throbber
(19)
`
`(12)
`
`Europäisches Patentamt
`
`European Patent Office
`
`Office européen des brevets
`
`*EP001558032A2*
`EP 1 558 032 A2
`
`(11)
`
`EUROPEAN PATENT APPLICATION
`
`(43) Date of publication:
`27.07.2005 Bulletin 2005/30
`
`(21) Application number: 05250326.5
`
`(22) Date of filing: 24.01.2005
`
`(84) Designated Contracting States:
`AT BE BG CH CY CZ DE DK EE ES FI FR GB GR
`HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR
`Designated Extension States:
`AL BA HR LV MK YU
`
`(30) Priority: 22.01.2004 US 538602 P
`
`(71) Applicant: Widevine Technologies, Inc.
`Seattle, WA 98164 (US)
`
`(54)
`
`Piracy prevention system
`
`(57)
`System, apparatus, and methods are directed
`to preventing a media player from playing a pirated me-
`dia file, such as a pre-release motion picture. The inven-
`tion treats the pirated media file as an infection and de-
`velops an immune system for the media player. The in-
`vention may be taught how to recognize an infection by
`using an immunization record for each media file that is
`to be treated as an infection. As the media file is played
`in real-time, a fingerprint is determined (408). A compar-
`
`(51) Int Cl.7: H04N 5/913
`
`(72) Inventor: The designation of the inventor has not
`yet been filed
`
`(74) Representative: Williams, David John et al
`Page White & Farrer,
`54 Doughty Street
`London WC1N 2LS (GB)
`
`ison is performed between the immunization records
`and the determined fingerprint (410). If a match is de-
`termined (412), then an alert may be provided (414).
`The alert may be employed to perform any of a variety
`of actions, including disabling the media player, sending
`a message to an owner of a digital right for the media
`file, and the like.
`
`Printed by Jouve, 75001 PARIS (FR)
`
`EP1 558 032A2
`
`EX1037
`Roku V. Media Chain
`U.S. Patent No. 10,489,560
`
`

`

`1
`
`EP 1 558 032 A2
`
`2
`
`Description
`
`CROSS-REFERENCE TO RELATED APPLICATIONS
`
`[0001] This application claims the benefit of U.S. Pro-
`visional Application Serial No. 60/538,602 filed on Jan-
`uary 22, 2004, the benefit of the earlier filing date of
`which is hereby claimed under 35 U.S.C. § 119(e) and
`further incorporated by reference.
`
`FIELD OF THE INVENTION
`
`[0002] The present invention relates to digital piracy
`prevention, and more particularly, but not exclusively, to
`a system and method for detecting pirated motion pic-
`tures prior to a home entertainment release date.
`
`BACKGROUND OF THE INVENTION
`
`[0003] Motion picture piracy is a significant problem.
`Pirates are known to produce and sell Video Compact
`Discs (VCDs) and Digital Versatile Discs (DVDs) of mo-
`tion pictures prior to the official home entertainment re-
`lease. Recently, VCD and DVD piracy has become a
`multi-billion dollar business. Digital copies of motion pic-
`tures are also often freely distributed on the Internet, fur-
`ther reducing the value of the motion picture release. As
`a result, motion picture studios have lost revenue due
`to this piracy.
`[0004] Motion pictures are typically released and dis-
`tributed in phases and/or into different geographic mar-
`kets. Motion picture prints, however, may be expensive
`to produce - typically, around $3,000 to around $5,000
`per print. Therefore, often a set of prints might be pro-
`duced for a U.S. release and then the same set of prints
`might be sent to a foreign market. After the earning from
`the theatrical release may be achieved, the picture may
`be released to a home entertainment market on video
`tape, DVD, and so forth. Currently, the motion picture
`industry business relies upon this phased distribution
`model. However, the 35 mm film format is inherently un-
`securable. Film prints of motion pictures are often re-
`leased to theaters around the world where some prints
`are freely copied in any one of several ways. For exam-
`ple, some prints are copied via camming (using a hand
`held camcorder that is smuggled into the theater), tele-
`syncing (camming from a tripod in the centre of the
`theater and synced to an audio track recorded from the
`projection room), or telecine (the print is transferred to
`video). Pirated copies of the motion picture may then be
`transferred to computing device and sent virtually
`around the world in minutes using the Internet. At the
`'other end,' the pirated motion pictures may be trans-
`ferred to another medium, such as a DVD and VCD. The
`pirated motion pictures may also be played directly by
`an end media player. Such actions have made it difficult
`to reduce the amount of piracy.
`[0005] Moreover, there are several types of media
`
`players available to play back pirated motion pictures.
`For example, VCDs can be played in many DVD play-
`ers. Also, some of the more sophisticated pirates are
`now producing pirated movies onto DVD. Therefore, it
`is with respect to these considerations and others that
`the present invention has been made.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0006] Non-limiting and non-exhaustive embodi-
`ments of the present invention are described with refer-
`ence to the following drawings. In the drawings, like ref-
`erence numerals refer to like parts throughout the vari-
`ous figures unless otherwise specified.
`[0007] For a better understanding of the present in-
`vention, reference will be made to the following Detailed
`Description of the Invention, which is to be read in as-
`sociation with the accompanying drawings, wherein:
`
`FIGURE 1 shows a functional block diagram illus-
`trating one embodiment of an environment for prac-
`ticing the invention;
`FIGURE 2 shows one embodiment of a media play-
`er that may be included in a system implementing
`the invention;
`FIGURE 3 shows a logical block diagram illustrating
`one embodiment of components of a Piracy Immu-
`nity Manager (PIM) for use in the media player of
`FIGURE 2; and
`FIGURE 4 illustrates a logical flow diagram gener-
`ally showing one embodiment of a process for man-
`aging access to a media file, in accordance with the
`present invention.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`[0008] The present invention now will be described
`more fully hereinafter with reference to the accompany-
`ing drawings, which form a part hereof, and which show,
`by way of illustration, specific exemplary embodiments
`by which the invention may be practiced. This invention
`may, however, be embodied in many different forms and
`should not be construed as limited to the embodiments
`set forth herein; rather, these embodiments are provided
`so that this disclosure will be thorough and complete,
`and will fully convey the scope of the invention to those
`skilled in the art. Among other things, the present inven-
`tion may be embodied as methods or devices. Accord-
`ingly, the present invention may take the form of an en-
`tirely hardware embodiment, an entirely software em-
`bodiment or an embodiment combining software and
`hardware aspects. The following detailed description is,
`therefore, not to be taken in a limiting sense.
`[0009] Briefly stated, the present invention is directed
`to preventing a media player from playing a pirated me-
`dia file, such as a pre-release motion picture, audio file,
`graphics file, and the like. That is, an intent of the inven-
`tion includes enabling a media player to recognize a
`
`40
`
`45
`
`50
`
`55
`
`2
`
`

`

`3
`
`EP 1 558 032 A2
`
`4
`
`piece of content (e.g., some or all of the media file) and
`to prevent its playback until its home entertainment re-
`lease date. The invention treats the pirated media file
`as an infection and develops an immune system for the
`media player. A process of immunization is established
`where the immune system is taught how to recognize
`an infection. In one embodiment, the immune system is
`taught by loading it with an immunization record for each
`media file that is to be treated as an infection. As the
`media file is played by the media player, a fingerprint is
`determined. A comparison is performed between the im-
`munization records and the determined fingerprint. In
`one embodiment, the comparison is based, at least in
`part, on a weighted comparison of digital components
`of the fingerprint, with a match being based, in part, on
`satisfying a pre-determined confidence level. If a match
`is determined, then an alert is provided. The alert may
`be employed to perform any of a variety of actions, in-
`cluding disabling the media player, sending a message
`to an owner of a digital right associated with the media
`file, and the like. In addition, updates to the immuniza-
`tion records may be performed over a network, a DVD,
`a VCD, and the like. In one embodiment, an immuniza-
`tion record store is periodically scanned; expunging any
`identified expired immunization records, and requesting
`an update of the immunization record store to be per-
`formed. In another embodiment, the media player is
`configured to be unable to access a media file, until an
`update is performed.
`
`Illustrative Operating Environment
`
`[0010] FIGURE 1 illustrates one embodiment of an
`environment in which the present invention may oper-
`ate. However, not all of these components may be re-
`quired to practice the invention, and variations in the ar-
`rangement and type of the components may be made
`without departing from the spirit or scope of the inven-
`tion.
`[0011] As shown in the figure, environment 100 in-
`cludes Immunization Record Server (IRS) 102, pirated
`source 104, network 105, legitimate media file/Immuni-
`zation Record (LM/IR) 106, pirated media file 108, and
`media player 110.
`[0012] Network 105 is in communication with IRS 102,
`pirated source 104, and media player 110. LM/IR 106 is
`in communication with IRS 102 and media player 110,
`while pirated media file 108 is in communication with pi-
`rated source 104 and media player 110.
`[0013] Media player 110 is described in more detail
`below in conjunction with FIGURES 2-3. Briefly, howev-
`er, media player 110 includes virtually any device that is
`configured to enable receive and play a media file, in-
`cluding, but not limited to television appliances, digital
`recorders, set-top boxes, cellular phones, mobile devic-
`es, personal digital assistants (PDAs), personal com-
`puters, jukeboxes, hybrid Internet-music-player/home-
`stereo-component-system, and the like. Media player
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`3
`
`110 may further be configured to receive an immuniza-
`tion record and employ the immunization record to de-
`termine whether a media file is to be treated as an in-
`fection.
`[0014]
`In one embodiment, a media file may represent
`a pre-release, geographic release, and the like, of a mo-
`tion picture. Pre-releases may include a release of a mo-
`tion picture that is configured to be viewed by a pre-de-
`termined number of viewers, such as designated
`screeners, movie critics, test audiences, and the like.
`After a period of time, pre-releases are typically re-
`placed by formal releases, such as home entertainment
`releases, and the like. Geographic releases may include
`a motion picture release that is configured to be re-
`leased to a pre-defined geographic location of the world,
`such as the west coast of the United States, the United
`States, Europe, Southeast Asia, and the like. Such ge-
`ographic releases are typically not intended for audi-
`ence viewing outside of the pre-defined geographic lo-
`cation. Media files are not restricted to these descrip-
`tions, however, and may include virtually any digital con-
`tent that is configured to have a restriction placed upon
`it, such as time, location, and the like. Unfortunately,
`such pre-releases, geographic releases, and the like,
`may be pirated using a variety of mechanisms, and sent
`to audiences other than those that were originally in-
`tended to view the media file. Thus, as shown in FIG-
`URE 1, pirated source 104 represents virtually any
`source of a media file that is considered to be improperly
`obtained.
`[0015] Media files include data files that may be for-
`matted using any of a variety of digital formats that in-
`clude audio and/or image information. Audio files may
`be, for example, computer files that include computer
`code, which encodes audio information such as music,
`speech, sound effects, and the like. Audio file formats
`currently popular and frequently encountered include
`'wave' files (*.wav), MP3 files (*.mp3), liquid audio files
`(*.lqt), Real AudioTM (*.rm, *.ram), and the like. Image
`files may include still images and 'moving' images (here-
`after referred to generally as 'video'). Still images may
`include, for example, textual files, photographs, draw-
`ings, paintings,
`trademarks,
`logos, designs, and so
`forth. Video files may include, for example, computer
`files, which include computer code encodings of a series
`of images that may be viewed in rapid succession to cre-
`ate an illusion of motion. Video files formats may include
`MPEG (*.mpg) files, QuickTime (*.qt) files, Vivo (*.viv)
`files, Real VideoTM (*.rm), and so forth. Some of these
`file formats (Real AudioTM and Real VideoTM, for ex-
`ample) can be downloaded as streaming audio and/or
`video that is played in real-time. Other file formats may
`be downloaded in their entirety and stored locally for
`playing and/or for further redistribution at a future time
`after downloading. Similarly, such media files may be
`configured and stored on a variety of mediums, DVD,
`VCD, high definition DVD, Super Video CD (SVCD), Su-
`per Audio CD (SACD), and the like.
`
`

`

`5
`
`EP 1 558 032 A2
`
`6
`
`[0016] As shown in FIGURE 1, pirated media file 108
`represents one embodiment of an improperly obtained
`media file stored on a tangible medium such as de-
`scribed above. Pirated media files may also be provided
`by pirated source 104 using virtually any other mecha-
`nisms, including transporting the pirated media file over
`a network, such as network 105.
`[0017] Network 105 is enabled to employ any form of
`computer readable media for communicating informa-
`tion from one electronic device to another. Also, network
`105 can include the Internet in addition to local area net-
`works (LANs), wide area networks (WANs), direct con-
`nections, such as through a universal serial bus (USB)
`port, other forms of computer-readable media, or any
`combination thereof. On an interconnected set of LANs,
`including those based on differing architectures and pro-
`tocols, a router acts as a link between LANs, enabling
`messages to be sent from one to another. Also, com-
`munication links within LANs typically include twisted
`wire pair or coaxial cable, while communication links be-
`tween networks may utilize analog telephone lines, full
`or fractional dedicated digital lines including T1, T2, T3,
`and T4, Integrated Services Digital Networks (ISDNs),
`Digital Subscriber Lines (DSLs), wireless links including
`satellite links, or other communications links known to
`those skilled in the art. Furthermore, remote computers
`and other related electronic devices could be remotely
`connected to either LANs or WANs via a modem and
`temporary telephone link. In essence, network 105 in-
`cludes any communication method by which information
`may travel between IRS 102, pirated source 104, media
`player 110, and another computing device. Further-
`more, the number of WANs, and LANs in FIGURE 1 may
`be increased or decreased arbitrarily.
`[0018] The media used to transmit information in com-
`munication links as described above illustrates one type
`of computer-readable media, namely communication
`media. Generally, computer-readable media includes
`any media that can be accessed by a computing device.
`Computer-readable media may include computer stor-
`age media, communication media, or any combination
`thereof.
`[0019] Additionally, communication media typically
`embodies computer-readable instructions, data struc-
`tures, program modules, or other data in a modulated
`data signal such as a carrier wave or other transport
`mechanism and includes any information delivery me-
`dia. The terms "modulated data signal," and "carrier-
`wave signal" includes a signal that has one or more of
`its characteristics set or changed in such a manner as
`to encode information, instructions, data, and the like,
`in the signal. By way of example, communication media
`includes wired media such as twisted pair, coaxial cable,
`fiber optics, wave guides, and other wired media and
`wireless media such as acoustic, RF, infrared, and other
`wireless media.
`[0020]
`IRS 102 may include virtually any device that
`is configured to provide an immunization record associ-
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`4
`
`ated with a media file. Devices that may operate as IRS
`102 include personal computers desktop computers,
`multiprocessor systems, microprocessor-based or pro-
`grammable consumer electronics, network PCs, serv-
`ers, and the like.
`[0021]
`IRS 102 may provide the immunization record
`to media player 110 using any of a variety of mecha-
`nisms. For example, IRS 102 may insert the immuniza-
`tion record onto a DVD, high definition DVD, Super Vid-
`eo CD (SVCD), VCD, Super Audio CD (SACD), and the
`like, represented by LM/IR 106. Such medium may fur-
`ther include an unrelated media file. For example, a
`DVD may include an immunization associated with one
`media file, such as movie "A," and also include a differ-
`ent unrelated media file, such as a promotion for movie
`"B." IRS 102 may also provide the immunization to me-
`dia player 110 over a network, such as network 105.
`[0022]
`In the present invention, an improperly ob-
`tained media file, such as a pre-release, geographic re-
`lease motion picture, and the like, may be viewed as an
`infection by media player 110. Thus, for example, a mo-
`tion picture media file that has not yet had its home en-
`tertainment release is generally considered to be an in-
`fection. Typically, there are a relatively small number of
`infections that the present invention may need to guard
`against. For example, the seven most prominent Holly-
`wood studios typically make approximately 20 motion
`pictures each year. In most cases, the home entertain-
`ment releases for each motion picture is between about
`six to twelve months after the theatrical release. As a
`result, enabling the present invention to guard against
`approximately 200 infections may be sufficient. Howev-
`er, the invention is not constrained to these numbers,
`and may be configured to manage virtually any number
`of infections.
`[0023] To manage a response to an infection, IRS 102
`may be configured to determine an immunization record
`from a legitimate (e.g., authorized) media file. A typical
`immunization record may include, for example, a com-
`pact fingerprint of a motion picture, or other media file,
`in pre-release, geographic release, and the like, and a
`home entertainment release date, or similar appropriate
`release date upon which the media file may no longer
`be considered as an infection by media player 110. The
`immunization record may expire once the media file's
`determined to no longer be considered an infection.
`That is, for example, where the media file is a motion
`picture, the immunization may expire once the motion
`picture is in home entertainment release.
`[0024] A typical immunization record may include a
`variety of fields, each of which may be of various sizes.
`For example, where the media file represents pre-re-
`lease content, a home entertainment release date might
`be included that is about four bytes, a media file title
`Identifier might be also included that is about 32 bytes,
`and so forth. Also, a typical fingerprint might also be in-
`cluded that is between about 8 and about 800 kilobytes
`depending on a resolution, level of confidence desired
`
`

`

`7
`
`EP 1 558 032 A2
`
`8
`
`for determining a match, a type of mechanism employed
`to determine the fingerprint, and the like.
`[0025] The fingerprint within the immunization record
`represents a unique signature of the media file that is
`generally invariant to a variety of distorting transforma-
`tions that may arise due to pirating, including, zooming,
`panning, cropping, trapezoidal distortions, frame rate
`variations, color gamut changes, compression, trans-
`coding, and the like.
`[0026] The fingerprint may be derived from using any
`of a variety of mechanisms that may sample and ana-
`lyze a media file. Such mechanisms may include, for ex-
`ample, those that are described in co-pending U.S. Pat-
`ent Application, Serial Number 09/988,824, entitled
`"Media Tracking System and Method," filed November
`20, 2001, which is incorporated herein by reference.
`Such mechanisms may include, for example, deriving
`the fingerprint based on a word count calculated for
`each of selected image or group of images, within the
`media file. The fingerprint may also be generated using
`a word count per groups of pictures (also referred to as
`"GOPs") that may be plotted over a pre-determined
`length of the media file. In one embodiment, a waveform
`may be derived from this data that may be used to gen-
`erate a unique media file identifier for use as a finger-
`print. For instance, an energy level over time may be
`determined for the waveform, and employed to generate
`a fingerprint. Fingerprints may also include identifiers
`generated by a data set called an 'image vector,' for
`each image or selected images of the media file. How-
`ever, the invention is not limited to these examples, and
`virtually any mechanism may be employed that is invar-
`iant to at least the above mentioned concerns.
`
`Illustrative Media Player
`
`[0027] FIGURE 2 shows one embodiment of a media
`player employing an immune system, according to one
`embodiment of the invention. Media player 200 may in-
`clude many more or less components than those shown.
`The components shown, however, are sufficient to dis-
`close an illustrative embodiment for practicing the inven-
`tion.
`[0028] Media player 200 includes processing unit
`212, and mass memory, each of which is in communi-
`cation with each other via bus 222. The mass memory
`generally includes RAM 216, ROM 232, and one or
`more permanent mass storage devices, such as media
`drive 228. The mass memory stores may store operat-
`ing system 220 for controlling the operation of media
`player 200. Any general-purpose operating system may
`be employed. Media player 200 may also employ a spe-
`cial-purpose operating system. RAM 216 may also in-
`clude one or more applications 250 that may enable me-
`dia player 200 to perform a variety of actions, including
`recording of a media file, rewinding a media file, fast for-
`warding the media file, enabling a streaming media file
`to be received, and the like. Applications 250 may also
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`5
`
`enable virtually any other actions including enabling
`email, and other communications with another comput-
`ing device, and the like.
`[0029] Basic input/output system ("BIOS") 218 may
`also be provided for controlling the low-level operation
`of media player 200. As illustrated in FIGURE 2, media
`player 200 also can communicate with the Internet, or
`some other communications network, such as network
`105 in FIGURE 1, via network interface unit 210, which
`is constructed for use with various communication pro-
`tocols including the UDP/IP, TCP/IP protocols. Howev-
`er, the invention is not limited to these protocols, and
`virtually any network protocol may be employed. Net-
`work interface unit 210 is sometimes known as a trans-
`ceiver,
`transceiving device, network interface card
`(NIC), and the like.
`[0030] Media player 200 also includes input/output in-
`terface 224 for communicating with external devices,
`such as a mouse, keyboard, television, display device,
`or other input/output devices not shown in FIGURE 2.
`[0031] Media drive 228 includes virtually any device
`and related software that is configured to receive a me-
`dia file on a pre-determined content medium. Such de-
`vices include, but are not limited to, a DVD drive, high
`definition DVD drive, Super Video CD (SVCD) drive,
`VCD drive, Super Audio CD (SACD) drive, and other
`content media devices. For example, media drive 228
`may also be Dynamic Digital Sound (DDS) drive. More-
`over, media drive 228 may also support write capabili-
`ties, such as through a DVD/RW drive, and the like. Me-
`dia drive 228, however, is not limited to DVD, and CD
`technologies and virtually any other digital media tech-
`nology may be employed without departing from the
`scope of spirit of the present invention.
`[0032] Media drive 228 may also include capabilities
`to enable a media file to be erased, destroyed, written
`over, and the like. Media drive 228 may receive an in-
`struction, event, and the like, from PIM 252 that directs
`it to disable itself from further reads of the media file,
`destroy the media file, and the like.
`[0033] PIM 252 is described in more detail below in
`conjunction with FIGURE 3. Briefly, however, PIM 252
`is configured to treat pirated media files as an infection.
`PIM 252 may be taught about possible infections, by
`loading it with an immunization record for each infection.
`PIM 252 may update a store of the immunization records
`over a network, such as illustrated in FIGURE 1, a DVD,
`and the like, such as LM/IR 106 of FIGURE 1, and the
`like. PIM 252 may then employ the immunization record
`to monitor media files to determine if the media file is an
`infection. If it is determined to be an infection, PIM 252
`may then provide a pre-determined alert, message, ac-
`tion, a true/false indication of a pirated media file, and
`the like. In one embodiment, the alert is provided in em-
`ploying any of a variety of secure communication mech-
`anisms. For example, at power up of PIM 300, or upon
`a similar event, PIM 300 may establish a secure com-
`munication channel to a component of media player 200
`
`

`

`9
`
`EP 1 558 032 A2
`
`10
`
`for the receipt of immunization records and for issuing
`of the alerts.
`[0034] PIM 252 may be implemented as part of an ap-
`plication that provides client side monitoring of media
`files. PIM 252 can also be implemented in an integrated
`circuit, part of a silicon core, and the like, within media
`player 200. In one embodiment, PIM 252 could be li-
`censed to a manufacturer of media player 200. In an-
`other embodiment, PIM 252 may be downloaded as an
`application into PIM 252, from another medium, such as
`a DVD, over a network, and the like.
`[0035] FIGURE 3 shows a logical block diagram illus-
`trating one embodiment of components of the Piracy Im-
`munity Manager (PIM) of FIGURE 2. PIM 300 of FIG-
`URE 3 may include many more or less components than
`those shown. The components shown, however, are
`sufficient to disclose an illustrative embodiment for prac-
`ticing the invention. Moreover, PIM 300 may employ a
`process such as described below in conjunction with
`FIGURE 4 to perform actions.
`[0036] As shown, PIM 300 includes immunity system
`controller 302, fingerprinter 304, secure immunization
`record store 306, fingerprinter comparator 308, and se-
`cure real-time clock 310. Immunity system controller
`302 is in communication with fingerprinter 304, secure
`immunization record store 306, fingerprinter comparator
`308, and secure real-time clock 310. Fingerprinter 304
`and secure immunization record store 306 are each in
`further communication with fingerprinter comparator
`308. Secure real-time clock 310 is also in communica-
`tion with fingerprinter comparator 308.
`[0037]
`Immunity system controller 302 is configured
`to manage actions of other components within PIM 300,
`including providing timing signals, event instructions,
`and the like. In one embodiment, immunity system con-
`troller 302 may include an operating system, applica-
`tion, and the like, for managing actions of the other com-
`ponents.
`[0038] Secure immunization record store 306 in-
`cludes virtually mechanism configured to receive and
`securely store immunization records, including a data-
`base, a file, a flash memory device, and the like. In one
`embodiment, secure immunization record store 306 is
`configured as a flash memory that may store at least
`about 200 immunization records. However, the inven-
`tion is not limited to this storage capacity, and another
`may be selected without departing from the scope or
`spirit of the invention.
`[0039] Secure immunization record store 306 may al-
`so be configured to provide an alert to immunity system
`controller 302 if tampering is detected. In another em-
`bodiment, secure immunization record store 306 may
`be configured to employ security certificates and the
`like, to ensure that an immunization record is proper, in-
`structions and the like are from immunity system con-
`troller 302, and the like.
`[0040] Secure immunization record store 306 may be
`updated with new immunization records using a variety
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`6
`
`of mechanisms including over a network, a DVD device,
`and the like. For example, a movie studio could include
`private data in a DVD of a home entertainment release
`of a particular motion picture the immunization records
`for other current theatrical releases. In this way, a media
`player could be updated without ever having to be con-
`nected to the Internet.
`[0041]
`In one embodiment of the invention, secure im-
`munization record store 306 and/or immunity system
`controller 302 may be configured to restrict the media
`player for playing if secure immunization record store
`306 has not received an update to the stored immuni-
`zation records within a pre-defined period of time.
`[0042] Secure immunization record store 306 may be
`periodically scanned for expired immunization records
`by reference to a real-time clock source. Also, an older
`immunization record can be removed when a more cur-
`rent immunization record is received. That is, secure im-
`munization record store 306 may expire those immuni-
`zation records where the associated media file, has
`reached its home entertainment release date, or other
`date where a media file is to no longer to be considered
`as an infection.
`[0043] Secure real-time clock 310 may provide real-
`time clock information in a manner that minimizes tam-
`pering or otherwise modifying its output information.
`Moreover, secure real-time clock 310 may also be con-
`figured to be securely set using any of a variety of secure
`mechanisms, including receiving timing information se-
`curely of a network, and the like.
`[0044] Fingerprinter 304 is configured to receive a
`media file, as it is played and to determine from the me-
`dia file, a fingerprint. Fingerprinter 304 may employ vir-
`tually any mechanism to determine a fingerprint, includ-
`ing those described above. Fingerprinter 304 is ar-
`ranged to provide the fingerprint to fingerprinter compa-
`rator 308. Fingerprinter comparator 308 is configured to
`compare immunization records from secure immuniza-
`tion record store 306 to determine whether there is a
`match. In one embodiment, fingerprinter comparator
`308 may employ a pre-determined confidence level to
`determine if there is a match. Such confidence level
`may, for example, be selected to determine a match, or
`one that is sufficiently close to be considered to have
`arisen from a same media file. Thus, in one embodi-
`ment, the match may be determined from a comparison
`to a specified maximum allowable threshold, given the
`pre-determined confidence level. If a match is deter-
`mined, fingerprinter comparator 308 in conjunction with
`immunity system controller 302 may be further config-
`ured to provide a predefined action, including an alert,
`such as a true/false detection of a pirated media file, and
`the like. In one embodiment, PIM 300 may be configured
`to provide an instruction that a media player is to be dis-
`abled from future reads of the media file, a message
`may also be sent over a network, and the like.
`[0045] FIGURE 4 illustrates a logical flow diagram
`generally showing one embodiment of a process for
`
`

`

`11
`
`EP 1 558 032 A2
`
`12
`
`managing access to a media file, such as a pirated mo-
`tion picture and the like, in accordance with the present
`invention. Process 400 of FIGURE 4 may, for example,
`be implemented within PIM 300 of FIGURE 3.
`[0046] Process 300 begins, after a start block, at block
`402, where an immunization record is received. Such
`immunization record is employed to determine how and
`when a media file is to be identified as an infection. In
`one embodiment, a plurality of immunization records
`may be received. Out of date immunization records may
`also, at block 402, be expunged, such that a valid media
`file is not inadvertently determined to be an infection.
`[0047] Processing flows next to decision block 404,
`where a determination is made whether there are more
`portions of the media file to be read. At this first pass
`through process 400, it is assumed that the media file
`is being read in real-time (e.g., streamed). If it is deter-
`mined that more streaming media files are to be read,
`processing flows to block 406; otherwise, processing re-
`turns to a calling process.
`[0048] At block 406, at least a portion of the streaming
`media file is received. If t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket