`Mages et al.
`
`[19]
`
`[54]
`
`METHOD OF SECURE SERVER CONTROL
`OF LOCAL MEDIA VIA A TRIGGER
`THROUGH A NETWORK FOR INSTANT
`LOCAL ACCESS OF ENCRYPTED DATA ON
`LOCAL MEDIA
`
`[76]
`
`Inventors: Kenneth G. Mages, 1671 Strath Erin,
`Highland Park, Ill. 60035; J ie Feng,
`1414 Ebmwood, #3E, Evanston, Ill.
`60201
`
`Appl. No.: 756,162
`
`Filed:
`
`Nov. 25, 1996
`
`Related US. Application Data
`
`Continuation-in-part of Ser. No. 645,022, May 15, 1996,
`abandoned.
`
`Int. Cl.6 ...................................................... .. H04L 9/08
`
`.. 380/3; 380/4; 380/5; 380/21
`US. Cl.
`Field of Search ...................................... .. 380/3—5, 21
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`8/1974 Freeny, Jr. ........................ .. 340/149 R
`3,829,833
`3,911,397 10/1975 Freeny, Jr.
`340/147 MD
`3,924,065 12/1975 Freeny, Jr. .......................... .. 178/66 R
`3,946,220
`3/1976 Brobeck et al. ...................... .. 235/168
`3,970,992
`7/1976 Boothroyd et al.
`340/172.5
`4,070,692
`1/1978 Parks ............... ..
`358/107
`4,071,911
`1/1978 MaZur ..... ..
`364/900
`4,112,421
`9/1978 Freeny, Jr. ........................ .. 343/112 D
`4,209,787
`6/1980 Freeny, Jr ......................... .. 343/112 R
`4,217,588
`8/1980 Freeny, Jr.
`343/112D
`4,220,991
`9/1980 Hamano et al.
`..... .. 364/405
`4,232,317 11/1980 Freeny, Jr.
`343/112 R
`4,270,182
`5/1981 Asija
`364/900
`4,305,098 12/1981 Mitchell
`358/131
`4,528,643
`7/1985 Freeny, Jr.
`364/900
`4,555,803 11/1985 Hirose ..................................... .. 382/61
`
`US005892825A
`Patent Number:
`Date of Patent:
`
`[11]
`[45]
`
`5,892,825
`Apr. 6, 1999
`
`OTHER PUBLICATIONS
`
`“Overview of CD—ROM Encryption, Copy Protection, and
`Metering”;Disc Mfg., Inc., Oct. 19, 1996.
`“CD—ROM/Online Hybrids—The Missing Link”, Richard
`R. Reisman, CD—ROM Professional, vol. 8, No. 4, Apr.
`1995.
`“All Power to the Web—CD—ROM is dead , or is it”, Richard
`R. Reisman; New York Media Association News, , Jan.
`1996.
`Spin Webs around a CD—ROM :The Next Generation of
`CD/Web Hybirds, Richard R. Reisman, Mass High Tech.,
`Sep. 1996.
`
`Primary Examiner—Salvatore Cangialosi
`[57]
`ABSTRACT
`
`A method of triggering video imaging and/or audio data on
`a “HyperCD” (CD-ROM) via a trigger through a network
`for instant local access of encrypted data on local media. The
`CD—ROM contains video/audio ?les that have been crippled
`by removing the critical information thereof. The CD—ROM
`also contains programs for directly and automatically con
`necting the end-user’s computer to a targeted server (URL)
`a network (such as the Internet).
`
`The method of the invention includes the separation of
`critical information/key from media data, the storage of
`encrypted keys on a remote server, the storage of crippled
`chunky media data on CD-ROM’s, the socket-to-socket
`connection between the end-user’s computer and the remote
`server and the request from user to server, the authorization
`and transmission of the uncrippling key through a network
`to the end-user’s computers, the combining in RAM of the
`trigger and the crippled data from CD—ROM for instant
`rendering/playback, the storing of the uncrippling key on the
`end-user’s computers non-volatile media for owning the
`data on the CD—ROM for later access authorized by the
`remote server. Since the uncrippling trigger is much smaller
`than the entire media ?le, it saves considerable amount of
`transmission time, thereby instantly combining the trigger
`with the crippled data on the CD—ROM, after which instantly
`playing the designated track from end-user’s computer.
`
`(List continued on next page.)
`
`19 Claims, 7 Drawing Sheets
`
`RAW DATA- GRAPHIC,
`TEXT, VIDEEI, AUDID,
`BINARY, HTHLIAPPLETS
`SCRIPTS. APPUCATIEINS, ETCv
`
`INTERNET WEB PAGE LAYEIUT
`RESIDES DN THE HDS'T SERVER,
`URL INFDRHATIDN IN PAGE
`LAYDUT uSED YD CREATE
`A MAP FDR THE HYPER cD.
`
`SDuRcE DATA IS DIGITIZED
`AND CRIPPLED, A TRIGGER FREIM
`A HDST SERVER IS REuuIRED
`Tu UNLDCK/UNCRIPPLE DATA.
`
`HvPERcD IS ENcDDED wITH
`CRIPPLED DATA AND UNIuuE
`URL'S TD LDcATE SuuRcE DATA
`DN HvPERcD AND cLlENT'S WEB
`PAGES DN HDST SERVER.
`
`HvRERcD AUTDHATICALLY
`INvDRES CLIENTS WEB PAGE.
`
`THE USER IS SENT A REQUESTED
`TRIGGER FRDM THE SERVER.
`
`22
`
`24
`
`TRIBEER IS THEN DDHBIIEB
`
`VI
`THAT ALLDVS THE URIGINAL
`DATA TD DE AccESSED.
`
`INTERACTIVE
`WEB PAGE
`RESPDNSE
`
`CEIHBINED DATA IS ACCESSED DN
`HDNITUR AND SPEAKERS
`1N REAL TIME Tu USER.
`
`PETITIONER EX. 1005 Page 1
`
`
`
`5,892,825
`Page 2
`
`US. PATENT DOCUMENTS
`
`3/1986 (iomerford etal- ------------------ -- 364/900
`4,577,289
`4,633,207 12/1986 Best .......................................... .. 380/4
`5,027,396
`6/1991 Platteter et a1.
`.. 380/4
`5,222,134
`6/1993 Waited et a1.
`.. 380/4
`5,319,705
`6/1994 Halter et a1.
`.. 380/4
`5,321,750
`6/1994 Nadan ...... ..
`. 380/20
`5,365,272 11/1994 Siracusa ..
`.. 348/426
`5,375,068 12/1994 Palmer et a1. .
`.. 364/514
`5,388,097
`2/1995 Baugher et a1.
`. 370/85.5
`5,400,403
`3/1995 Fahn ......... ..
`380/4
`5,410,354
`4/1995 UZ ................ ..
`.. 348/426
`5,410,698
`4/1995 Danneels et a1. .
`.. 395/650
`5,450,489
`9/1995 Ostrover et a1. ..
`.. 380/4
`
`5,457,668 10/1995 Hibino et a1. ............................. .. 380/4
`5,457,746 10/1995 Dolphin
`380/4
`5,499,252
`3/1996 Watanabe ............................. .. 371/401
`5,509,070
`4/1996 schull _______________________________________ __ 380/4
`5,535,199
`7/1996 Amri et a1.
`370/60
`5,535,327
`7/1996 Verinsky et al.
`395/182.03
`5,550,577
`8/1996 Verbiest et a1.
`.... .. 348/7
`5,553,139
`9/1996 Ross et a1.
`. 380/4
`5,553,143
`9/1996 Ross et a1. .
`380/25
`5,559,608
`9/1996 Kunihiro .
`358/343
`5,563,947 10/1996 Kikinis ........ ..
`380/4
`5,613,004
`3/1997 Cooperman et al.
`380/4
`5,629,980
`5/1997 Ste?k e161.
`380/4
`5,636,276
`6/1997 Brugger
`380/4
`5,638,443
`6/1997 Ste?k et al.
`380/4
`
`PETITIONER EX. 1005 Page 2
`
`
`
`U.S. Patent
`U.S. Patent
`
`Apr. 6, 1999
`Apr. 6, 1999
`
`Sheet 1 0f 7
`Sheet 1 of 7
`
`5,892,825
`5,892,825
`
`PETITIONER EX. ‘I005 Page 3
`
`PETITIONER EX. 1005 Page 3
`
`
`
`U.S. Patent
`
`Apr. 6
`
`9
`
`1999
`
`Sheet 2 of 7
`
`5,892,825
`
`n83.
`
`555
`
`mzu:.§z2,_z8
`
`H:>mn
`
`b
`
`mN
`
`
`
`~_m>¢4é2w»:n_
`
`
`
`M23.228.5
`
`mu.&Em
`
`Sam:
`
`PETITIONER EX. ‘I005 Page 4
`
`PETITIONER EX. 1005 Page 4
`
`
`
`
`
`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet3 0f7
`
`5,892,825
`
`START
`
`6O /
`usER SUBMIT I/
`REQUEST
`
`NUT APPRUVED
`NI] TRIGGER
`
`USER
`WAIT FIIR
`TRIGGER
`
`62
`
`64
`USER RECEIVE/
`TRIGGER ’ ~————1
`
`uNcRIPPLING DATA {'2
`UN CD-RDM ‘V55
`
`DISPLAY/USE/“BB
`
`NU
`
`YES
`
`END
`
`PETITIONER EX. 1005 Page 5
`
`
`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 4 of7
`
`5,892,825
`
`START
`
`70
`SUPPLY VEB//
`PAGES
`
`NE]
`
`T
`
`USER
`REQUEST T
`
`72
`
`EVALUATE J74
`
`REQUEST -
`
`NU
`
`SEND
`TRIGGER ?
`
`76
`
`r78
`SEND UNCRIPPLING
`TRIGGER DATA “ \1
`
`PETITIONER EX. 1005 Page 6
`
`
`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 5 0f 7
`
`5,892,825
`
`START
`
`12
`RAV DATAI GRAPHIC,
`TEXT, vInEn, AUDIT], /
`BINARY, HTML,APPLETS, /
`scRIPTs, APPLIcATInNs, ETC.
`
`INTERNET vEB PAGE LAYUUT
`14
`REsInEs [IN THE HusT sERvER,
`URL INFDRMATIDN IN PAGE /
`LAYDUT usEn Tu cREATE
`/
`A MAP FDR THE HYPER on.
`
`SDURCE DATA IS DIGITIZED
`10
`AND CRIPPLED, A TRIGGER FREIM
`A HDST SERVER IS REQUIRED //
`TU UNLDCK/UNCRIPPLE DATA. /
`T
`HYPERCD IS ENCEIDED \v/ITH
`16
`CRIPPLED DATA AND UNIQUE
`URL’S TD LDCATE SETURCE DATA /
`UN HYPERCD AND CLIENT’S VEB/
`PAGES UN HDST SERVER.
`T
`HYPERCD AUTOMATICALLY
`INVDKES CLIENTS WEB PAGE.
`
`/_,_~_‘18
`
`THE USER Is sENT A REQUESTED C: ____ __
`TRIGGER PRuM THE sERvER.
`"
`l
`T
`:
`INTERAcTIvE ,
`wEB PAGE |
`RESPEINSE {
`l
`l
`|
`-'- ————————— ——
`
`T
`THE TRIGGER 1:: THEN cuHBINEn
`WITH CRIPPLED suuRcE nATA
`22
`; THAT ALLDVS THE [JRIGINAL
`-'
`DATA Tu BE AccEssEn.
`T
`24 CETMBINED DATA IS ACCESSED [TN
`Q-w MUNITEIR AND SPEAKERS
`IN REAL TIME TD USER.
`
`ET" E5
`
`PETITIONER EX. 1005 Page 7
`
`
`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 6 0f 7
`
`5,892,825
`
`CRIPPLING SDURCE DATA '
`
`32
`
`DIGITIZING AND ENDDDING
`SUURCE DATA FDR HYPERCD »/ 30
`T
`T
`MAPPING URL'S TEI SUURCE
`DATA AND WEB SITE
`T
`ENCUDING CD WITH CRIPPLED
`SEIURCE DATA AND URL’S ’
`
`/-/34
`’
`
`E6
`
`40
`
`RECEIVING DR END USER'S PC,
`I
`USER INVUKES HYPERCD AND
`IS AUTOMATICALLY SENT //”“42
`TU PRUPER WEB SITE
`T
`USER REQUESTS DATA AND A f 44
`TRIGGER FREIM THE SERVER)
`IS SENT TU THE USER
`
`I
`THE TRIGGER LUCATES AND ’
`UNCRIPPLES THE SUURCE DATA
`I
`USER CAN Nnw ACCESS
`ORIGINAL SEIURCE DATA “W48
`I
`DIGITAL-ANALOGUE cuNvERTER1~/_\ 50
`
`46
`
`PETITIONER EX. 1005 Page 8
`
`
`
`U.S. Patent
`
`Apr. 6, 1999
`
`Sheet 7 0f 7
`
`5,892,825
`
`1\‘ SERVER
`
`,7
`
`’
`O #8
`
`CD-REIM
`
`HARD DRIVE]
`I /
`
`PETITIONER EX. 1005 Page 9
`
`
`
`1
`METHOD OF SECURE SERVER CONTROL
`OF LOCAL MEDIA VIA A TRIGGER
`THROUGH A NETWORK FOR INSTANT
`LOCAL ACCESS OF ENCRYPTED DATA ON
`LOCAL MEDIA
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`The present application is a continuation-in-part of appli
`cation Ser. No. 08/645,022, ?led on May 15, 1996 noW
`abandoned.
`A portion of the disclosure of this patent document
`contains material Which is subject to copyright protection.
`The copyright oWner has no objection to facsimile repro
`duction by anyone of the patent document or the patent
`disclosure, as it appears in the Patent & Trademark Office
`patent ?le or records, but otherWise reserves all copyright
`rights Whatsoever.
`
`BACKGROUND OF THE INVENTION
`
`The present invention is directed to a method of trans
`mitting “triggering data” over a netWork to cause video
`and/or audio information data on a CD-ROM at an end
`user’s computer to be made readable. In addition, the
`CD-ROM comprises program ?les for automatically dialing
`and connecting the end-user’s computer to a targeted host’s
`server using an operating system such as “WindoWs 95”.
`The CD-ROM Will only alloW the end-user access to the
`video/ and or audio on it by logging onto the host’s server via
`a netWork such as the Internet.
`The Internet is a conglomeration of computer netWorks
`that are linked together. Each netWork of the Internet may
`have one or more servers, and an operating system that may
`be different from that of others in the Internet. To link one
`netWork to another, and in order to overcome these operating
`differences betWeen computer netWorks, the Internet system
`utiliZes hardWare and softWare devices called: bridges,
`routers, and gateWays, all of Which adapt the information
`being sent on one netWork to the operating and protocol
`requirements of the receiving netWork. For example, a
`gateWay Will connect, or “splice” a netWork operating on the
`Novell protocol to a netWork that operates on a DECnet or
`SNA protocol.
`There are currently more than 10,000 computer netWorks
`that are linked together, WorldWide, Which together consti
`tute the “Internet”. Because they do not all operate on the
`same operating system, and because of different protocols,
`the data sent from one host computer of one netWork to a
`receiving computer of another netWork—Which may be
`many thousands of miles aWay from the host computer—
`may take a relatively long time, since the gateWays, bridges
`and routers must conform or adapt the protocol of the
`sending host computer to the receiving computer’s protocol.
`In addition to the time-delays associated With protocol
`variances, the Internet When connecting to an end-user via
`Plain Old Telephone Service (POTS), has a maximum
`data-transmission capacity of 3.6 kbytes per second, Which
`is not enough for sending video images in real time.
`The Internet system utiliZes tWo types of ?le-transfer
`protocols
`for copying a ?le from a host computer to
`the receiving computer: ASCII and binary. An ASCII ?le is
`a text ?le, While every other kind of ?le is binary. ASCII ?les
`are transmitted in seven-digit ASCII codes, While the binary
`?les are transmitted in binary code. Because all data stored
`in computer memory is stored in binary format, When one
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`5,892,825
`
`2
`sends a ?le in the Internet, it is sent in binary format.
`HoWever, as discussed above, oWing to the data
`transmission constraints imposed by the Internet system
`because of the differing operating systems, and a multitude
`of gateWays, routers, and bridges, the ?le data must be sent
`out in packets of a siZe no greater than 1536 bytes. Since the
`siZe of just a thirty-second video may be as great as 2.5
`megabytes, it may take up to one-half hour or more to send
`a thirty-second video over the Internet from a host computer
`to a receiving computer. Presently, there are compression
`techniques that compress the ?les in order to reduce this
`playback-time, Which data is decompressed at the receiving
`computer. An example of such a system is VDOLive,
`manufactured by VDOnet Corp. of Santa Clara, Calif.
`HoWever, these compression-systems still send the data in
`binary format, requiring packet-data siZes of no greater than
`1536 bytes. Thus, even With these compression-systems, the
`length of time to receive a thirty-second video over the
`Internet after being buffered in the user’s computer is near
`real time, but is unstable, choppy and drops as much as 96%
`of the video data over a conventional phone line.
`In the Internet, there is an electronic-mail delivery system
`called E-mail. The E-mail system utiliZes addresses to direct
`a message to the recipient, With each address having a
`mailbox code and a daemon, With the mail box and daemon
`being separated by the symbol @. In the E-mail delivery
`system, all of the messages or “mail” are routed through
`selected routers and gateWays, until it reaches What may be
`called a “post office” that services the recipient to Whom the
`electronic mail is to be delivered. The “post of?ce” is a local
`server. The need for these local “post of?ces” is because
`there is every reason to assume that the recipient-computer,
`to Which the mail is being sent, is either not poWered up, or
`is performing a different task. Since most computers in the
`Internet are not multi-tasking machines, such as, for
`example, computers running on the DOS operating system,
`if such a computer be engaged in performing a task, it is not
`possible for it to receive the E-mail data at that time. Thus,
`the local “post of?ce” or server stores the message until such
`a time as it may be delivered to the end-user to Whom it is
`intended.
`In the E-mail system, there has really been only one
`format standard for Internet messages. Avariation has been
`the MIME version, Which stands for Multipurpose Internet
`Mail Extensions, Which de?nes a neW header-?eld, Which is
`intended for use to send non-text messages, such as multi
`media messages that might include audio or images, by
`encoding the binary into seven-digit ASCII code. Before
`MIME, the limitation of E-mail systems Was the fact that it
`Would limit the contents of electronic mail messages to
`relatively short lines of seven-bit ASCII. This has forced
`users to convert any non-textual data that they may Wish to
`send into seven-bit bytes representable as printable ASCII
`characters before invoking a local mail UA (User Agent, a
`program With Which human users send and receive mail).
`Examples of such encodings currently used in the Internet
`include pure hexadecimal, uuencoded, the 3-in-4 base 64
`scheme speci?ed in RFC 1421, the AndreW Toolkit Repre
`sentation [ATK], and many others. Even though a user’s UA
`may not have the capability of dealing With the non-textual
`body part, the user might have some mechanism external to
`the UA that can extract useful information from the body
`part. Moreover, it does not alloW for the fact that the
`message may eventually be gateWayed back into an X.400
`message handling system (i.e., the X400 message is “tun
`neled” through Internet mail), Where the non-textual infor
`mation Would de?nitely become useful again. With MIME,
`
`PETITIONER EX. 1005 Page 10
`
`
`
`3
`video and/or audio data may be sent using the E-mail
`system. MIME uses a number of header-?elds, such as
`“Content-Type” header ?eld, Which can be used to specify
`the type and subtype of data in the body of a message and
`to fully specify the native representation (encoding) of such
`data; “text” Content-Type value header ?eld, Which an be
`used to represent textual information in a number of char
`acter sets and formatted teXt description languages in a
`standardiZed manner; “multi-part” Content-Type value,
`Which can be used to combine several body parts, possibly
`of differing types of data, into a single message; “applica
`tion” Content-Type value, Which an be used to transmit
`application data or binary data, and hence, among other
`users, to implement an electronic mail ?le transfer service;
`“message” Content-Type value, for encapsulating another
`mail message; “image” Content-Type value, for transmitting
`still image (picture) data; “audio” Content-Type value, for
`transmitting audio or voice data; “video” Content-Type
`value, for transmitting video or moving image data, possibly
`With audio as part of the composite video data format;
`“Content-Transfer-Encoding” header ?eld, Which can be
`used to specify an auXiliary encoding that Was applied to the
`data in order to alloW it to pass through mail transport
`mechanisms Which may have data or character set limita
`tions. TWo additional header ?elds may be used to further
`describe the data in a message body: The “Content-ID” and
`“Content Description” header ?elds.
`HoWever, there are considerable draWbacks and de?cien
`cies in transmitting video images and/or audio data over the
`Internet using E-mail’s MIME. Firstly, there is often con
`siderable time delays, such that it may take up to ten or more
`minutes to send a thirty-second video clip over the E-mail
`system. In times of high-traf?c usage, the delay may even be
`more than ten minutes. Secondly, the video image or audio
`data cannot be vieWed or listened to by the end-user, or
`recipient, until all of the data of the entire video or audio ?le
`has been received by the receiving computer, Which, also,
`adds a considerable time lag to the actual vieWing or
`listening. Thirdly, the end-user or recipient computer must
`have the necessary E-mail and MIME softWare for decoding
`the data. Fourthly, since MIME is an E-mail protocol
`system, the data is transmitted via the E-mail system,
`meaning that it is routed through one or more post of?ces
`and servers, Which delay the transmission of the data, and
`Which require that no other task be performed by the
`receiving computer if it is a single-tasking machine, like
`DOS-operating system machines. Fifthly, like all E-mail
`deliveries, the requisite E-mail softWare at the recipient
`computer must decode the encoded data received, and then
`cut-and-paste the data into a neW ?le, such as NOTEPAD,
`Which is time-consuming, before the neW ?le is played back
`by a vieWer or player.
`In commonly-oWned application Ser. No. 08/568,631,
`?led on Dec. 7, 1995, noW abandoned there is disclosed a
`“catcher”, Which is a method and softWare code for catching
`a stream of data at a personal computer from the Internet for
`alloWing substantially instant playback thereof by the per
`sonal computer, Which “catcher” is utiliZed in the invention
`of the present application, as set forth hereinbeloW.
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`SUMMARY OF THE INVENTION
`It is the primary objective of the present invention to
`separate keys and data by providing a CD-ROM having its
`informational data of video and/or audio that is crippled,
`Which data may only be read after it has been “uncrippled”
`by receiving “uncrippling” triggering data over the Internet
`from a server of a host system, so that a company’s host
`
`65
`
`5,892,825
`
`4
`computer serving the Internet may transmit the “uncrip
`pling” data over the Internet to an end-user’s receiving
`computer in order to uncripple and, thereby, actuate the
`CD-ROM, so that the data thereon may be read by the
`end-user’s receiving computer only in volatile memory such
`as RAM.
`It is another objective of the present invention to enable
`server control of the local media data by providing such a
`“crippled” CD-ROM With video and/or audio data thereon,
`Whereby content by a company on the Internet may be better
`controlled, and Whereby in conjunction With the content,
`video and/or audio playback may be combined With any
`updated, teXtual information, such as current price of a
`product or products, location of a store or stores in the
`vicinity of the end-user’s residence, etc. Speci?c tracks on
`the CD-ROM can thereby be controlled by the remote
`server.
`It is another objective of the present invention to provide
`such a “crippled” CD-ROM With video and/or audio data
`thereon, Whereby the CD-ROM is inherently provided With
`Internet start-up and connecting program that automatically
`and directly connects the end-user’s computer to the com
`pany’s or content provider’s host server via the Internet,
`Whereby, not only does such facilitate and encourage the
`connection of the end-user to the content provider’s Web
`page, but also provides the content provider With valuable
`marketing information, such as the physical location of the
`caller, Whereby selected information unique to that caller
`may be doWnloaded to him over the Internet, such as name
`and addresses of stores of the company or advertiser nearest
`to the caller, etc.
`It is another objective of the present invention to provide
`such video imaging, With or Without audio, such that the use
`of the E-mail system or the Internet system itself is entirely
`obviated.
`It is another objective of the present invention to provide
`such video imaging, With or Without audio, such that the data
`representing the video and/or audio is accessed off the
`end-user’s CD-ROM, With the transmitted de-crippling trig
`gering data from the content provider’s host server (URL)
`being a trigger as small as a feW bytes.
`It is another objective of the present invention to alloW by
`server permission only, the end-user the ability to store said
`trigger on non-volatile media for permanent oWnership of
`said data.
`ToWard these and other ends, the method of the invention
`for transmitting the de-crippling triggering data for video
`and/or audio off a CD-ROM (“HyperCD”) over the Internet
`consists of encoding the data representing critical informa
`tion of the ?le keys such as the header of the video/audio
`?les on the CD-ROM, and transmitting that encoded key to
`the local server of the local Web of the Internet serving the
`caller, or end-user computer. The local server then estab
`lishes a point-to-point socket-connection betWeen the
`transmitting, host computer, and the receiving or end-user
`computer, thereby obviating the need to send the actual
`video data over the Internet. When the encoded key is
`received by the receiving, or end-user, computer, the data is
`decoded and matched to the video/audio ?les of the
`CD-ROM, Whereupon, since the data ?les on the CD-ROM
`noW have an associated and complete header, the data
`thereof may be read, to thus alloW the instant playback of the
`video-audio data on the CD-ROM.
`Since the encoded header data that is sent over the Internet
`is a necessity before the end-user may playback the video/
`audio data from the CD-ROM, the host computer may send
`
`PETITIONER EX. 1005 Page 11
`
`
`
`5,892,825
`
`5
`along With the encoded data, additional information perti
`nent to the information contained on the CD-ROM, such as
`current prices, special offers or deals, locations of local
`stores or dealers, or any information that the host computer,
`content provider, Would like the end-user to receive.
`In order to encourage the end-user to vieW the video/
`audio, the CD-ROM is provided With its oWn Internet
`dial-up program ?les for connecting to the host Web server,
`so that very little time and effort is required on the part of the
`end-user.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The invention Will be more readily understood With
`reference to the accompanying draWings, Wherein:
`FIG. 1 is a pictorial representations of the hardWare
`systems and softWare processes used for carrying out the
`present invention;
`FIG. 2 is a block diagram shoWing the hardWare of the
`end-user’s computer used for carrying out the present inven
`tion;
`FIG. 3 is a How chart at a user’s computer for accessing
`the trigger-data from a Web-site;
`FIG. 4 is a How chart for the server associated With the
`Internet for evaluating the trigger-request from the user’s
`computer and for sending the trigger;
`FIG. 5 is a block diagram shoWing the socket-to-socket
`connection for transmitting the de-crippling, triggering key
`for causing the display of the video images and/or audio data
`of a “HyperCD” at the end-user’s PC over the Internet from
`a host computer combined With a targeted URL to a recipient
`or end-user’s computer;
`FIG. 6 is a block diagram shoWing the steps for forming
`on the CD-ROM the encoded video and audio data for use
`by the end-user recipient computer after having been
`crippled by removing the header-triggering key sent from
`the media ?les;
`FIG. 7 is a block diagram shoWing the process of trig
`gering in order to invoke “HyperCD” video and/or audio
`data at the receiving computer for playback; and
`FIG. 8 is a pictorial representation of the hardWare
`component and softWare processing involved.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`Referring noW to the draWings in greater detail, and to
`FIGS. 1 and 2 for noW, the hardWare used to carry out the
`present invention is shoWn. All of the hardWare is conven
`tional and Well-knoWn, and includes an end-user computer
`1 having a CD-ROM drive 2 for playing a CD-ROM 3
`having stored thereon crippled data 4 that is unreadable
`Without ?rst having received a trigger or uncrippling key 5.
`The end-user’s computer 1 is connected via the Internet 6 to
`a host-computer server 7 Which has stored thereat the
`uncrippling or triggering key 5 for the information stored on
`the end-user’s CD-ROM 3. The end-user’s computer 1 has
`a display and a CPU 9 and a communication-device, such as
`a modem 10 for establishing communication With the Inter
`net 6. The computer 1 also has the CD-ROM drive 2,
`hard-drive 11, RAM 13, and video system 8 including
`monitor as Well as audio system 13.
`Referring to FIG. 3, there is shoWn the How charts for
`receiving the uncrippling key. The end-user ?rst submits a
`request over the Internet for the uncrippling key (block 60).
`The user then Waits for that key (block 62), and if the user
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`6
`is not authoriZed, the request is denied. If the request is
`authoriZed, then the uncrippling key is sent by the server and
`received by the end-user’s computer (block 64), Whereupon
`the end-user’s computer directs the uncrippling key into
`volatile memory such as RAM, not into a RAM-disk to be
`visible, but saved in a dynamically allocated data structure
`in RAM accessible only by the receiving program, com
`bined With crippled data read from the CD-ROM and
`displays the video/animation (block 68).
`FIG. 4 shoWs the process-?oW that at the server side. The
`server conventionally provides the Web pages to the Internet
`users (block 70), and aWaits a user-request (block 72). If a
`request is received from an end-user’s computer, the server
`evaluates the request (block 74) in order to authoriZe the
`transfer of the uncrippling key (block 76). If an authoriZation
`is granted, then the uncrippling, trigger key is sent (block
`78).
`Referring noW to FIGS. 5—7, video images and/or audio
`are converted from analogue to digital and stored in crippled
`fashion in digitiZed format (block 10) on CD-ROM 3. The
`crippling of the CD-ROM is achieved by removing critical
`information such as the video-audio header, Whereupon such
`video/audio data is rendered unreadable by the end-user’s
`computer. The “HyperCD” 3 is provided With the URL (Web
`page) of the designated host computer, or server, (block 14),
`such, as for example: http://tekWeb.com/hypercd/adver/
`lotto.html, Which may be used on the CD-ROM for the
`Illinois Instant Lottery video advertising. Such digitiZed
`format may be eXisting computer memory ?les (block 12)
`that are already in binary format, or may be original ?les
`originated by recording the video and/or audio, as by a
`camcorder or tape, etc., and converting the analogue signals
`into digital, or binary, code. In the case of originating ?les,
`the analogue data may be converted to digital data using an
`INTEL “Smart Video Reorder Pro”, for eXample. The raW
`binary data that is stored on the “HyperCD” (block 16) is
`crippled, so the only Way to access the data is a socket-to
`socket connection With the server of the Web page of the
`host. By means of the process performed in block 14, the
`CD-ROM contains a code representing the URL Web page
`of the host computer Where the necessary de-crippling key
`is located. This data on the CD-ROM 3 Will automatically
`call up and connect the end-user’s computer to the host
`computer’s server 7 on the Internet, Whereby a socket-to
`socket connection is made therebetWeen (block 18). Such an
`automatic connection is Well-knoWn, and Will automatically
`?nd the end-user’s broWser, Will call the Internet service
`provider, and pass the necessary links from the CD-ROM to
`the broWser in order to get to the host’s Web page. Such
`softWare is available on the “WindoWs 95” operating
`system, such as “ActiveX”. The host computer then sends
`back to the local server serving the end-user’s computer the
`necessary, decrippling trigger for the speci?c video/audio
`data on the end-user’s CD-ROM (block 20). From the local
`server, the data is sent out directly over the Internet to the
`end-user, and, in particular, to the RAM 12 of the end-user’s
`computer (block 22). In RAM, the trigger (block 22), and the
`data on the CD-ROM 3 are combined, and played back
`(block 24), as described above. HoWever, as Will be
`eXplained hereinbeloW, since the key 5 is being sent via
`Internet 6, the end-user’s computer 7 must be equipped With
`the requisite softWare Which is capable of receiving data
`from the server 7 and Which Will ensure that the received
`encoded key 5 is placed safely in RAM 12, and not alloWed
`to be otherWise saved in hard drive 11 Where it may be
`captured and used in a Way not authoriZed by the server 7.
`Referring to FIG. 6, at the end-user computer end, the raW
`analogue data of the audio/video is digitiZed (block 30), as
`
`PETITIONER EX. 1005 Page 12
`
`
`
`8
`the correct track of the CD-ROM (block 48), from Which the
`data passes to the audio/video subsystem (8,13, FIG. 2), in
`order to play the video or audio (block 50). It is noted, and
`emphasiZed, that as soon as the key has been decoded, the
`video and/or audio data is immediately “played” back by the
`audio/video subsystems (8,13, FIG. 2), bypassing the neces
`sity of having to ?rst store the key, or other trigger, on a hard
`drive before playback.
`Referring speci?cally to FIG. 8, there are shoWn the
`server 1, the user computer 2, and the softWare processes 3
`used for transmitting the uncrippling key 4 over a netWork
`5, the combining in RAM 6 of the key 4 and crippled data
`7 from the CD-ROM 8, the rendering or displaying of the
`media data 9 such as video/audio or animation on the display
`10 or from the audio system 11, and the storing of the key
`4 to non-volatile media 13, such as a hard drive, for
`permanent oWnership of the encrypted CD media.
`It is noted that it is possible to “cripple” the video/audio
`data on the CD-ROM by other means other than deleting the
`header thereof. For example, the ?le could be made a hidden
`?le, With the trigger data from the host computer being a
`command to remove the hidden status. Alternatively, the
`video/audio ?le could have a changed extension, With the
`trigger data from the host computer being a command to
`change the extension. Moreover, the crippling of the video/
`audio ?le may be achieved by the use of ZIP ?le, With the
`trigger data from the host computer being a command to
`UNZIP the data. It is, also, Within the scope and purvieW of
`the invention to use a ?oppy disk for storing the crippled ?le,
`as described above, for those applications requiring less
`disk-memory, With the uncrippling data from the host server
`being sent to the ?oppy-disk drive via the catcher program,
`as described above for uncrippling the data on the ?oppy
`disk. Of course, the crippled ?le may also be stored on any
`storage medium, such as the hard drive 11, With the uncrip
`pling data from the host server being sent to the drive for that
`storage