio ?les of the
`CD-ROM, Whereupon, since the data ?les on the CD-ROM
`noW have an associated and complete header, the data
`thereof may be read, to thus alloW the instant playback of the
`video-audio data on the CD-ROM.
`Since the encoded header data that is sent over the Internet
`is a necessity before the end-user may playback the video/
`audio data from the CD-ROM, the host computer may send
`
`PETITIONER EX. 1005 Page 11
`
`

`
`5,892,825
`
`5
`along With the encoded data, additional information perti
`nent to the information contained on the CD-ROM, such as
`current prices, special offers or deals, locations of local
`stores or dealers, or any information that the host computer,
`content provider, Would like the end-user to receive.
`In order to encourage the end-user to vieW the video/
`audio, the CD-ROM is provided With its oWn Internet
`dial-up program ?les for connecting to the host Web server,
`so that very little time and effort is required on the part of the
`end-user.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The invention Will be more readily understood With
`reference to the accompanying draWings, Wherein:
`FIG. 1 is a pictorial representations of the hardWare
`systems and softWare processes used for carrying out the
`present invention;
`FIG. 2 is a block diagram shoWing the hardWare of the
`end-user’s computer used for carrying out the present inven
`tion;
`FIG. 3 is a How chart at a user’s computer for accessing
`the trigger-data from a Web-site;
`FIG. 4 is a How chart for the server associated With the
`Internet for evaluating the trigger-request from the user’s
`computer and for sending the trigger;
`FIG. 5 is a block diagram shoWing the socket-to-socket
`connection for transmitting the de-crippling, triggering key
`for causing the display of the video images and/or audio data
`of a “HyperCD” at the end-user’s PC over the Internet from
`a host computer combined With a targeted URL to a recipient
`or end-user’s computer;
`FIG. 6 is a block diagram shoWing the steps for forming
`on the CD-ROM the encoded video and audio data for use
`by the end-user recipient computer after having been
`crippled by removing the header-triggering key sent from
`the media ?les;
`FIG. 7 is a block diagram shoWing the process of trig
`gering in order to invoke “HyperCD” video and/or audio
`data at the receiving computer for playback; and
`FIG. 8 is a pictorial representation of the hardWare
`component and softWare processing involved.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`Referring noW to the draWings in greater detail, and to
`FIGS. 1 and 2 for noW, the hardWare used to carry out the
`present invention is shoWn. All of the hardWare is conven
`tional and Well-knoWn, and includes an end-user computer
`1 having a CD-ROM drive 2 for playing a CD-ROM 3
`having stored thereon crippled data 4 that is unreadable
`Without ?rst having received a trigger or uncrippling key 5.
`The end-user’s computer 1 is connected via the Internet 6 to
`a host-computer server 7 Which has stored thereat the
`uncrippling or triggering key 5 for the information stored on
`the end-user’s CD-ROM 3. The end-user’s computer 1 has
`a display and a CPU 9 and a communication-device, such as
`a modem 10 for establishing communication With the Inter
`net 6. The computer 1 also has the CD-ROM drive 2,
`hard-drive 11, RAM 13, and video system 8 including
`monitor as Well as audio system 13.
`Referring to FIG. 3, there is shoWn the How charts for
`receiving the uncrippling key. The end-user ?rst submits a
`request over the Internet for the uncrippling key (block 60).
`The user then Waits for that key (block 62), and if the user
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`6
`is not authoriZed, the request is denied. If the request is
`authoriZed, then the uncrippling key is sent by the server and
`received by the end-user’s computer (block 64), Whereupon
`the end-user’s computer directs the uncrippling key into
`volatile memory such as RAM, not into a RAM-disk to be
`visible, but saved in a dynamically allocated data structure
`in RAM accessible only by the receiving program, com
`bined With crippled data read from the CD-ROM and
`displays the video/animation (block 68).
`FIG. 4 shoWs the process-?oW that at the server side. The
`server conventionally provides the Web pages to the Internet
`users (block 70), and aWaits a user-request (block 72). If a
`request is received from an end-user’s computer, the server
`evaluates the request (block 74) in order to authoriZe the
`transfer of the uncrippling key (block 76). If an authoriZation
`is granted, then the uncrippling, trigger key is sent (block
`78).
`Referring noW to FIGS. 5—7, video images and/or audio
`are converted from analogue to digital and stored in crippled
`fashion in digitiZed format (block 10) on CD-ROM 3. The
`crippling of the CD-ROM is achieved by removing critical
`information such as the video-audio header, Whereupon such
`video/audio data is rendered unreadable by the end-user’s
`computer. The “HyperCD” 3 is provided With the URL (Web
`page) of the designated host computer, or server, (block 14),
`such, as for example: http://tekWeb.com/hypercd/adver/
`lotto.html, Which may be used on the CD-ROM for the
`Illinois Instant Lottery video advertising. Such digitiZed
`format may be eXisting computer memory ?les (block 12)
`that are already in binary format, or may be original ?les
`originated by recording the video and/or audio, as by a
`camcorder or tape, etc., and converting the analogue signals
`into digital, or binary, code. In the case of originating ?les,
`the analogue data may be converted to digital data using an
`INTEL “Smart Video Reorder Pro”, for eXample. The raW
`binary data that is stored on the “HyperCD” (block 16) is
`crippled, so the only Way to access the data is a socket-to
`socket connection With the server of the Web page of the
`host. By means of the process performed in block 14, the
`CD-ROM contains a code representing the URL Web page
`of the host computer Where the necessary de-crippling key
`is located. This data on the CD-ROM 3 Will automatically
`call up and connect the end-user’s computer to the host
`computer’s server 7 on the Internet, Whereby a socket-to
`socket connection is made therebetWeen (block 18). Such an
`automatic connection is Well-knoWn, and Will automatically
`?nd the end-user’s broWser, Will call the Internet service
`provider, and pass the necessary links from the CD-ROM to
`the broWser in order to get to the host’s Web page. Such
`softWare is available on the “WindoWs 95” operating
`system, such as “ActiveX”. The host computer then sends
`back to the local server serving the end-user’s computer the
`necessary, decrippling trigger for the speci?c video/audio
`data on the end-user’s CD-ROM (block 20). From the local
`server, the data is sent out directly over the Internet to the
`end-user, and, in particular, to the RAM 12 of the end-user’s
`computer (block 22). In RAM, the trigger (block 22), and the
`data on the CD-ROM 3 are combined, and played back
`(block 24), as described above. HoWever, as Will be
`eXplained hereinbeloW, since the key 5 is being sent via
`Internet 6, the end-user’s computer 7 must be equipped With
`the requisite softWare Which is capable of receiving data
`from the server 7 and Which Will ensure that the received
`encoded key 5 is placed safely in RAM 12, and not alloWed
`to be otherWise saved in hard drive 11 Where it may be
`captured and used in a Way not authoriZed by the server 7.
`Referring to FIG. 6, at the end-user computer end, the raW
`analogue data of the audio/video is digitiZed (block 30), as
`
`PETITIONER EX. 1005 Page 12
`
`

`
`8
`the correct track of the CD-ROM (block 48), from Which the
`data passes to the audio/video subsystem (8,13, FIG. 2), in
`order to play the video or audio (block 50). It is noted, and
`emphasiZed, that as soon as the key has been decoded, the
`video and/or audio data is immediately “played” back by the
`audio/video subsystems (8,13, FIG. 2), bypassing the neces
`sity of having to ?rst store the key, or other trigger, on a hard
`drive before playback.
`Referring speci?cally to FIG. 8, there are shoWn the
`server 1, the user computer 2, and the softWare processes 3
`used for transmitting the uncrippling key 4 over a netWork
`5, the combining in RAM 6 of the key 4 and crippled data
`7 from the CD-ROM 8, the rendering or displaying of the
`media data 9 such as video/audio or animation on the display
`10 or from the audio system 11, and the storing of the key
`4 to non-volatile media 13, such as a hard drive, for
`permanent oWnership of the encrypted CD media.
`It is noted that it is possible to “cripple” the video/audio
`data on the CD-ROM by other means other than deleting the
`header thereof. For example, the ?le could be made a hidden
`?le, With the trigger data from the host computer being a
`command to remove the hidden status. Alternatively, the
`video/audio ?le could have a changed extension, With the
`trigger data from the host computer being a command to
`change the extension. Moreover, the crippling of the video/
`audio ?le may be achieved by the use of ZIP ?le, With the
`trigger data from the host computer being a command to
`UNZIP the data. It is, also, Within the scope and purvieW of
`the invention to use a ?oppy disk for storing the crippled ?le,
`as described above, for those applications requiring less
`disk-memory, With the uncrippling data from the host server
`being sent to the ?oppy-disk drive via the catcher program,
`as described above for uncrippling the data on the ?oppy
`disk. Of course, the crippled ?le may also be stored on any
`storage medium, such as the hard drive 11, With the uncrip
`pling data from the host server being sent to the drive for that
`storage medium via the catcher program, as explained
`above. The uncrippling data ma

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket