`(12) Patent Application Publication (10) Pub. No.: US 2002/0146122 A1
`Vestergaard et al.
`(43) Pub. Date:
`Oct. 10, 2002
`
`US 2002O146122A1
`
`(54) DIGITAL MEDIA DISTRIBUTION METHOD
`AND SYSTEM
`
`(76) Inventors: Steve Vestergaard, West Vancouver
`(CA); Che-Wai Tsu, Coquidam (CA);
`Edward Kolic, North Vancouver (CA)
`Correspondence Address:
`GATES & COOPER LLP
`HOWARD HUGHES CENTER
`6701 CENTER DRIVE WEST, SUITE 1050
`LOS ANGELES, CA 90045 (US)
`(21) Appl. No.:
`09/980,582
`(22) PCT Filed:
`Mar. 5, 2001
`
`PCT/CA01/00250
`(86) PCT No.:
`Related U.S. Application Data
`(60) Provisional application No. 60/186,605, filed on Mar.
`3, 2000.
`
`(30)
`
`Foreign Application Priority Data
`
`Mar. 3, 2000 (CA).......................................... 2,299,946
`
`Publication Classification
`
`(51) Int. Cl. ................................................. H04N 7/167
`(52) U.S. Cl. .............................................................. 380/231
`
`(57)
`
`ABSTRACT
`
`The invention presents a method and System for Secure
`distribution of digital media files including text, video, audio
`and combinations of these. The preferred embodiment
`describes the distribution of audio files (particularly music)
`which are presently being widely distributed over the Inter
`net without compensating the various rights holders. The
`invention encrypts the audio content (except for an optional
`preview Section) in a single executable file, allowing it to be
`freely distributed. When Consumers want to access the
`encrypted portion of the file, a decryption key is obtained
`from a remote Server, but because the file includes an
`integral decryption engine, a decrypted copy of the file never
`appears on the Client Side. Thus, there is no unprotected
`copy that the Consumer can illegally distribute. The inven
`tion also describes other advantageous techniques, Such as
`bonding the decryption key to the consumer's computer, So
`it cannot be used by others.
`
`
`
`CONSUMER LOCATES DESRED
`CONTEN USING AWEB BROWSER - N 7O
`AND DOWNLOADS EXECUTABLE FILE
`
`CONSUMER.EXECUTES DOWNLOADED FE
`WHICH:
`1) DECRYPTSMEDIAFILE USING AN INTEGRAL
`ENCRYPTION ENGINE AND A DECRYPTION
`KEY. AND
`2) VIEWS OR PLAYS THE DECRYPTED FILE
`USING AN INTEGRAL VIEWER OR PLAYER
`
`
`
`
`
`
`
`
`
`
`
`Page 1 of 24
`
`GOOGLE EXHIBIT 1013
`
`
`
`Patent Application Publication Oct. 10, 2002 Sheet 1 of 12
`
`US 2002/0146122 A1
`
`s
`glo E
`E
`
`
`
`giãi REC s
`5gy
`
`H
`CC
`Y
`s
`2
`?
`V
`
`Y
`D
`CD
`L
`
`S
`we-1
`
`-8
`
`r
`i.
`
`c
`
`-
`
`g /
`Sx i
`
`3
`
`Page 2 of 24
`
`
`
`Patent Application Publication Oct. 10, 2002 Sheet 2 of 12
`
`US 2002/0146122 A1
`
`FIGURE 2 PRIOR ART
`
`
`
`
`
`
`
`
`
`
`
`
`USER LOCATES DESRED
`CONTENT USING AWEB BROWSER 1 N 60
`AND DOWNLOADS CONTENT
`
`USER DECRYPTS ORDECOMPRESSES
`CONTENT, AND STORES UNPROTECTED
`FILE ON LOCAL SYSTEM
`
`USERVIEWSOR PLAYS - 4
`CONTENT
`
`
`
`USER COPES OR
`REDISTRIBUTES CONTENTAS
`DESRED
`
`
`
`Page 3 of 24
`
`
`
`Patent Application Publication Oct. 10, 2002 Sheet 3 of 12
`
`US 2002/0146122 A1
`
`FIGURE 3
`
`
`
`
`
`CONSUMER LOCATES DESRED
`CON EN USING AWEB BROWSER
`AND DOWNLOADS EXECUTABLE FILE
`
`N 70
`
`CONSUMER.EXECUTES DOWNLOADED FE
`WHICH:
`1) DECRYPTSMEDIAFILE USING AN INTEGRAL
`ENCRYPTION ENGINE AND A DECRYPTION
`KEY. AND
`2) VIEWS OR PLAYS THE DECRYPTED FELE
`USINGAN INTEGRAL VIEWER OR PLAYER
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 24
`
`
`
`Patent Application Publication Oct. 10, 2002. Sheet 4 of 12
`
`US 2002/0146122 A1
`
`
`
`3.
`o
`
`Page 5 of 24
`
`
`
`Oct. 10, 2002 Sheet 5 of 12
`
`US 2002/0146122 A1
`
`
`
`
`
`©NOS CE?LodÅ HONE
`
`Patent Application Publication
`
`NaNo.uNo.n.Na
`
`^:
`
`
`
`
`
`
`
`
`
`Page 6 of 24
`
`
`
`Patent Application Publication
`
`Oct. 10, 2002. Sheet 6 of 12
`
`US 2002/0146122 A1
`
`
`
`
`
`?HENWAO. LNB LNOO
`
`Page 7 of 24
`
`
`
`Patent Application Publication
`
`Oct. 10, 2002 Sheet 7 of 12
`
`US 2002/0146122 A1
`
`START
`
`CONSUMER DOWNLOADSMPE - 150
`FE AND SAVES LOCALLY
`
`YES
`
`N 152
`
`YES
`
`N
`154
`
`NO
`
`156
`/
`PLAY MPE FILE
`
`
`
`IS THEREA
`PREVIEW
`SECTION?
`
`NO
`
`(e)
`
`158
`
`YES
`
`/ 160
`
`PLAY PREVIEW
`SECTION
`
`START"BUY"
`BUTTON FLASHING
`
`162
`
`
`
`
`
`HAS CONSUMER s
`
`SELECTED "BUY"?
`
`Page 8 of 24
`
`
`
`Patent Application Publication Oct. 10, 2002. Sheet 8 of 12
`
`US 2002/0146122 A1
`
`FIGURE 7B
`
`SPONSORED
`
`
`
`166
`
`PAY
`
`MPE FILE
`MODEL2
`
`SPONSORT
`
`IS CONSUMER
`REGISTEREO
`
`OPEN SPONSOR'S
`WEBSITE
`
`
`
`
`
`UNLOCK BALANCE
`OF MPE TRACK
`
`PLAY COMPETE
`MPE FILE
`
`
`
`EXECUTE REGISTRATION
`PROCESS
`
`
`
`OPEN BUY
`SCREEN
`
`ALLOW USER TO SELECT ONE
`OF FOUR PROCESSES:
`1) BUY
`2) CANCEL;
`3) REVIEW PURCHASE HISTORY:
`OR
`4) BUY CREDITS
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 9 of 24
`
`
`
`Patent Application Publication Oct. 10, 2002 Sheet 9 of 12
`
`US 2002/0146122 A1
`
`
`
`MPEENCODER-NAME OF THE TRACK
`TRACKINFO MPE INFO | RIGHTS INFol
`
`SONGTITLE
`COMPOSER
`
`COPYRIGHT
`ALBUMTITLE
`
`FIGURE 8
`
`Page 10 of 24
`
`
`
`Patent Application Publication Oct. 10, 2002 Sheet 10 of 12 US 2002/0146122 A1
`
`
`
`MPEENCODER-NAME OF THE TRAC
`RIGHTS INFO
`
`222
`
`| BAND NAME
`NAME OF THE TRACK
`TAKEN FROM "NAME OF THE ALBUM FROMWHICH THIS
`TRACK IS TAKEN"
`
`ARTIST WEBSITE http://www.bandwebsite.com
`BUY CD URL
`http:lwww.buy.cdhere.com
`
`FIGURE 9
`
`N
`
`220
`
`Page 11 of 24
`
`
`
`Patent Application Publication Oct. 10, 2002 Sheet 11 of 12 US 2002/0146122 A1
`
`MPEENCODER-NAME OF THE TRACK
`TRACK INFO MPE INFO RIGHTS INFO:
`PAYAMOUNT OR SPONSORURL
`MPE DISTRIBUTOR .
`. .
`.
`
`. . .38:
`
`::::: *...
`
`. ..
`
`. . .
`
`.
`
`.
`
`246
`
`242
`
`...
`
`if f
`
`: . .
`
`.
`
`. .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`...] ...,'
`
`. .
`
`. . . .
`
`.
`. .
`EXCLUSIVE
`. . .
`.
`
`248
`
`RIGHTS OWNERNAME AND SHARE
`% .
`
`250
`
`fai
`
`
`
`PREVIEW
`.
`.
`.
`
`.
`
`SOURCE FILE
`
`1:17
`0:00
`O
`CASONGTITLE.MP3
`
`-
`1:47 .
`
`.
`
`.
`
`.
`
`.
`.
`
`.
`.
`
`.
`. .
`
`FIGURE 10
`
`N
`
`240
`
`Page 12 of 24
`
`
`
`Patent Application Publication Oct. 10, 2002 Sheet 12 of 12 US 2002/0146122 A1
`
`
`
`C:\Songtitle.mpe.exe
`
`DISTRIBUTOR
`
`ENTERNAME OF DISTRIBUTOR HERE
`
`:
`
`ENCODE
`
`FIGURE 11
`
`No
`
`Page 13 of 24
`
`
`
`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`DIGITAL MEDIA DISTRIBUTION METHOD AND
`SYSTEM
`0001. The present invention relates generally to comput
`erS and computer Software and more Specifically, to a
`method and System for Secure distribution of digital media
`files over computer networkS.
`
`BACKGROUND OF THE INVENTION
`0002. It is well known that data communication networks
`such as the Internet, Wide Area Networks (WANs) and Local
`Area Networks (LANs), offer tremendously efficient means
`of organizing and distributing computerized data. These
`efficiencies have resulted in their widespread use for both
`busineSS and personal applications. The Internet for
`example, is now a common medium for operating online
`auctions, academic and public forums, distributing publica
`tions Such as newspapers and magazines, and performing
`electronic commerce and electronic mail transactions. It is
`also a common medium for distributing electronic content
`including audio, video, Still images, text and multi-media
`(i.e. combinations of these forms).
`0003. In fact, the widespread use of distributed comput
`ing and file-sharing networks, Such as the Internet, has
`enabled consumers to become distributors of digital content,
`allowing anyone to copy and redistribute free and/or illegal
`copies of Songs, photographs, Videos and other digital con
`tent.
`0004 Creators of media content have a property right to
`the content they create, usually enforceable via copyright or
`trademark laws. The concern is the copying and distribution
`of this content without compensating the rights holders. The
`mechanism to protect and track digital content is referred to
`as Digital Rights Management technology or “DRM". DRM
`is widely accepted as a requirement for the distribution of
`media over the Internet.
`0005. Historically, copying of music was not as great a
`concern because of the nature of the media and the copying
`technology. Music was distributed on physical media Such as
`tapes, CDs (compact disks) or vinyl albums, or via com
`paratively low-quality AM and FM radio transmissions.
`Copying content in Such formats had severe shortcomings:
`0006 1. quality was not exceptional to begin with, and
`generally deteriorated when copied (digital CDS being a
`recent exception);
`0007 2. copies had to be physically transported between
`parties, which is generally slow, inconvenient and expensive
`relative to the retail price of the media being copied; and
`0008. 3. copying was time consuming: copying a one
`hour vinyl album onto an audio tape, for example, took one
`hour to do.
`0009 Digital content (including software) was also dis
`tributed historically on physical media Such as floppy disks
`or CDs. While this content is digital and thus does not
`deteriorate when properly copied, widespread copying is
`generally frustrated by the transporting difficulties and time
`consuming nature of the copying proceSS described above.
`0.010 However, with the emergence of pervasive digital
`communication networks like the Internet, the landscape has
`changed considerably. Digital content can now be copied
`
`with no reduction in quality, and distributed widely with
`almost no cost, effort or time.
`0011 To present a framework for discussion, an exem
`plary Internet system 30 will be described with respect to
`FIG. 1.
`0012. The Internet 32 itself is represented in FIG. 1 by a
`number of routers 34 interconnected by an Internet back
`bone 36 network designed for high-speed transport of large
`amounts of data. User's computers 38 may access the
`Internet 32 in a number of manners including modulating
`and demodulating data over a telephone line using audio
`frequencies which requires a modem 40 and connection to
`the Public Switched Telephone Network 42, which in turn
`connects to the Internet 32 via an Internet Service Provider
`44. Another manner of connection is the use of Set top boxes
`50 which modulate and demodulate data onto high frequen
`cies which pass over existing telephone or television cable
`networks 52 and are connected directly to the Internet via
`Hi-Speed Internet Service Provider 54. Generally, these high
`frequency signals are transmitted outside the frequencies of
`existing Services passing over these telephone or television
`cable networks 52.
`0013 Web sites are maintained on servers 56 also con
`nected to the Internet 32 which provide digital content and
`Software applications to the User's computers 38. Commu
`nications between user's computers 38 and the rest of the
`network 30 are standardized by means of defined commu
`nication protocols.
`0014) Internet Service Providers (ISPs) 44, 54 or Internet
`Access Providers (IAPs), are companies that provide access
`to the Internet. ISPs 44, 54 are considered by some to be
`distinguished from IAPs in that they also provide content
`and services to their subscribers, but in the context of this
`document the distinction is irrelevant. For a monthly fee,
`ISPs 44, 54 generally provider end users with the necessary
`Software, username, password and physical access.
`0015 Equipped with a telephone line modem 40 or set
`top box 50, one can then log on to the Internet 32 and browse
`the World Wide Web, and send and receive e-mail. Digital
`content can be widely distributed over this system 30 in a
`number of manners including:
`0016 1. posting content on Web sites stored either on the
`servers 56 or on the resources of the ISPs 44, 54 themselves;
`0017 2. employing peer to peer (P2P) software on a
`server 56 which allows users to access files stored on one
`another's computers 38; or
`0018. 3. simply e-mailing the content files between users.
`0019 FIG. 1 is something of a simplification, as ISPs are
`often connected to the Internet 32 through Network Access
`Points (NAPs), rather than directly as shown in FIG. 1. As
`well, the Internet itself is far more complex than that shown
`in FIG. 1. However, these details would be well known to
`one skilled in the art and are not pertinent to the present
`discussion.
`0020. If the above problems could be overcome, not only
`would existing content be protected, but many other Content
`Owners would be encouraged to make their content and
`Services available on the Internet and similar networks. This
`
`Page 14 of 24
`
`
`
`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`would result in far greater expansion of computer networks,
`content and Services than even seen today.
`0021. There is therefore a need for a method and system
`of Securely distributing media content over the Internet and
`Similar networks, provided with consideration for the prob
`lems outlined above.
`
`SUMMARY OF THE INVENTION
`0022. It is therefore an object of the invention to provide
`a method and System which obviates or mitigates at least one
`of the disadvantages described above.
`0023. One aspect of the invention is broadly defined as a
`method of distributing electronic media comprising the Steps
`of downloading a media file including an integral decryp
`tion engine and encrypted media content, requesting a
`decryption key from a remote Server, and responding to
`receipt of the decryption key from the remote Server by:
`decrypting the media content using the integral decryption
`engine.
`0024. Another aspect of the invention is defined as a
`computer readable memory medium for Storing Software
`code executable to perform the Steps of downloading a
`media file including an integral decryption engine and
`encrypted media content, requesting a decryption key from
`a remote Server; and responding to receipt of the decryption
`key from the remote Server by: decrypting the media content
`using the integral decryption engine.
`0025 A further aspect of the invention is defined as a
`carrier Signal incorporating Software code executable to
`perform the Steps of downloading a media file including an
`integral decryption engine and encrypted media content;
`requesting a decryption key from a remote Server; and
`responding to receipt of the decryption key from the remote
`Server by: decrypting the media content using the integral
`decryption engine.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0026. These and other features of the invention will
`become more apparent from the following description in
`which reference is made to the appended drawings in which:
`0.027
`FIG. 1 presents a physical layout of an exemplary
`communication network as known in the art;
`0028 FIG. 2 presents a flow chart of an exemplary
`method of content distribution as known in the art;
`0029 FIG.3 presents a flow chart of a method of content
`distribution in a broad embodiment of the invention;
`0030 FIG. 4 presents a layout of an MPE Interface
`Screen in a preferred embodiment of the invention;
`0031 FIG.5 presents a diagram of the MPE file structure
`in a preferred embodiment of the invention;
`0.032
`FIG. 6 presents a diagram of information flow in a
`preferred embodiment of the invention;
`0033 FIGS. 7A and 7B presents a flow chart of a method
`of file distribution in a preferred embodiment of the inven
`tion;
`0034 FIG.8 presents a layout of the Track Info screen of
`the MPE Encoder in a preferred embodiment of the inven
`tion;
`
`0035 FIG. 9 presents a layout of the MPE Info screen of
`the MPE Encoder in a preferred embodiment of the inven
`tion;
`0036 FIG. 10 presents a layout of the Rights Info screen
`of the MPE Encoder in a preferred embodiment of the
`invention; and
`0037 FIG. 11 presents a layout of the MPE Editor screen
`in a preferred embodiment of the invention.
`
`DESCRIPTION OF THE INVENTION
`0038 A methodology which addresses the objects out
`lined above, is presented as a flow chart in FIG. 3. This
`figure presents a method of managing distribution of pro
`prietary electronic media where the user locates and down
`loads a single executable file containing the content he
`desires, at step 70. When this file is executed at step 72, it
`performs two tasks:
`0039) 1... first, it decrypts the media file using an integral
`decryption engine and a decryption key; and then
`0040 2. it presents the decrypted content of the media file
`to the user, using an integral viewer, player or other Suitable
`Software application.
`0041. The user may locate and download the content he
`desires in many ways, as known in the art. This may include,
`for example:
`0042 1. downloading content posted on a Web site stored
`either on a web server 56 or on the resources of an ISP 44,
`54 or ASP;
`0043. 2. downloading content from another computer 38
`in a peer to peer (P2P) network such as Napster or Gnutella;
`
`O
`0044) 3. receiving a media file via e-mail from another
`user or company.
`004.5 This download may be received over any suitable
`communication network as known in the art, and may
`consist of Several different networks working together. Such
`networks would include wireleSS networkS Such as cellular
`telephone networks, the public Switched telephone network,
`cable television networks, the Internet, ATM networks,
`frame relay networks, local area networks (LANs) and wide
`area networks (WANs). The device employed by the user to
`perform these method StepS may be a personal computer
`(PC), Smart terminal, television set top box, personal digital
`assistant (PDA), Internet-ready telephone or other similar
`device. Such devices are well known in the art.
`0046) The nature of the media file that has been requested
`does not limit the scope of the invention. This document
`generally describes music files because of the current
`demand in that market, but any content could be distributed
`with this method including text, graphics, Video, audio files,
`executable applets, data files or Software files. Media content
`that is currently distributed physically could easily be dis
`tributed in this manner, including books, magazines, news
`papers, promotional multimedia, technical journals, music
`Videos, movie trailers and complete movies. Accordingly,
`the viewer or player may be of any type known in the art,
`that corresponds to the nature of the media content being
`downloaded.
`
`Page 15 of 24
`
`
`
`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`0047 The type of encryption employed also does not
`limit the invention. Asymmetric encryption techniqueS Such
`as PGP. Diffie-Hellman and RSA are preferred, but sym
`metric techniques may also be employed. Asymmetric
`encryption techniques are those which employ private and
`public key pairs, one key being used for encryption, and one
`for decryption. Symmetric techniques use a single Secret
`key, the same key being used for both encryption and
`decryption.
`0.048. The concept that is most important in the invention,
`is that the content, decryption engine, and viewer or player,
`be downloaded and executed as a Single, executable file. The
`decryption key is not generally integral within this execut
`able file, as downloading it independently provides an
`additional layer of Security. This is discussed in greater
`detail hereinafter. In this manner, the invention of FIG. 3
`addresses the problems in the art as follows:
`0049) 1... it improves ease of use: The user does not have
`to configure Several independent Software programs Such as:
`decompression, decryption, player or viewer. The user Sim
`ply executes a simple downloaded file. Hence, the method of
`the invention is more likely to work correctly;
`0050 2. it is more difficult to attack, because it does not
`have the discrete components and Stored intermediate files
`that multi-step methods do; and
`0051 3. it protects the content, because a decrypted file
`is never Stored on the client, only the encrypted version.
`Thus, the client can only copy or transmit the encrypted
`version, and not the decrypted version of the media content.
`0.052 Thus, the digital media distribution system of the
`invention enables Content Owners to distribute their content
`in a Secure digital format through the Internet and other
`networks rather than on a physical media.
`0053. It is also possible to obtain some of the benefits of
`the invention by implementing portions of it. For example,
`in applying the invention to a MacIntoshTM environment, it
`may be necessary to download the media player Separately
`rather than integral with the downloaded media file. In such
`a case, the decryption engine can be configured to automati
`cally launch the external player without having a decrypted
`copy of the media file Stored locally.
`0.054 The preferred embodiment of the invention as
`described hereinafter, adds further features which allow the
`content files to be Securely redistributed and passed along to
`other users. AS well, the media content file contains elec
`tronic commerce capabilities and digital rights management
`ensuring that revenues are distributed to the respective rights
`holders.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENT
`0055. The preferred embodiment of the invention will
`now be described with respect to FIGS. 4 through 11. These
`figures present an implementation of the invention in the
`context of music file distribution, but of course, the inven
`tion may be applied to many other types of media files.
`Because of the application to music, the Song files are Stored
`in MP3 format and the components of the system are refered
`to as MPETM components (for MP3 Encrypted).
`
`0056. The system of the invention is a complete, secure,
`media distribution System, with built-in e-commerce, digital
`rights management, distribution and Visual display. It com
`bines a DRM solution with an e-commerce system and
`clearinghouse function, wrapped up in a Secure and acces
`sible delivery system.
`0057 MPE files do not require an external player or any
`other lengthy downloads, as each file contains an embedded
`player; MPE files automatically play when clicked on. The
`system of the invention works on both PC and Macintosh
`platforms and can easily be implemented on other platforms.
`It is a much richer and more powerful marketing tool than
`any other System on the market today.
`0.058. In the preferred embodiment, MPE files can be
`distributed through three different pricing models. The first
`is Free, which provides no Security, but does enhance the
`content with a rich media experience. The Second model is
`Pay, which allows consumers to preview a Section of the
`track at full quality before they are prompted to pay money
`to unlock the remainder of the track. The third model is
`Sponsored, which allows consumers to preview a Section of
`the track at full quality before they are prompted to view a
`sponsor's Website (advertisement) to unlock the remainder
`of the track.
`0059. There are a number of further inventive concepts
`employed by the preferred embodiment which result in
`numerous additional benefits to consumers and content
`providers. One of the major concepts is that of bonding a
`purchased media file to the user's computer and transmitting
`this bonding information back to an MPE server which is
`administrating the purchase of the MPE file. This technique
`offers many benefits, including:
`0060) 1... it offers a further safeguard against copying of
`content files as the bonding will only allow the downloaded
`file to be played on one Specific System-the one to which
`the content file has been bonded;
`0061 2. it allows mobility as the Consumer can move
`rights from one computer to another. This is important as
`varied Internet based devices become more common (PDAs,
`PCS, laptop computers, Internet-ready cellular telephones,
`etc.) and users have more than one Such device. A user could
`download a file to a MP3 player, for example, if it is Web
`connected;
`0062. 3. it allows recovery in the event of a hardware
`failure on the Consumer's equipment. For example, if the
`user's computer crashes and he loses access to the MPE files
`he has downloaded, he can simply authenticate himself to
`the MPE Server and obtain new licensed copies; and
`0063 4. it provides an additional level of authentication
`for the user.
`0064. The preferred interface 80 on the Consumer side is
`presented in the diagram of FIG. 4. This is the display that
`will appear to the end user when he executes a media file
`encrypted in the manner of the invention (referred to as MPE
`files hereinafter). This interface 80 is designed to be logical
`and intuitive, providing sufficient flexibility for powerful
`branding possibilities, while allowing consumers to easily
`grasp what they are dealing with.
`0065. The MPE interface 80 includes a graphics window
`82 which may display an album cover or other graphics,
`
`Page 16 of 24
`
`
`
`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`allowing for branding and product association. The graphics
`window is a full-colour 128x128 pixel bitmap. Other pixel
`configurations and data formats such as GIF, JPEG or TIFF,
`could also be used. The flexibility of this and other elements
`in the MPE interface 80 will become more clear from the
`description of other elements of the invention which follow.
`0.066 A text box 84 is also included which may display
`unlimited text in rich text format (rtf) or a similar format.
`The background colour can be modified, as well as font, font
`colour, and alignment on a character by character basis. Font
`Selection includes all standard Web fonts available on both
`WindowsTM and MacIntoshTM operating systems. The text
`box 84 has a vertical Scroll bar 86 which allows the user to
`quickly Scan through the presented text.
`0067 Control buttons are preferably provided as follows:
`0068 1. a “Web” button 88 which provides links to the
`Web site of the artist or recording label, allowing the
`Consumer to obtain additional or related information;
`0069 2. a “Buy CD' button 90 which provides a Web
`link to buy the CD. Clicking on this button can direct
`consumers to any Web site selling the CD or other related
`merchandise. Alternatively, this button could be used as a
`secondary Web link;
`0070) 3. a “Buy Track” button 92 which initiates the
`purchase proceSS. Clicking on this button takes the Con
`Sumer to a Buy screen, in which the text box 84 and button
`set 88-94 are replaced with text and buttons appropriate to
`the purchase process (described in greater detail with respect
`to FIGS. 7A and 7B); and
`0071. 4. a “Get Player” button 94 to install a full-featured
`player application, allowing construction of playlists, Sup
`port of other common formats, full transport controls and
`Internet radio reception. AS Single tracks are downloaded in
`executable format, it is not necessary to download the player
`Separately in order to perform Standard functions.
`0072 The MPE interface 80 also includes the most
`commonly used player controls: a play pushbutton 96 and
`volume control 98, so the user can play tracks without
`having to install a full player application.
`0073 Media File Structure
`0.074
`Each MPE file has the same file structure, no matter
`which track is encoded within it. FIG. 5 presents a layout of
`the preferred file structure.
`0075) When an MPE file 110 is executed, the MPE
`Bootstrap 112 un-compresses and launches the MPE Player
`114, which is compressed to allow for efficient download
`and transfer of the MPE file 110. The MPE Player 114 is
`actually the fully functional Destiny Media Player, but the
`MPE Player 114 does not install unless the user clicks on the
`“Get Player” button 94 on the MPE interface 80.
`0076) The File Allocation Table (FAT) 116 simply tells
`the user's computer 38 where the different parts of the MPE
`file 110, such as the MPE Bootstrap 112 and MPE Player
`114, begin and end. This is required, for example, So that the
`user's computer 38 does not attempt to play audio from the
`MPE Player 114 program data.
`
`Contained within the Encrypted MPE section 118
`0.077
`are Several elements.
`0078. The Header 120 confirms that the file is structured
`in MPE format, so that the MPE Player 114 interprets the
`data correctly.
`0079 The Song Specification block 122 contains several
`pieces of data, including:
`0080 the Song ID:
`0081 Distributor ID (and whether that Distributor
`has an exclusive license to the content);
`0082 the Type of file (MP3, WAV or AVI for
`example);
`0083 playback length of the content in seconds; and
`0084 data as to where the Song Preview section 124
`begins and ends, and whether or not it fades on its
`beginning and ending.
`0085. The Song Preview section 124 is not as strongly
`encrypted as the remainder of the Song, being encrypted with
`a weak 32 bit key stored in the header 120. This does,
`however, prevent consumers from extracting that audio
`information without an MPE player.
`0086 The Surrounding song 126 is encrypted such that it
`can only be played on the hardware on which it was
`purchased (bonding to the user computer 38 as described
`above). If the content has not been purchased, only the Song
`Preview section 124 can be accessed. Note that any portion
`of a song can be identified as the Preview Section 124, for
`example: the first minute, all of the Song, or none of it at all.
`The example presented in FIG. 5 shows a portion in the
`middle of the Song.
`0087 Flow of Information
`0088. In the preferred embodiment, there will generally
`be four parties, as presented in FIG. 6: the Consumer 130,
`the Content Owner 132, MPE servers 134 and the distribu
`tion Server 136. It is possible of course, for a Single party to
`perform the functions of more than one of these entities, or
`for information to flow through different channels. These
`variations would be clear to one skilled in the art from the
`description of the invention herein.
`0089) Note that the MPE Servers 134 are referred to in
`the plural, because their functionality may be implemented
`by multiple, independent Servers.
`0090 The process comprises two phases. During the first
`phase, the Content Owner 132 interacts with the MPE
`Servers 134 and the distribution server 136 to encrypted
`content into an MPE file 110 and to make listings of it
`available on the distribution server 136. In the second phase,
`the Consumer 130 interacts with the MPE Servers 134 and
`the distribution server 136 to identify and download the
`desired content, to preview it, then to decrypt it if he So
`desires.
`0091. The path in which information flows in the
`exchange of information between the MPE Encoder 138 and
`the MPE Servers 134, or between the MPE Player 140 and
`the MPE servers 134, is transparent to both the Content
`Owner 132 and the Consumer 130.
`0092. In detail, the hidden flow of information as it passes
`from Content Owner 132 to the Consumer 130 may be
`described as follows, the letters below referring to the
`reference letters in FIG. 6.
`
`Page 17 of 24
`
`
`
`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`0093) A First, source data (CD, WAV or MP3, plus image
`and text information) is input into the MPE Encoder 138, by
`the Content Owner 132 from which the MPE Encoder 138
`determines the Song Information. The Song Information
`does not contain the Song itself.
`0094 BThe MPE Encoder 138 then transmits the Song
`Information to the MPE Servers 134, where it is stored in an
`MPE database. The MPE database generates a Song ID for
`that specific file. The MPE servers 134 also generate a Song
`Key for the purpose of encrypting the Song. The Song Key
`is used to add encrypted digital rights to the media file 110.
`These rights include a description of who should be com
`pensated, and how much they should receive for each
`download. The media files 110 can now be made freely
`available anywhere on the World Wide Web, with the
`security that the artist will be paid for each download that is
`executed. Note that the song itself is not stored on the MPE
`servers 134.
`0.095 C The MPE servers 134 send the Song ID and Song
`Key to the MPE Encoder 138. The MPE Encoder 138 uses
`the Song Key to encrypt the Song.
`0096] D The MPE Encoder 138 generates an MPE file
`110 as described with respect to FIG. 5, which is encrypted
`and contains the Song ID. This MPE file 110 can now be
`distributed, and is sent to one of the distributor servers 136.
`This completes the first phase of the process.
`0097 EThe Consumer 130 may then download a desired
`MPE file 110 and play the preview section 124 of the MPE
`file 110 on his hardware, using either the built-in MPE
`Player 140 or a compatible player already installed on his
`system 38.
`0.098
`F. The MPE Player 140 obtains a “digital finger
`print” of the users computer 38 or registration ID of the
`portable device, to determine the User Key. This is how the
`executable file will be bonded to the user's computer 38.
`0099 GWhen the Consumer 130 elects to purchase or
`otherwise unlock the encrypt