throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2002/0146122 A1
`Vestergaard et al.
`(43) Pub. Date:
`Oct. 10, 2002
`
`US 2002O146122A1
`
`(54) DIGITAL MEDIA DISTRIBUTION METHOD
`AND SYSTEM
`
`(76) Inventors: Steve Vestergaard, West Vancouver
`(CA); Che-Wai Tsu, Coquidam (CA);
`Edward Kolic, North Vancouver (CA)
`Correspondence Address:
`GATES & COOPER LLP
`HOWARD HUGHES CENTER
`6701 CENTER DRIVE WEST, SUITE 1050
`LOS ANGELES, CA 90045 (US)
`(21) Appl. No.:
`09/980,582
`(22) PCT Filed:
`Mar. 5, 2001
`
`PCT/CA01/00250
`(86) PCT No.:
`Related U.S. Application Data
`(60) Provisional application No. 60/186,605, filed on Mar.
`3, 2000.
`
`(30)
`
`Foreign Application Priority Data
`
`Mar. 3, 2000 (CA).......................................... 2,299,946
`
`Publication Classification
`
`(51) Int. Cl. ................................................. H04N 7/167
`(52) U.S. Cl. .............................................................. 380/231
`
`(57)
`
`ABSTRACT
`
`The invention presents a method and System for Secure
`distribution of digital media files including text, video, audio
`and combinations of these. The preferred embodiment
`describes the distribution of audio files (particularly music)
`which are presently being widely distributed over the Inter
`net without compensating the various rights holders. The
`invention encrypts the audio content (except for an optional
`preview Section) in a single executable file, allowing it to be
`freely distributed. When Consumers want to access the
`encrypted portion of the file, a decryption key is obtained
`from a remote Server, but because the file includes an
`integral decryption engine, a decrypted copy of the file never
`appears on the Client Side. Thus, there is no unprotected
`copy that the Consumer can illegally distribute. The inven
`tion also describes other advantageous techniques, Such as
`bonding the decryption key to the consumer's computer, So
`it cannot be used by others.
`
`
`
`CONSUMER LOCATES DESRED
`CONTEN USING AWEB BROWSER - N 7O
`AND DOWNLOADS EXECUTABLE FILE
`
`CONSUMER.EXECUTES DOWNLOADED FE
`WHICH:
`1) DECRYPTSMEDIAFILE USING AN INTEGRAL
`ENCRYPTION ENGINE AND A DECRYPTION
`KEY. AND
`2) VIEWS OR PLAYS THE DECRYPTED FILE
`USING AN INTEGRAL VIEWER OR PLAYER
`
`
`
`
`
`
`
`
`
`
`
`Page 1 of 24
`
`GOOGLE EXHIBIT 1013
`
`

`

`Patent Application Publication Oct. 10, 2002 Sheet 1 of 12
`
`US 2002/0146122 A1
`
`s
`glo E
`E
`
`
`
`giãi REC s
`5gy
`
`H
`CC
`Y
`s
`2
`?
`V
`
`Y
`D
`CD
`L
`
`S
`we-1
`
`-8
`
`r
`i.
`
`c
`
`-
`
`g /
`Sx i
`
`3
`
`Page 2 of 24
`
`

`

`Patent Application Publication Oct. 10, 2002 Sheet 2 of 12
`
`US 2002/0146122 A1
`
`FIGURE 2 PRIOR ART
`
`
`
`
`
`
`
`
`
`
`
`
`USER LOCATES DESRED
`CONTENT USING AWEB BROWSER 1 N 60
`AND DOWNLOADS CONTENT
`
`USER DECRYPTS ORDECOMPRESSES
`CONTENT, AND STORES UNPROTECTED
`FILE ON LOCAL SYSTEM
`
`USERVIEWSOR PLAYS - 4
`CONTENT
`
`
`
`USER COPES OR
`REDISTRIBUTES CONTENTAS
`DESRED
`
`
`
`Page 3 of 24
`
`

`

`Patent Application Publication Oct. 10, 2002 Sheet 3 of 12
`
`US 2002/0146122 A1
`
`FIGURE 3
`
`
`
`
`
`CONSUMER LOCATES DESRED
`CON EN USING AWEB BROWSER
`AND DOWNLOADS EXECUTABLE FILE
`
`N 70
`
`CONSUMER.EXECUTES DOWNLOADED FE
`WHICH:
`1) DECRYPTSMEDIAFILE USING AN INTEGRAL
`ENCRYPTION ENGINE AND A DECRYPTION
`KEY. AND
`2) VIEWS OR PLAYS THE DECRYPTED FELE
`USINGAN INTEGRAL VIEWER OR PLAYER
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 24
`
`

`

`Patent Application Publication Oct. 10, 2002. Sheet 4 of 12
`
`US 2002/0146122 A1
`
`
`
`3.
`o
`
`Page 5 of 24
`
`

`

`Oct. 10, 2002 Sheet 5 of 12
`
`US 2002/0146122 A1
`
`
`
`
`
`©NOS CE?LodÅ HONE
`
`Patent Application Publication
`
`NaNo.uNo.n.Na
`
`^:
`
`
`
`
`
`
`
`
`
`Page 6 of 24
`
`

`

`Patent Application Publication
`
`Oct. 10, 2002. Sheet 6 of 12
`
`US 2002/0146122 A1
`
`
`
`
`
`?HENWAO. LNB LNOO
`
`Page 7 of 24
`
`

`

`Patent Application Publication
`
`Oct. 10, 2002 Sheet 7 of 12
`
`US 2002/0146122 A1
`
`START
`
`CONSUMER DOWNLOADSMPE - 150
`FE AND SAVES LOCALLY
`
`YES
`
`N 152
`
`YES
`
`N
`154
`
`NO
`
`156
`/
`PLAY MPE FILE
`
`
`
`IS THEREA
`PREVIEW
`SECTION?
`
`NO
`
`(e)
`
`158
`
`YES
`
`/ 160
`
`PLAY PREVIEW
`SECTION
`
`START"BUY"
`BUTTON FLASHING
`
`162
`
`
`
`
`
`HAS CONSUMER s
`
`SELECTED "BUY"?
`
`Page 8 of 24
`
`

`

`Patent Application Publication Oct. 10, 2002. Sheet 8 of 12
`
`US 2002/0146122 A1
`
`FIGURE 7B
`
`SPONSORED
`
`
`
`166
`
`PAY
`
`MPE FILE
`MODEL2
`
`SPONSORT
`
`IS CONSUMER
`REGISTEREO
`
`OPEN SPONSOR'S
`WEBSITE
`
`
`
`
`
`UNLOCK BALANCE
`OF MPE TRACK
`
`PLAY COMPETE
`MPE FILE
`
`
`
`EXECUTE REGISTRATION
`PROCESS
`
`
`
`OPEN BUY
`SCREEN
`
`ALLOW USER TO SELECT ONE
`OF FOUR PROCESSES:
`1) BUY
`2) CANCEL;
`3) REVIEW PURCHASE HISTORY:
`OR
`4) BUY CREDITS
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 9 of 24
`
`

`

`Patent Application Publication Oct. 10, 2002 Sheet 9 of 12
`
`US 2002/0146122 A1
`
`
`
`MPEENCODER-NAME OF THE TRACK
`TRACKINFO MPE INFO | RIGHTS INFol
`
`SONGTITLE
`COMPOSER
`
`COPYRIGHT
`ALBUMTITLE
`
`FIGURE 8
`
`Page 10 of 24
`
`

`

`Patent Application Publication Oct. 10, 2002 Sheet 10 of 12 US 2002/0146122 A1
`
`
`
`MPEENCODER-NAME OF THE TRAC
`RIGHTS INFO
`
`222
`
`| BAND NAME
`NAME OF THE TRACK
`TAKEN FROM "NAME OF THE ALBUM FROMWHICH THIS
`TRACK IS TAKEN"
`
`ARTIST WEBSITE http://www.bandwebsite.com
`BUY CD URL
`http:lwww.buy.cdhere.com
`
`FIGURE 9
`
`N
`
`220
`
`Page 11 of 24
`
`

`

`Patent Application Publication Oct. 10, 2002 Sheet 11 of 12 US 2002/0146122 A1
`
`MPEENCODER-NAME OF THE TRACK
`TRACK INFO MPE INFO RIGHTS INFO:
`PAYAMOUNT OR SPONSORURL
`MPE DISTRIBUTOR .
`. .
`.
`
`. . .38:
`
`::::: *...
`
`. ..
`
`. . .
`
`.
`
`.
`
`246
`
`242
`
`...
`
`if f
`
`: . .
`
`.
`
`. .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`...] ...,'
`
`. .
`
`. . . .
`
`.
`. .
`EXCLUSIVE
`. . .
`.
`
`248
`
`RIGHTS OWNERNAME AND SHARE
`% .
`
`250
`
`fai
`
`
`
`PREVIEW
`.
`.
`.
`
`.
`
`SOURCE FILE
`
`1:17
`0:00
`O
`CASONGTITLE.MP3
`
`-
`1:47 .
`
`.
`
`.
`
`.
`
`.
`.
`
`.
`.
`
`.
`. .
`
`FIGURE 10
`
`N
`
`240
`
`Page 12 of 24
`
`

`

`Patent Application Publication Oct. 10, 2002 Sheet 12 of 12 US 2002/0146122 A1
`
`
`
`C:\Songtitle.mpe.exe
`
`DISTRIBUTOR
`
`ENTERNAME OF DISTRIBUTOR HERE
`
`:
`
`ENCODE
`
`FIGURE 11
`
`No
`
`Page 13 of 24
`
`

`

`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`DIGITAL MEDIA DISTRIBUTION METHOD AND
`SYSTEM
`0001. The present invention relates generally to comput
`erS and computer Software and more Specifically, to a
`method and System for Secure distribution of digital media
`files over computer networkS.
`
`BACKGROUND OF THE INVENTION
`0002. It is well known that data communication networks
`such as the Internet, Wide Area Networks (WANs) and Local
`Area Networks (LANs), offer tremendously efficient means
`of organizing and distributing computerized data. These
`efficiencies have resulted in their widespread use for both
`busineSS and personal applications. The Internet for
`example, is now a common medium for operating online
`auctions, academic and public forums, distributing publica
`tions Such as newspapers and magazines, and performing
`electronic commerce and electronic mail transactions. It is
`also a common medium for distributing electronic content
`including audio, video, Still images, text and multi-media
`(i.e. combinations of these forms).
`0003. In fact, the widespread use of distributed comput
`ing and file-sharing networks, Such as the Internet, has
`enabled consumers to become distributors of digital content,
`allowing anyone to copy and redistribute free and/or illegal
`copies of Songs, photographs, Videos and other digital con
`tent.
`0004 Creators of media content have a property right to
`the content they create, usually enforceable via copyright or
`trademark laws. The concern is the copying and distribution
`of this content without compensating the rights holders. The
`mechanism to protect and track digital content is referred to
`as Digital Rights Management technology or “DRM". DRM
`is widely accepted as a requirement for the distribution of
`media over the Internet.
`0005. Historically, copying of music was not as great a
`concern because of the nature of the media and the copying
`technology. Music was distributed on physical media Such as
`tapes, CDs (compact disks) or vinyl albums, or via com
`paratively low-quality AM and FM radio transmissions.
`Copying content in Such formats had severe shortcomings:
`0006 1. quality was not exceptional to begin with, and
`generally deteriorated when copied (digital CDS being a
`recent exception);
`0007 2. copies had to be physically transported between
`parties, which is generally slow, inconvenient and expensive
`relative to the retail price of the media being copied; and
`0008. 3. copying was time consuming: copying a one
`hour vinyl album onto an audio tape, for example, took one
`hour to do.
`0009 Digital content (including software) was also dis
`tributed historically on physical media Such as floppy disks
`or CDs. While this content is digital and thus does not
`deteriorate when properly copied, widespread copying is
`generally frustrated by the transporting difficulties and time
`consuming nature of the copying proceSS described above.
`0.010 However, with the emergence of pervasive digital
`communication networks like the Internet, the landscape has
`changed considerably. Digital content can now be copied
`
`with no reduction in quality, and distributed widely with
`almost no cost, effort or time.
`0011 To present a framework for discussion, an exem
`plary Internet system 30 will be described with respect to
`FIG. 1.
`0012. The Internet 32 itself is represented in FIG. 1 by a
`number of routers 34 interconnected by an Internet back
`bone 36 network designed for high-speed transport of large
`amounts of data. User's computers 38 may access the
`Internet 32 in a number of manners including modulating
`and demodulating data over a telephone line using audio
`frequencies which requires a modem 40 and connection to
`the Public Switched Telephone Network 42, which in turn
`connects to the Internet 32 via an Internet Service Provider
`44. Another manner of connection is the use of Set top boxes
`50 which modulate and demodulate data onto high frequen
`cies which pass over existing telephone or television cable
`networks 52 and are connected directly to the Internet via
`Hi-Speed Internet Service Provider 54. Generally, these high
`frequency signals are transmitted outside the frequencies of
`existing Services passing over these telephone or television
`cable networks 52.
`0013 Web sites are maintained on servers 56 also con
`nected to the Internet 32 which provide digital content and
`Software applications to the User's computers 38. Commu
`nications between user's computers 38 and the rest of the
`network 30 are standardized by means of defined commu
`nication protocols.
`0014) Internet Service Providers (ISPs) 44, 54 or Internet
`Access Providers (IAPs), are companies that provide access
`to the Internet. ISPs 44, 54 are considered by some to be
`distinguished from IAPs in that they also provide content
`and services to their subscribers, but in the context of this
`document the distinction is irrelevant. For a monthly fee,
`ISPs 44, 54 generally provider end users with the necessary
`Software, username, password and physical access.
`0015 Equipped with a telephone line modem 40 or set
`top box 50, one can then log on to the Internet 32 and browse
`the World Wide Web, and send and receive e-mail. Digital
`content can be widely distributed over this system 30 in a
`number of manners including:
`0016 1. posting content on Web sites stored either on the
`servers 56 or on the resources of the ISPs 44, 54 themselves;
`0017 2. employing peer to peer (P2P) software on a
`server 56 which allows users to access files stored on one
`another's computers 38; or
`0018. 3. simply e-mailing the content files between users.
`0019 FIG. 1 is something of a simplification, as ISPs are
`often connected to the Internet 32 through Network Access
`Points (NAPs), rather than directly as shown in FIG. 1. As
`well, the Internet itself is far more complex than that shown
`in FIG. 1. However, these details would be well known to
`one skilled in the art and are not pertinent to the present
`discussion.
`0020. If the above problems could be overcome, not only
`would existing content be protected, but many other Content
`Owners would be encouraged to make their content and
`Services available on the Internet and similar networks. This
`
`Page 14 of 24
`
`

`

`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`would result in far greater expansion of computer networks,
`content and Services than even seen today.
`0021. There is therefore a need for a method and system
`of Securely distributing media content over the Internet and
`Similar networks, provided with consideration for the prob
`lems outlined above.
`
`SUMMARY OF THE INVENTION
`0022. It is therefore an object of the invention to provide
`a method and System which obviates or mitigates at least one
`of the disadvantages described above.
`0023. One aspect of the invention is broadly defined as a
`method of distributing electronic media comprising the Steps
`of downloading a media file including an integral decryp
`tion engine and encrypted media content, requesting a
`decryption key from a remote Server, and responding to
`receipt of the decryption key from the remote Server by:
`decrypting the media content using the integral decryption
`engine.
`0024. Another aspect of the invention is defined as a
`computer readable memory medium for Storing Software
`code executable to perform the Steps of downloading a
`media file including an integral decryption engine and
`encrypted media content, requesting a decryption key from
`a remote Server; and responding to receipt of the decryption
`key from the remote Server by: decrypting the media content
`using the integral decryption engine.
`0025 A further aspect of the invention is defined as a
`carrier Signal incorporating Software code executable to
`perform the Steps of downloading a media file including an
`integral decryption engine and encrypted media content;
`requesting a decryption key from a remote Server; and
`responding to receipt of the decryption key from the remote
`Server by: decrypting the media content using the integral
`decryption engine.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0026. These and other features of the invention will
`become more apparent from the following description in
`which reference is made to the appended drawings in which:
`0.027
`FIG. 1 presents a physical layout of an exemplary
`communication network as known in the art;
`0028 FIG. 2 presents a flow chart of an exemplary
`method of content distribution as known in the art;
`0029 FIG.3 presents a flow chart of a method of content
`distribution in a broad embodiment of the invention;
`0030 FIG. 4 presents a layout of an MPE Interface
`Screen in a preferred embodiment of the invention;
`0031 FIG.5 presents a diagram of the MPE file structure
`in a preferred embodiment of the invention;
`0.032
`FIG. 6 presents a diagram of information flow in a
`preferred embodiment of the invention;
`0033 FIGS. 7A and 7B presents a flow chart of a method
`of file distribution in a preferred embodiment of the inven
`tion;
`0034 FIG.8 presents a layout of the Track Info screen of
`the MPE Encoder in a preferred embodiment of the inven
`tion;
`
`0035 FIG. 9 presents a layout of the MPE Info screen of
`the MPE Encoder in a preferred embodiment of the inven
`tion;
`0036 FIG. 10 presents a layout of the Rights Info screen
`of the MPE Encoder in a preferred embodiment of the
`invention; and
`0037 FIG. 11 presents a layout of the MPE Editor screen
`in a preferred embodiment of the invention.
`
`DESCRIPTION OF THE INVENTION
`0038 A methodology which addresses the objects out
`lined above, is presented as a flow chart in FIG. 3. This
`figure presents a method of managing distribution of pro
`prietary electronic media where the user locates and down
`loads a single executable file containing the content he
`desires, at step 70. When this file is executed at step 72, it
`performs two tasks:
`0039) 1... first, it decrypts the media file using an integral
`decryption engine and a decryption key; and then
`0040 2. it presents the decrypted content of the media file
`to the user, using an integral viewer, player or other Suitable
`Software application.
`0041. The user may locate and download the content he
`desires in many ways, as known in the art. This may include,
`for example:
`0042 1. downloading content posted on a Web site stored
`either on a web server 56 or on the resources of an ISP 44,
`54 or ASP;
`0043. 2. downloading content from another computer 38
`in a peer to peer (P2P) network such as Napster or Gnutella;
`
`O
`0044) 3. receiving a media file via e-mail from another
`user or company.
`004.5 This download may be received over any suitable
`communication network as known in the art, and may
`consist of Several different networks working together. Such
`networks would include wireleSS networkS Such as cellular
`telephone networks, the public Switched telephone network,
`cable television networks, the Internet, ATM networks,
`frame relay networks, local area networks (LANs) and wide
`area networks (WANs). The device employed by the user to
`perform these method StepS may be a personal computer
`(PC), Smart terminal, television set top box, personal digital
`assistant (PDA), Internet-ready telephone or other similar
`device. Such devices are well known in the art.
`0046) The nature of the media file that has been requested
`does not limit the scope of the invention. This document
`generally describes music files because of the current
`demand in that market, but any content could be distributed
`with this method including text, graphics, Video, audio files,
`executable applets, data files or Software files. Media content
`that is currently distributed physically could easily be dis
`tributed in this manner, including books, magazines, news
`papers, promotional multimedia, technical journals, music
`Videos, movie trailers and complete movies. Accordingly,
`the viewer or player may be of any type known in the art,
`that corresponds to the nature of the media content being
`downloaded.
`
`Page 15 of 24
`
`

`

`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`0047 The type of encryption employed also does not
`limit the invention. Asymmetric encryption techniqueS Such
`as PGP. Diffie-Hellman and RSA are preferred, but sym
`metric techniques may also be employed. Asymmetric
`encryption techniques are those which employ private and
`public key pairs, one key being used for encryption, and one
`for decryption. Symmetric techniques use a single Secret
`key, the same key being used for both encryption and
`decryption.
`0.048. The concept that is most important in the invention,
`is that the content, decryption engine, and viewer or player,
`be downloaded and executed as a Single, executable file. The
`decryption key is not generally integral within this execut
`able file, as downloading it independently provides an
`additional layer of Security. This is discussed in greater
`detail hereinafter. In this manner, the invention of FIG. 3
`addresses the problems in the art as follows:
`0049) 1... it improves ease of use: The user does not have
`to configure Several independent Software programs Such as:
`decompression, decryption, player or viewer. The user Sim
`ply executes a simple downloaded file. Hence, the method of
`the invention is more likely to work correctly;
`0050 2. it is more difficult to attack, because it does not
`have the discrete components and Stored intermediate files
`that multi-step methods do; and
`0051 3. it protects the content, because a decrypted file
`is never Stored on the client, only the encrypted version.
`Thus, the client can only copy or transmit the encrypted
`version, and not the decrypted version of the media content.
`0.052 Thus, the digital media distribution system of the
`invention enables Content Owners to distribute their content
`in a Secure digital format through the Internet and other
`networks rather than on a physical media.
`0053. It is also possible to obtain some of the benefits of
`the invention by implementing portions of it. For example,
`in applying the invention to a MacIntoshTM environment, it
`may be necessary to download the media player Separately
`rather than integral with the downloaded media file. In such
`a case, the decryption engine can be configured to automati
`cally launch the external player without having a decrypted
`copy of the media file Stored locally.
`0.054 The preferred embodiment of the invention as
`described hereinafter, adds further features which allow the
`content files to be Securely redistributed and passed along to
`other users. AS well, the media content file contains elec
`tronic commerce capabilities and digital rights management
`ensuring that revenues are distributed to the respective rights
`holders.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENT
`0055. The preferred embodiment of the invention will
`now be described with respect to FIGS. 4 through 11. These
`figures present an implementation of the invention in the
`context of music file distribution, but of course, the inven
`tion may be applied to many other types of media files.
`Because of the application to music, the Song files are Stored
`in MP3 format and the components of the system are refered
`to as MPETM components (for MP3 Encrypted).
`
`0056. The system of the invention is a complete, secure,
`media distribution System, with built-in e-commerce, digital
`rights management, distribution and Visual display. It com
`bines a DRM solution with an e-commerce system and
`clearinghouse function, wrapped up in a Secure and acces
`sible delivery system.
`0057 MPE files do not require an external player or any
`other lengthy downloads, as each file contains an embedded
`player; MPE files automatically play when clicked on. The
`system of the invention works on both PC and Macintosh
`platforms and can easily be implemented on other platforms.
`It is a much richer and more powerful marketing tool than
`any other System on the market today.
`0.058. In the preferred embodiment, MPE files can be
`distributed through three different pricing models. The first
`is Free, which provides no Security, but does enhance the
`content with a rich media experience. The Second model is
`Pay, which allows consumers to preview a Section of the
`track at full quality before they are prompted to pay money
`to unlock the remainder of the track. The third model is
`Sponsored, which allows consumers to preview a Section of
`the track at full quality before they are prompted to view a
`sponsor's Website (advertisement) to unlock the remainder
`of the track.
`0059. There are a number of further inventive concepts
`employed by the preferred embodiment which result in
`numerous additional benefits to consumers and content
`providers. One of the major concepts is that of bonding a
`purchased media file to the user's computer and transmitting
`this bonding information back to an MPE server which is
`administrating the purchase of the MPE file. This technique
`offers many benefits, including:
`0060) 1... it offers a further safeguard against copying of
`content files as the bonding will only allow the downloaded
`file to be played on one Specific System-the one to which
`the content file has been bonded;
`0061 2. it allows mobility as the Consumer can move
`rights from one computer to another. This is important as
`varied Internet based devices become more common (PDAs,
`PCS, laptop computers, Internet-ready cellular telephones,
`etc.) and users have more than one Such device. A user could
`download a file to a MP3 player, for example, if it is Web
`connected;
`0062. 3. it allows recovery in the event of a hardware
`failure on the Consumer's equipment. For example, if the
`user's computer crashes and he loses access to the MPE files
`he has downloaded, he can simply authenticate himself to
`the MPE Server and obtain new licensed copies; and
`0063 4. it provides an additional level of authentication
`for the user.
`0064. The preferred interface 80 on the Consumer side is
`presented in the diagram of FIG. 4. This is the display that
`will appear to the end user when he executes a media file
`encrypted in the manner of the invention (referred to as MPE
`files hereinafter). This interface 80 is designed to be logical
`and intuitive, providing sufficient flexibility for powerful
`branding possibilities, while allowing consumers to easily
`grasp what they are dealing with.
`0065. The MPE interface 80 includes a graphics window
`82 which may display an album cover or other graphics,
`
`Page 16 of 24
`
`

`

`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`allowing for branding and product association. The graphics
`window is a full-colour 128x128 pixel bitmap. Other pixel
`configurations and data formats such as GIF, JPEG or TIFF,
`could also be used. The flexibility of this and other elements
`in the MPE interface 80 will become more clear from the
`description of other elements of the invention which follow.
`0.066 A text box 84 is also included which may display
`unlimited text in rich text format (rtf) or a similar format.
`The background colour can be modified, as well as font, font
`colour, and alignment on a character by character basis. Font
`Selection includes all standard Web fonts available on both
`WindowsTM and MacIntoshTM operating systems. The text
`box 84 has a vertical Scroll bar 86 which allows the user to
`quickly Scan through the presented text.
`0067 Control buttons are preferably provided as follows:
`0068 1. a “Web” button 88 which provides links to the
`Web site of the artist or recording label, allowing the
`Consumer to obtain additional or related information;
`0069 2. a “Buy CD' button 90 which provides a Web
`link to buy the CD. Clicking on this button can direct
`consumers to any Web site selling the CD or other related
`merchandise. Alternatively, this button could be used as a
`secondary Web link;
`0070) 3. a “Buy Track” button 92 which initiates the
`purchase proceSS. Clicking on this button takes the Con
`Sumer to a Buy screen, in which the text box 84 and button
`set 88-94 are replaced with text and buttons appropriate to
`the purchase process (described in greater detail with respect
`to FIGS. 7A and 7B); and
`0071. 4. a “Get Player” button 94 to install a full-featured
`player application, allowing construction of playlists, Sup
`port of other common formats, full transport controls and
`Internet radio reception. AS Single tracks are downloaded in
`executable format, it is not necessary to download the player
`Separately in order to perform Standard functions.
`0072 The MPE interface 80 also includes the most
`commonly used player controls: a play pushbutton 96 and
`volume control 98, so the user can play tracks without
`having to install a full player application.
`0073 Media File Structure
`0.074
`Each MPE file has the same file structure, no matter
`which track is encoded within it. FIG. 5 presents a layout of
`the preferred file structure.
`0075) When an MPE file 110 is executed, the MPE
`Bootstrap 112 un-compresses and launches the MPE Player
`114, which is compressed to allow for efficient download
`and transfer of the MPE file 110. The MPE Player 114 is
`actually the fully functional Destiny Media Player, but the
`MPE Player 114 does not install unless the user clicks on the
`“Get Player” button 94 on the MPE interface 80.
`0076) The File Allocation Table (FAT) 116 simply tells
`the user's computer 38 where the different parts of the MPE
`file 110, such as the MPE Bootstrap 112 and MPE Player
`114, begin and end. This is required, for example, So that the
`user's computer 38 does not attempt to play audio from the
`MPE Player 114 program data.
`
`Contained within the Encrypted MPE section 118
`0.077
`are Several elements.
`0078. The Header 120 confirms that the file is structured
`in MPE format, so that the MPE Player 114 interprets the
`data correctly.
`0079 The Song Specification block 122 contains several
`pieces of data, including:
`0080 the Song ID:
`0081 Distributor ID (and whether that Distributor
`has an exclusive license to the content);
`0082 the Type of file (MP3, WAV or AVI for
`example);
`0083 playback length of the content in seconds; and
`0084 data as to where the Song Preview section 124
`begins and ends, and whether or not it fades on its
`beginning and ending.
`0085. The Song Preview section 124 is not as strongly
`encrypted as the remainder of the Song, being encrypted with
`a weak 32 bit key stored in the header 120. This does,
`however, prevent consumers from extracting that audio
`information without an MPE player.
`0086 The Surrounding song 126 is encrypted such that it
`can only be played on the hardware on which it was
`purchased (bonding to the user computer 38 as described
`above). If the content has not been purchased, only the Song
`Preview section 124 can be accessed. Note that any portion
`of a song can be identified as the Preview Section 124, for
`example: the first minute, all of the Song, or none of it at all.
`The example presented in FIG. 5 shows a portion in the
`middle of the Song.
`0087 Flow of Information
`0088. In the preferred embodiment, there will generally
`be four parties, as presented in FIG. 6: the Consumer 130,
`the Content Owner 132, MPE servers 134 and the distribu
`tion Server 136. It is possible of course, for a Single party to
`perform the functions of more than one of these entities, or
`for information to flow through different channels. These
`variations would be clear to one skilled in the art from the
`description of the invention herein.
`0089) Note that the MPE Servers 134 are referred to in
`the plural, because their functionality may be implemented
`by multiple, independent Servers.
`0090 The process comprises two phases. During the first
`phase, the Content Owner 132 interacts with the MPE
`Servers 134 and the distribution server 136 to encrypted
`content into an MPE file 110 and to make listings of it
`available on the distribution server 136. In the second phase,
`the Consumer 130 interacts with the MPE Servers 134 and
`the distribution server 136 to identify and download the
`desired content, to preview it, then to decrypt it if he So
`desires.
`0091. The path in which information flows in the
`exchange of information between the MPE Encoder 138 and
`the MPE Servers 134, or between the MPE Player 140 and
`the MPE servers 134, is transparent to both the Content
`Owner 132 and the Consumer 130.
`0092. In detail, the hidden flow of information as it passes
`from Content Owner 132 to the Consumer 130 may be
`described as follows, the letters below referring to the
`reference letters in FIG. 6.
`
`Page 17 of 24
`
`

`

`US 2002/0146122 A1
`
`Oct. 10, 2002
`
`0093) A First, source data (CD, WAV or MP3, plus image
`and text information) is input into the MPE Encoder 138, by
`the Content Owner 132 from which the MPE Encoder 138
`determines the Song Information. The Song Information
`does not contain the Song itself.
`0094 BThe MPE Encoder 138 then transmits the Song
`Information to the MPE Servers 134, where it is stored in an
`MPE database. The MPE database generates a Song ID for
`that specific file. The MPE servers 134 also generate a Song
`Key for the purpose of encrypting the Song. The Song Key
`is used to add encrypted digital rights to the media file 110.
`These rights include a description of who should be com
`pensated, and how much they should receive for each
`download. The media files 110 can now be made freely
`available anywhere on the World Wide Web, with the
`security that the artist will be paid for each download that is
`executed. Note that the song itself is not stored on the MPE
`servers 134.
`0.095 C The MPE servers 134 send the Song ID and Song
`Key to the MPE Encoder 138. The MPE Encoder 138 uses
`the Song Key to encrypt the Song.
`0096] D The MPE Encoder 138 generates an MPE file
`110 as described with respect to FIG. 5, which is encrypted
`and contains the Song ID. This MPE file 110 can now be
`distributed, and is sent to one of the distributor servers 136.
`This completes the first phase of the process.
`0097 EThe Consumer 130 may then download a desired
`MPE file 110 and play the preview section 124 of the MPE
`file 110 on his hardware, using either the built-in MPE
`Player 140 or a compatible player already installed on his
`system 38.
`0.098
`F. The MPE Player 140 obtains a “digital finger
`print” of the users computer 38 or registration ID of the
`portable device, to determine the User Key. This is how the
`executable file will be bonded to the user's computer 38.
`0099 GWhen the Consumer 130 elects to purchase or
`otherwise unlock the encrypt

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket