WO2001054022A1 - Rechargeable media distribution and play system - Google Patents

Rechargeable media distribution and play system Download PDF

Info

Publication number
WO2001054022A1
WO2001054022A1 PCT/US2001/001586 US0101586W WO0154022A1 WO 2001054022 A1 WO2001054022 A1 WO 2001054022A1 US 0101586 W US0101586 W US 0101586W WO 0154022 A1 WO0154022 A1 WO 0154022A1
Authority
WO
WIPO (PCT)
Prior art keywords
files
customer
data files
authorization
user
Prior art date
Application number
PCT/US2001/001586
Other languages
French (fr)
Inventor
Gregg S. Homer
Original Assignee
Homer Gregg S
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Homer Gregg S filed Critical Homer Gregg S
Priority to CA002397717A priority Critical patent/CA2397717A1/en
Priority to EP01942752A priority patent/EP1250674A1/en
Priority to AU2001229573A priority patent/AU2001229573A1/en
Publication of WO2001054022A1 publication Critical patent/WO2001054022A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Definitions

  • the present invention relates to electronic media players, and more particularly to media that is downloadable over a communication network.
  • U.S. Patent No. 5,790,423 to Lau discloses a system for downloading and playing music wherein certain copyrighted material may only be used for a specific length of time.
  • the system of Lau includes a service center having a user accessible library of selectable programs, a base unit from which user generated program selections are transmitted to the service center, and a cassette for storing programs downloaded by the base unit from the service center.
  • the date and time of downloading and playing of particular program selections is stored m memory of the base unit and/or the cassette. Copyright information is programmed into a control program of the cassette to limit the usage of each selected program.
  • U.S. Patent No. 4,898,736 to Walker discloses downloadable information having access through a keyed device.
  • the system includes a service facility having an electronically accessible library of data files and an associated catalog, and an interface to a communications network.
  • the system can transmit the catalog to a requesting user, and set up customer accounts, process payments from customers for establishing file access authorizations, and transmit user-selected files by the network interface to customers.
  • the system also provides a player program to each customer for metering access to received data files as limited by the authorization.
  • the system is enabled for transmitting the selected files to the customer only while the authorization remains established.
  • the system can also be implemented for receiving the user request and feeding the catalog to the user via the network interface. Also, or alternatively, communications with the user for defining the user account can be through the network interface .
  • the system transmits the data files and the player program m encrypted form, with the player program decrypting the received data files only while authorization remains established.
  • the authorization is independent of both the selected files and the number of files selected. Thus customers can freely access all of the files and play any of selected files, to the extent of a blanket authorization, which can also be recharged based on further payments.
  • Authorization can be only for a period of time which is measured only during the accessing data of the received data files by the player program.
  • authorization can be for a collective number of accesses of data of the received data files, and the numbered accesses can be counted only after a threshold period of time of accessing the data files.
  • Another aspect of the invention provides a method for distributing electronic media, including providing the media
  • Figure 1 is a pictorial block diagram of an electronic media distribution system according to the present invention.
  • Figure 2 is a block diagram of a distribution process using the system of Fig. 1 ;
  • Figure 3 is a computer flow chart of a service facility distribution program for implementing the process of Fig. 2;
  • Figure 4 is a flow chart of a customer facility media player program for implementing the process of Fig. 2;
  • Figure 5 is a flow chart portion showing an alternative configuration of the player program of Fig. 4.
  • Figure 6 is a flow chart showing another alternative configuration of the player program of Fig. 4.
  • a distribution system 10 includes a service facility 11 that can be implemented as a server computer 12 being connected to an electronic communication network 14, there being a plurality of user facilities 15 that can also be connected to the network 14, one such being designated customer facility 15C and being implemented as a customer computer 16. Connections to the network 14 are by respective communication lines 18, which can be telephone utility lines.
  • the service computer 12 includes an operator interface 20 having a screen display 21, a keyboard 22, a mouse 23.
  • the computer 12 also includes memory 24 and a modem interface 26 for connecting to the network through an available communication line 18.
  • the mass data storage 32 is loaded with a library of data files (one such being designated 33) by an accession program 34, the accession program also generating a catalog 35 that is periodically updated and saved m the data storage 32.
  • the customer computer 16 includes a counterpart of the operator interface, designated 20', the memory 24, and the modem interface 26.
  • the operator interface 20' includes a pair of audio speakers 25, the computer 16 further including a media interface 36 for driving the speakers 25.
  • the memory 24 has a web browser 38 by which data made available by the service facility 11 is accessed and saved m a suitable device such as a conventional hard disk drive 40.
  • the memory 24 of the customer computer receives a media player program 40 for conditionally accessing received data as further described below.
  • accession program 34 maintains a library of recordings and a user of the customer computer 16 interacts with the library server program 30 of the server computer 12 over the network 14.
  • the library server program 30 and the accession program 34 can be respective modules of an integrated computer program.
  • the accession program 34 is programmed to include a receive data step 52 m which one or more works to be distributed are received m computer-readable form such as on a digitally recorded compact disk. The data is sub ected to a first level of encryption, being stored m the data file 33 m an encrypt and store step 53.
  • the catalog 35 is updated m a maintain catalog step 54 for including the new work(s) . It will be understood that catalog listings for new versions of previously accessioned works replace previous listings.
  • the process 50 includes a test catalog request step 58 for determining such user request, m which case the catalog is provided m a return catalog step 59.
  • the return catalog step 59 can be performed by simply transmitting a listing of the catalog 35 over the computer network 14 to the requesting user, the browser 38 automatically opening and displaying a file containing the listing m a conventional manner.
  • an option can be provided for the user to request a hard copy of the catalog 35 to be mailed, m which case the process 50 proceeds to obtain appropriate mailing information from the user.
  • Program control is passed from the return catalog step 59 to the test catalog request step 58 for handling further catalog requests by the user, if any, and as further described herein.
  • a user accessing the web page will also be presented with an election to place new order.
  • the process 50 includes a test order step 60 for determining such user request, which is processed as described below.
  • the user will further be presented with an election to open a new account.
  • the process 50 includes a test account step 62 for determining such user request. If the user has not requested any of the three, control is returned to the request catalog step 58, the process 50 thus looping and waiting for a user request.
  • control is passed to a get user data step 64 m which the user provides identification data and payment authorization m a conventional manner.
  • a customer flag for that user is set m a set cflag step 65 with control passing to the test catalog request step 58 for further processing of that user's transactions.
  • control is passed from the test new order step 60 to a test cflag step 66. If the customer flag for that user has not yet been set, control passes to a logon step 68 m which the user enters a customer identifier and password which are compared m a test logon step 69 with data previously received m the get user data step 64.
  • control is passed to the get user data step 64, it being assumed that the user had not previously established an account.
  • the process 50 can include an appropriate recovery procedure according to methods known m the art.
  • control is passed from the test logon step 69 to the set cflag step 65 m which the customer flag is set for that user
  • control is returned from the set cflag step 65 to the test catalog request step 58 as before m anticipation of the user requesting to place a new order, control being passed successively by the new order step 60 to the test cflag step 66 which, m the case of the customer flag having been set, control is passed to a get list step 70 wherein the user selects items from the catalog 35 to be downloaded over the computer network 14 to the mass storage device 40 of the customer computer 16.
  • the user is invited to approve of his selections m a test list step 71 from which control is returned to the get list step 70 incase the user is dissatisfied with his previous selection; otherwise,
  • test tick step 95 reaches an affirmative result, with control passing to the decrement meter step 96 in which the play authorization is decremented by one.
  • control passes from the decrement meter step 96 to a stop clock step 98 for stopping the clock so as to limit the decrementing of the meter to a single unit for each file played.
  • the play authorization is for a period of time as m the implementation of Fig. 4, but with play continuing to the end of a file being played when timeout occurs.
  • the test timeout step 97 is omitted from the implementation of Fig. 4, control returning directly from the decrement meter step 96 to the test end step 92.
  • the player program 82 can utilize a conventional clock of the customer computer 16C m the start clock step 91 and the test tick step 95, for example by storing a counterpart of the system time m the start clock step 91, and comparing that counterpart with current system time m the test tick step 95, finding a positive outcome when the time difference reaches a predetermined interval (one minute in the example described previously) .
  • a predetermined interval one minute in the example described previously
  • the stored counterpart of the system time can be incremented by one minute for subsequent comparisons m a next tick interval.
  • the stored counterpart can alternatively be initially set m the start clock step 91 to one minute ahead of the system time for facilitating the comparison by detecting a change m sign of the difference between the values m the test tick step 95.
  • the library server program can be implemented to provide an encoded counterpart of the system time (and date) of the server computer 12, as well as an expiration time, in the output files step 78 (whether for downloading data files or just for recharging) .
  • the player program 42 can then make comparisons between the system times, taking appropriate action in the event that there is a significant change in the difference. It will be understood that in implementations based on calendar time there is no need to monitor elapsed playing time as described above in connection with Figs. 4 and 5.
  • FIG. 6 another counterpart of the player program, designated 42", has a timer module 100 associated therewith, the timer module 100 being implemented to run when the customer computer 16C is operating, notwithstanding the player program 42" being inactive.
  • a determination is made of whether the program is being run for the first time by the customer computer 16C in a test first play step 102, in which case a launch timer module step 104 generates and stores appropriate files for implementing and running the timer module 100, using programming elements that are known to those having skill in the art.
  • the "irner module 100 is restarted whenever the computer 16C is subsequently booted-up or restarted, the module 100 monitoring a system date and time of the computer 16C as well as separately maintaining a timer calendar date and time.
  • the timer calendar date and time is automatically advanced by a difference between the system date and time and a corresponding date and time last saved in a previous period of running of the timer module 100.
  • test first play step 102 has a negative outcome (on a subsequent starting of the player program 42")
  • control passes to a test timer step 106, wherein the presence and operation of the timer module 100 is verified, and an appropriate match of the timer date and time with the system date and time is determined, in which case control is passed to the display list collection step 80, described above in connection with Fig. 4; otherwise, the player program 42" is terminated based on unauthorized tampering with calendar/time settings.
  • the player program 42" of Fig. 6 is implemented for operation with authorizations based on calendar time, with the set meter, start clock, test tick, and decrement meter steps 88, 91, 95, and 96 of Fig. 4 being omitted.
  • the calendar date and time of the timer module 100 is compared with termination date and time as currently authorized, with control returning to the test end step 92 or the stop play step 93 as described above in connection with Fig. 4.
  • the timeout test step 97' (as well as the test user stop step 94) can be omitted when it is desired that play continue to the end of a particular data file, control passing from a negative result of the test user stop step 94 to the test end step 92.
  • the player program 42" as shown in Fig. 6 provides additional protection against unauthorized tampering with calendar and time settings of the customer computer 16C. Further protection can be provided by including, m the obtain authorization step 85, a comparison of the calendar date and time of the timer module 100 and/or the system time of the customer computer 16C with the system time and date of the server computer 12, with termination in the event that tampering is detected.
  • the above comparison would be performed in the get list step 70, the set authorization step 72 and/or the do transaction step 74 of the distribution process 50, with the process being terminated as to customers that are determined to have attempted to misuse the process.
  • a standalone device can be provided for implementing all or appropriate functions of the customer computer 16C, in which case a battery powered system clock can be implemented in a secure manner for setting only m accordance with the system time of the server computer 12. (Such device m implementations according to Figs. 4 and 5 would not require the clock to be settable to date and time of day.)
  • kiosks can be provided for dispensing and/or recharging standalone devices that serve in place of at lease some of the customer computer 16C.
  • data files suitably encrypted, can be provided from the service facility 11 m the form of a CD or other form of removable drive medium, for play on the standalone devices and/or customer computers 16C. Therefore, the spirit and scope of the appended claims should not necessarily be limited to the description of the preferred versions contained herein.

Abstract

A system (10) for distributing and playing electronic media includes a service facility (11) having electronically accessible a library (30, 32) and catalog (35) of data files (33). The system can set up customer accounts, process payments from customers for establishing file access authorizations, and transmit user-selected files to customers. The system also provides a player program (42) to each customer for metering access to received data files as limited by the authorization, the selected files being accessed for further processing of orders from the customer while the authorization remains established. The system can encrypt the data files and the player program, and can decrypt the received data files onyl while the authorization remains established. Authorization can be independent of files selected and/or played, for a period of time that is measured only during playing or for a collective number of plays which can be counted only after a threshold period of time of playing each file.

Description

RECHARGEABLE MEDIA DISTRIBUTION AND PLAY SYSTEM
BACKGROUND
The present invention relates to electronic media players, and more particularly to media that is downloadable over a communication network.
The distribution of software such as computer programs to be executed and data to be accessed has traditionally been by means of physical media that is either sold or rented. For example, computer programs are distributed on magnetic disks, and more recently on optical compact disks. Audio works such as musical recordings have been distributed on grooved records, magnetic tape, and compact disks; and movies have been distributed on magnetic tape and video disks of various formats. Often it is desired to restrict operation of the software to authorized users and/or for authorized uses. U.S. Patent Nos . 5,014,234 to Edwards, Jr., 5,564,038 to Grantz et al . , and 5,715,169 to Noguchi , for example, disclose various schemes for restricting copying and use of the software.
More recently, public access communication channels such as the Internet have been developed to the point that distribution of large volumes of software is feasible electronically. However, the protection of the software against unauthorized use and copying is typically awkward, bothersome, and ineffective. U.S. Patent No. 5,790,423 to Lau discloses a system for downloading and playing music wherein certain copyrighted material may only be used for a specific length of time. The system of Lau includes a service center having a user accessible library of selectable programs, a base unit from which user generated program selections are transmitted to the service center, and a cassette for storing programs downloaded by the base unit from the service center. In one implementation, the date and time of downloading and playing of particular program selections is stored m memory of the base unit and/or the cassette. Copyright information is programmed into a control program of the cassette to limit the usage of each selected program. U.S. Patent No. 4,898,736 to Walker discloses downloadable information having access through a keyed device.
These systems of the prior art exhibit a number of shortcomings, including one or more of the following:
1. They are difficult to use in that they require physical delivery of media and/or keys;
2. They are expensive to manage in that uses must be metered separately for particular works; and
3. They require undesirable compromises between the number of available works and the cost of obtaining access.
Thus there is a need for an electronic media distribution system that overcomes the disadvantages of the prior art.
SUMMARY
The present invention meets this need by providing a rechargeable media distribution and play system that is particularly efficient and easy to use. In one aspect of the invention, the system includes a service facility having an electronically accessible library of data files and an associated catalog, and an interface to a communications network. The system can transmit the catalog to a requesting user, and set up customer accounts, process payments from customers for establishing file access authorizations, and transmit user-selected files by the network interface to customers. The system also provides a player program to each customer for metering access to received data files as limited by the authorization. Optionally, the system is enabled for transmitting the selected files to the customer only while the authorization remains established. The system can also be implemented for receiving the user request and feeding the catalog to the user via the network interface. Also, or alternatively, communications with the user for defining the user account can be through the network interface .
Preferably the system transmits the data files and the player program m encrypted form, with the player program decrypting the received data files only while authorization remains established. Preferably the authorization is independent of both the selected files and the number of files selected. Thus customers can freely access all of the files and play any of selected files, to the extent of a blanket authorization, which can also be recharged based on further payments.
Authorization can be only for a period of time which is measured only during the accessing data of the received data files by the player program. Alternatively, authorization can be for a collective number of accesses of data of the received data files, and the numbered accesses can be counted only after a threshold period of time of accessing the data files.
Another aspect of the invention provides a method for distributing electronic media, including providing the media
Figure imgf000005_0001
0 0 n C rr > co rr SD φ SD (v 13 13 13 Ω CO SD Ω h- ' M, 13 Ω CO
SD co H I—1 C H Hi c C I—1 H Hi SD r Ω c H 0 Hi H Φ fD 3 rt ts 3 Si SD H rr φ SD SD 0 rt Φ Ω en tr Hi 0 CO Hi rt rr fD r φ fD 13 φ Ό rr rr Ω ^ ^ φ <! S 13 Φ rt Ω rt Φ < tr rr 3 - H; Hi H O HT o rr Φ Φ CO M CO 0 SD SD φ 0 CO J-1
Φ (D Si n 3 φ Hi Φ Φ Hi Hi Hi Hi ϋ 0 0 CO 3 Hi Ω CO 3 Ω
SD 0 rr SD CO Φ rr Si ι-i H 0 0 H LQ H φ ^ Ω O φ Φ
Ό 13 3 rr rr CO SD H N HI 13 13 < HI Hi Hi Φ Hi 13 rt fD H φ n t rr H SD H Hi Hi φ LQ tr 13 LQ rt CO 13 Hi Hh
Φ SD rr ^ <! Si rr H H HI rr Ω 0 0 Hi ^ H 0 0 O SD SD 0 SD
^ H 0 3 fD Φ rr 3 Ω LQ LQ CO o SD Hi H ^ Ω <! Ω fD fD 3 fD £ CO H Φ 0 3 Hi Hi rt φ c <! Hi rt HI 3 Ω H H rr t-i fD - rr
^ HI Hi c HI Φ SD SD rr CO H i Φ HT LQ Φ 0 CL
Φ ~. rr rt rt LQ 0 CL (i H 3 3 Φ φ φ ϋ Hi Φ Hi c M H
Hi 13 co 0 H rr HI H H H rr Ω Hi H 3 -• rt rt Hi P rt
3 i Ό fD Si rt Φ 0 HI CO SD φ H Ω Ω rt CO HI φ Ω rr CO rr LQ
H 0 1—" rr Ό ^ LQ 3 SD 0 Φ LQ (D C- φ
HI LQ SD (D H Φ rr n Φ C- 13 Hi 3 &. 0 φ HI CQ SD SD
Φ ^ π 3 rr Hi i-i SD 0 CQ Hi — ' 3 SD Hi i rt Hi O CO u 0) H rr o 13 Φ Φ SD c Ω Hi H <i Φ c i P 0 I-" 0 Hi Ω
3 πs H l rt Hi rr 3 Φ 3 Hi HI SD SD Ω Hi 13 3 tr 3 SD SD
Ό LQ Hi c 0 Φ Φ H H H SD LQ HI φ Ω μ rt SD LQ Hi Φ Hi SD rt HI
(D s: LQ Si o 3 rr 0 Hi <! rt Hi Ω SD Ω rt 0 Hi SD rt SD
H rr SD M fD φ Hi LQ SD 13 rr H r C SD 0 SD SD < Hi HT C J-1 Φ
H fD SD πs en i rr Hi HT 0 Φ CL rt 3 h-1 Ω H SD ^ Φ CO 0 I—1
0 2 CO LQ co o 3 0 rr H Φ Φ Hi Φ H 3 0 Ω O φ LQ Φ fD I-1 HT Hi 0 h-1 C- LQ Φ H Ω Hi Ω rr SD SD O πs Φ LQ φ 3 SD rt 13 HI φ Hl ω 3 Hi 13 C 0 rt fD rr n SD SD Φ rr rr Φ HT Hi ω H Ω CO LQ Φ Hi CO rr Hi
Φ O SD rr P ϋ rr SD rr Φ rr ω Φ 0 3 Ω SD Ω 0 rt 0 0 rr H Ω Φ Ω rr i HT 0 Hi <! Φ Ω SD HI rt rt Φ <! 0 rr HI n fD <! rr c 13 Ω φ 3 0 Φ rr SD rt 0 0 H P 3 H HT H
SD α H SD SD ri Φ 13 Φ H Si Ό H Si s: HI H <i CL Φ CL Φ Ω
I—1 rr < ι-i CO Ό HI H5 H 0 0 HI rt rt Φ M Hi φ SD fD fD H Φ Φ H SD O Φ C 0 HI Hi H H3 Ω rr rr Si HI HI V- ' 1— '
13 H HJ HI 0 ^ H SD Φ < LQ HJ Φ φ LQ SD rr H
CL rr LQ SD rr Si Φ πs ^ CO H • Ω HI c CL HI H tr ^
SD fD 0 c l-i Q φ Ω SD Φ Si Hi Ω SD O ϋ Hi
M -• rr ^ r Φ H Φ C rt φ Φ c r φ SD SD tr rr rr 13 0 Hi H CO 13 H ϋ s: Ω CO SD rt Hi Ω rr SD fD fD 0 SD H Hi Ό LO tr rr Φ o φ φ rt Φ 0 rt ^ Ω
H HI Hi O rr 0 i rr Φ £D SD Φ Hi Hi H 0 Ω HT Φ
3 CL Ό 13 H n H LQ rr 0 HT i ^ rt ? SD < 3 H rt Φ Φ O fD N φ CO Hi rr LO Ό Φ CD Hi • tr φ Φ Φ CO H CO
H SD SD SD CO SD Φ i-i 0 SD H! Hi rt SD Si Hi Φ CL r C 1— ' H li tn ^ ^ rt CO H 3 SD tr 0 Φ HI CO SD CO Φ tr
(D rr fϋ fD H φ Hi i 3 0 Ω Si 13 CO H HI CL. SD CL tr Φ CO - ' f H α 0 Si rr Ξ Φ -• rr φ Φ 3 HT LQ SD P SD h- -. Φ n tr ns H rr n μ Φ CO <! 0 H Φ rt 13 HI rt H rr H 13 i tr φ φ 3 3 O M rt SD SD SD CO SD CL 1— ' fD rr 3 l-i SD H 3 H 0 φ s: Ω rt CO Ω SD Hi HT CO Φ H ω H 0 0 0 rr rt < HI *• rr Φ 13 H rr Ω *< Φ tr
HI πι LQ ri SD H rr Φ H φ 0 Hi HI Φ φ M Φ to H SD SD H Hi rt LQ H Hi 1=1 rr α rr r Hi HJ rr 0 LQ 13 en Hi 13 y-1 C Hi SD fD rr SD Ω LQ φ 0 HT φ SD <! CO Φ 0 φ rt Ω H
Hi 0 0 3 SD H Φ H 3 <! H rt 0 CO 13 HI CO rr c Hi ^
3 •3 H| -> H φ SD H Hi H Si rr rt . Hi O 0 O LQ
H fD H Φ φ O rr Hi 3 SD HI H φ 0 0 Φ M rt 0
3 ι-i 3 c 3 SD SD LQ φ rr ^ LQ 3 LQ Hi H 0 SD
SD SD LQ a 13 rr rr H LQ rt H Hi rt 0 N 3 rr rr α SD CO rr Φ HI rt SD HT rr SD 0 3 SD φ CL
H H SD fD φ H 0 LQ rr rr r Φ Φ 3 rt Hi SD
0 0 Si Si Φ rr SD SD rt H rt
3 3 Φ Mi rr 0 SD O Φ HI rt
Hi 0
DRAWINGS
These and other features, aspects, and advantages of the present invention will become better understood with reference to the following description, appended claims, and accompanying drawings , where :
Figure 1 is a pictorial block diagram of an electronic media distribution system according to the present invention;
Figure 2 is a block diagram of a distribution process using the system of Fig. 1 ;
Figure 3 is a computer flow chart of a service facility distribution program for implementing the process of Fig. 2;
Figure 4 is a flow chart of a customer facility media player program for implementing the process of Fig. 2;
Figure 5 is a flow chart portion showing an alternative configuration of the player program of Fig. 4; and
Figure 6 is a flow chart showing another alternative configuration of the player program of Fig. 4.
DESCRIPTION
The present invention is directed to a system for distributing and playing electronic media that is particularly efficient, easy to use, and effective m accommodating differing patterns of use. With reference to Figs. 1-5 of the drawings, a distribution system 10 includes a service facility 11 that can be implemented as a server computer 12 being connected to an electronic communication network 14, there being a plurality of user facilities 15 that can also be connected to the network 14, one such being designated customer facility 15C and being implemented as a customer computer 16. Connections to the network 14 are by respective communication lines 18, which can be telephone utility lines. As shown m Figure 2, the service computer 12 includes an operator interface 20 having a screen display 21, a keyboard 22, a mouse 23. The computer 12 also includes memory 24 and a modem interface 26 for connecting to the network through an available communication line 18.
The memory 24, at least some of which is typically non-volatile, has a web server program 28 and a library server program 30 having access to mass data storage 32 in accordance with the present invention. The mass data storage 32 is loaded with a library of data files (one such being designated 33) by an accession program 34, the accession program also generating a catalog 35 that is periodically updated and saved m the data storage 32.
The customer computer 16 includes a counterpart of the operator interface, designated 20', the memory 24, and the modem interface 26. In addition to having counterparts of the screen display 21, keyboard 22, mouse 23, the operator interface 20' includes a pair of audio speakers 25, the computer 16 further including a media interface 36 for driving the speakers 25. In an exemplary implementation of the customer computer 16, the memory 24 has a web browser 38 by which data made available by the service facility 11 is accessed and saved m a suitable device such as a conventional hard disk drive 40. In further accordance with the present invention, the memory 24 of the customer computer receives a media player program 40 for conditionally accessing received data as further described below.
With further reference to Figs. 2-4, a distribution process 50 is provided wherein the accession program 34 maintains a library of recordings and a user of the customer computer 16 interacts with the library server program 30 of the server computer 12 over the network 14. It will be understood that the library server program 30 and the accession program 34 can be respective modules of an integrated computer program. As shown m Fig. 3, the accession program 34 is programmed to include a receive data step 52 m which one or more works to be distributed are received m computer-readable form such as on a digitally recorded compact disk. The data is sub ected to a first level of encryption, being stored m the data file 33 m an encrypt and store step 53. Finally, the catalog 35 is updated m a maintain catalog step 54 for including the new work(s) . It will be understood that catalog listings for new versions of previously accessioned works replace previous listings. Once the catalog 35 reflects current status of the data file 33, the library server program 30 is entered for activating a network web page by which users can communicate with the distribution system 10, m an activate web page step 56.
A user accessing the web page will be presented with an election to receive a listing of the catalog 35. Accordingly, the process 50 includes a test catalog request step 58 for determining such user request, m which case the catalog is provided m a return catalog step 59. It will be understood that the return catalog step 59 can be performed by simply transmitting a listing of the catalog 35 over the computer network 14 to the requesting user, the browser 38 automatically opening and displaying a file containing the listing m a conventional manner. Alternatively, an option can be provided for the user to request a hard copy of the catalog 35 to be mailed, m which case the process 50 proceeds to obtain appropriate mailing information from the user. Program control is passed from the return catalog step 59 to the test catalog request step 58 for handling further catalog requests by the user, if any, and as further described herein. A user accessing the web page will also be presented with an election to place new order. Accordingly, the process 50 includes a test order step 60 for determining such user request, which is processed as described below. The user will further be presented with an election to open a new account. Accordingly, the process 50 includes a test account step 62 for determining such user request. If the user has not requested any of the three, control is returned to the request catalog step 58, the process 50 thus looping and waiting for a user request.
When the user has requested a new account, control is passed to a get user data step 64 m which the user provides identification data and payment authorization m a conventional manner. Once the user's account is established, a customer flag for that user is set m a set cflag step 65 with control passing to the test catalog request step 58 for further processing of that user's transactions. In the case that the user requests a new order, control is passed from the test new order step 60 to a test cflag step 66. If the customer flag for that user has not yet been set, control passes to a logon step 68 m which the user enters a customer identifier and password which are compared m a test logon step 69 with data previously received m the get user data step 64. If the logon is unsuccessful, control is passed to the get user data step 64, it being assumed that the user had not previously established an account. In case the user had previously established an account yet failed to properly logon, the process 50 can include an appropriate recovery procedure according to methods known m the art. Once logon is successfully completed, control is passed from the test logon step 69 to the set cflag step 65 m which the customer flag is set for that user As described above, control is returned from the set cflag step 65 to the test catalog request step 58 as before m anticipation of the user requesting to place a new order, control being passed successively by the new order step 60 to the test cflag step 66 which, m the case of the customer flag having been set, control is passed to a get list step 70 wherein the user selects items from the catalog 35 to be downloaded over the computer network 14 to the mass storage device 40 of the customer computer 16. The user is invited to approve of his selections m a test list step 71 from which control is returned to the get list step 70 incase the user is dissatisfied with his previous selection; otherwise,
Figure imgf000010_0001
≤ SD SD 0 O CD s: H- en ≥! CL Hi 13 rr hH Ω s: 13 0 Ω rt Hi 3 C μ- co rt CQ SD 3 CO μ- CL Φ SD Ω rr rj rt tr Φ HT cn Φ Φ μ- H- Hi rr HI 0 HT Hi Ml Hi HT Φ SD rr HI rr HT Φ CQ SD Φ Hi fD CQ c 0
H- rt rr r rt Hj Φ I—1 X cn O Φ 3 SD o Mi I—1 Φ Λ *< φ rt Φ Φ Ω Hi μ-1 rt rt rt HI
Ω HT HT Φ SD <! Hi Hi Φ rr 13 Φ LQ rr 13 rt LQ φ SD C HI Φ 13 HI 0 tr Hi Φ ≤ SD SD rr rt rr 0 0 Hj H- Φ φ 0 Ω - I—1 CQ Hi Mi rr C- Φ Hi Hi LQ Hi Φ tr LQ Hi ^ Φ Ω rr tr 0 Hj
HJ £ πs Hi H- rt rt SD SD o φ rt <! SD φ Φ CO Φ rt Hi ! rt CL Hi rr μ- CQ H-1 Hi 0
Ω μ- H- H- HJ Φ rt ; 13 3 Hi Φ Φ 3 CL en rt rt HT SD CO hj 13 Φ Ω rt μ- μ-
SD N N CO SD Ω O CL HT Φ Hi 3 φ Hi r3 rt C Hi Φ rt SD h-1 c rt CL rr φ co N en SD SD Φ c 0 rr C Φ CL Φ ^ X 0 φ Hi CO Φ μ- HI φ r HT 13 rr SD μ-
Φ rr r rt 3 rr Hj Mi <! t 0 φ Mi to HI 13 Hi rt rt 0 Hl CO <! SD CL CO Φ rt co
H- H- HT <B Φ Hi H- 13 0 H- Hi 3 to H- Φ C c LQ 3 Φ μ- rr SD φ σs CL μ-
Ω 0 0 rt 0 Φ Hi HI 0 H- 13 H-1 H- rt σs Ω 13 HI rt μ- Ω rr *> 0 13
0 Hi HI HT M rt c 3 Φ 0 c Hl SD 1— ' Φ CO HT en SD HI Ω rt rt 1 13 SD Φ • 13 HI SD
HI Φ H- Φ en rt LQ r CD Ω SD C CO S3 Φ rt LΠ Φ 0 rr H rt φ 13 Φ Ω SD CQ rt CO ω tsi φ H- Hi HT h-1 rr H Hi h1- H- Hi SD co CL 3 φ r Φ HI Hi Hi Hh rt ^ <! en
Hj rr rt 13 SD Hi HS SD Φ ^ ^ 0 ^ rt 0 rt s: 0 ^ Φ CL Ω μ- 3 μ- Φ ≥! 3 øJ Φ
0 Φ Φ rt H Ω 3 rt H- Hi 13 rr Φ Hi 0 rt ≤ Hi < μ- H-1 CL φ Φ Hj CL
13 13 SD H- t H- 0 SD O CL Φ SD H- h-1 tr LQ ≤ 0 0 μ- μ- 0 ^ SD rr φ X HI μ-
"< 0 - CO Hi ^ Ω 0 CD 3 rr φ 13 CO H- H tr <! 13 rt CO CO Hh rt rt SD rt
H- CO co φ HI rt rt to Hi s: 13 SD rr 3 SD 13 Φ CD rt rt Hi 1— ' Φ rt Φ μ- - tr 0
CQ M σi Hj H- H- Hi Φ φ HJ SD Φ - Φ φ ii SD Hi rt HT HT rt SD Hi CL SD SD j en Hi Hi O en < φ Φ Ω Hi rt LQ <! Φ Φ HT Hi tr CQ ? Φ H| φ Ω C φ SD 3 Mi Ω 13 rt <! I—1 rt φ HI 0 i SD 3 0 Ω rt H- φ H- 13 13 Φ ^ φ rt rt Φ Ω Φ CQ 0 rt
SD O 0 H| Φ => H- Hi SD H- 13 φ 3 SD Φ Ω Ω Hi Hi rr Φ ^ Hi M ► r
CO H; HI 0 13 rr rt H- SD H- PL CL CO CO HI 13 rt CL iH H- LΠ 0 Φ rt SD £-! φ 13 r SD rt δ CO φ
CD rr LQ H- Φ CO C Mi H- Φ 13 φ rt 0 SD Hl LD <! Ω Φ Ω HI Φ 13 rr !*-] Hi r
Φ < Hi Hi co Ω CL rt H- CΩ CL h- ' CL SD en l—1 Mi SD LQ ~ H- Φ CO Ω CL Ω -J HI rr φ Φ o μ- CQ
CL φ 0 SD cπ rr 13 rr Φ 13 SD rt h1- 0 0 Hi CQ H- rr φ φ 0 σs Ω μ- Hi N Φ SD
Hi 3 rr SD 0 CQ Hi ^ rr H- rt LQ Hi Ω rr H- <J CD Hi 3 Hi 0 Ω SD rt C- rr H- Mi Ω 0 CO Hi SD Hj P- 0 Φ H| 0 HT 0 Φ SD CQ CQ 13 *< HI Hi 0 μ- rt rr
0 Mi μ- J^ O SD CO H- Ω ^ 0 Ω 3 Hi > 13 Φ Hi Φ HI Ω μ- rt c 13 c 13 cn μ- H- HT
H- co to Hi CO Φ φ N c 3 0 Φ SD σi Φ Hh Hi CL Ω 0 0 rt H rt 0 H| μ- 0 Hl 0
SD Ω Φ CD CL SD Hi t O C Hi Φ Φ C Hi SD 0 HJ 0 Φ rr μ- Hi rt Φ 13 Hi Hi
SD Hi H- SD rt rr Hi H rt 0 Hi rt HT 3 Hi CQ CO 0 rt c CL Hi φ 0 HT CL SD CQ SD μ-
CD rr Φ CO C rt SD rt μ- Φ HT Φ Hi HT Φ H- Φ 13 Φ Hi SD HI SD HI Φ CO Ω N
Φ H- rt rt HT tr 0 0 Hi 0 Φ Ω ^ 0 rr m 0 i rt Hi rt HI Hi Hi Mi CD SD Ω SD
H" 0 C rt rr Φ HI rt Mi rt 13 H- Hi HT rt Ω HI SD CQ i HT Φ μ- 0 tr H| Φ CQ 0 rt
Φ Hi Hi Φ 0 H- SD CD H- H-1 LQ H- SD H- Φ CL i Hi rt CQ SD rt Hi φ 0 CL Hi μ-
Ω Hi Hi Hi 13 CO CO SD ft Φ 0 SD N CO Hi H- SD Φ rt en rt Φ Hi 3 CL CL 0 rr O Φ 3 H- Hi rr rr rr C HT Hi HI ^ SD LQ rt Hl rt H- 13 Φ φ 0 CO 0 rt Ω rr Φ SD HJ
Hi CL H- N 0 Φ Φ rt φ < ►C rt CL o LQ SD Hi 13 Hi μ- Hi rt rr Hi rt 0 rt Hi
Mi Hl SD LQ Hi CO 13 rr Φ ~ H- 0 rt rr LΠ < Hi SD rr Φ ^ rr φ Ω
H- ft rt SD rt Hi φ rr 0 Ω Hi H- 0 $. HT ^ CQ Φ to σs φ CQ Φ 13 Φ SD Hj φ Φ
HT 0 rt H- SD rt CO Hi c CQ > rt HI HI Φ H- CO rt Hi t Hi μ- H Hi 13 rt 3 < φ Φ Φ 0 3 s. CO t H- O Ω rr Ω HT LQ Φ Φ H| H- 3 4^ rr SD Φ CL CL μ- Φ rr CL Hi 0 Φ N rt 0 Ω Φ Mi 0 C- Hi 13 C H3 μ- 13 Ό rr CO Hi CL SD 0 HJ μ-
CO SD HT ^ Hi Hi SD 0 i. CO 0 0 SD CQ 13 CO CO Hi H-1 μ- c c rt rt Φ rt rt C Φ rt t ? < rt 3 13 rt Hi S H CL Φ ^ Hi σs rt rt 0 Φ Hi CO μ- μ- SD rt CL rr en
Φ rt 0 Φ H- φ c Φ CL C- Φ Hi ^ Φ > Φ HI LQ 3 rt Ω 13 Hj rt 3 HT rt ^ s: Ω Hi Mi 0 Hi rr 13 H- rt 13 CL vQ - H| SD Φ Hi φ SD Φ SD C Hi Hi SD μ- 13 φ
O Φ Hi tr SD o HI Φ HS HT rt r C Φ CL LQ SD H> 3 tr Φ μ- HI πs Hj 13
CO Hi en 0 φ H- Hi Ω £D Ω Hi co LQ 0 D Hi 0 rr Φ SD CL SD 3 rt 0 Ω H-1 SD Hi en φ
C H- rr 3 rt rt 0 c rt 0 o I-1 Hi ^ H| Φ CQ Hi H- 0 rt CO S C H| φ Hi Φ φ SD rt < -j
N 0 CO SD Hi rt 0 3 H ^ H- 0 Hi rt L Hi Ml μ- rr rr M Ω rr μ- t
Mi SD rt tr Ω rt HT 13 to μ- ~ N H- 3 Hi 13 CQ Φ < μ- 13 13 3 PJ SD u rt Φ 0
0 rt HT rt H- rt SD 0 13 Hi SD CQ φ rt Ω rt Φ o 0 C rt Φ co tr LO μ- i H- Φ SD H3 Ω H; rt SD c μ-
H rr rt rt φ SD tr HT rt HT Hi rt Φ SD φ -> 0 LQ CQ Hi
0 H- Ξ rt H- SD Φ Hi :> rr H- Φ HT I—1 "< Φ Φ H- Φ Ω SD CQ CL Hi H| ^ Hi Φ
HI 0 Hl SD H- N ^ Hi Φ HT Φ 0 X Φ ^ φ H- 0 0 HI Hi O r
- ^ £ tr Φ HI rt CD SD μ- HI 13 HJ Hi rt HI rt Hi CL μ- SD μ- H3 CO rt SD H Ω rr
CL rr rt rt 13 Φ CO 13 Ω Φ Φ rt Hi CQ HI rr rt c μ- μ- D Φ H- n HT H- HI Φ CO rt CO Hi ω Φ φ μ- "
0 SD en CL Hi SD rt c φ Φ CQ Ω
HI H- rt 13 0 rt 0 4^ O rr Hi Ω SD 13 φ rr
Hi SD Φ < Φ 1— ' Φ H- rr H|
CL φ SD SD I—1 Hi HJ H| HI
) to to I-1
LΠ o LΠ o LΠ O LΠ rr 1. H_ μ 13 13 μ 13 rt C ^ KD μ Ω rt rr 13 ≤ 13 O SD SD SD Ω Ω s: CO SD H 3 rt Ω LO CD 13 CL
Φ μ HT Hi Hi Hi 3 0 Hi O σs Hi C rr HT h-1 rr 1— ' c HI C C h-1 SD rr rr rr μ HT I— ' ~ rt φ
CO LQ Φ Φ Φ 13 SD CL Hi Φ Φ SD μ SD rt 0 rt rt 0 CO Φ Φ CO Φ Hi μ 0 Φ SD rt rt r ϋ CL H- ' ^ rt Φ rt Hi ^ Ω rt rr HT Ω Φ rt 13 rt C CO Ω rt 13 ^ Φ
13 HT Φ φ φ rr Hi 0 HT Φ Ω rt HT 0 HT 0 0 rr SD O rt H| Φ H|
C tJ^ Hi Φ rt rt 3 CO Φ Hh O Φ HJ Φ Ω 13 Hh Φ Hi H| rt Φ o Hi φ Φ μ SD co CL 3
CO 0 Φ Φ φ rt H- ' μ rt rt 0 CD 0 Ω Hi Hi μ μ μ Φ H) rt μ-1 CO 3 Hi Hi CO • μ
Φ rr LQ CQ Hi Hi Hi Φ r 0 Hi HT CO Ω rt HI SD μ SD N N CO Hi - φ 13 Φ CO ~ HJ
Hi rr Hi Φ 3 3 r 13 Φ :> LQ Φ φ Φ " rt CQ 0 c H SD SD 3 13 13 Ω 0 μ-1 LQ Hh μ
Hi SD r μ μ SD CO Hi rt X C μ Φ Hj rt μ rr rt CL μ s: H-1 rt Hi Φ μ Φ s: o Hi
CO 0 3 Hi HI rt LO rt μ rt s: SD HT CO P HT μ μ Φ Hi SD μ SD Φ 3 CO Hi HT HI LQ rt C 3 Φ Φ μ LO Hi HT μ 3 3 CD φ C Ω rt 0 Φ 0 0 SD SD ^ r CL 13 Φ rt CQ μ Ω
0 LQ > Φ CL CL 0 Φ Φ CQ Φ 13 O Hi Φ 0 0 Hi ~ Hi HI Ω rt HT HJ Φ Ω Φ
13 rr to rr Hi ≤ Hh Hi SD Φ rt h-> CO HI H3 μ rt μ 0 CD Hi SD rr Hi SD HT HT
- Φ 13 Hi μ 0 CL CL » Φ Φ H| CO - rr rr rr N Φ CO tr μ 0 Hh Ω rt μ ^ SD rr μ
CO rt HJ \-> C- 0 rt Hi rr Φ HI - — c r Hi HT φ SD rt rr Φ < HI 0 φ r rt Ω μ rr Ω rt rr 13 SD Hi tr CD Φ Ω Ω - HI 0 s: 0 Φ rt Ω Φ μ SD rt HI 13 φ SD μ HT C Hi Φ HT
Φ Φ Hi CO << ϋ' ft rt CD 0 CO 13 μ c μ 13 Hi rt 0 HT rt c 0 SD Hi
13 0 r Φ rt Hh Φ Φ rt Φ Hi rt μ Hi rr Φ CO 0 LQ Φ Hh Φ Hi vo μ rt HI rt Hi rt CQ 0
CQ Ω Φ rt Hi HT rj Hi 13 3 rt Φ Hi 0 CO r μ HI Φ Hi C co CL 0 o CD rr Φ HT Hi
LO rr φ 13 μ Φ Hj 3 rt φ ti 13 Hi rt CO CL H{ Hi t C *-* 13 O 0 SD μ Hi Φ H-1
(fc. SD φ 3 0 rt μ LO μ Hi 0 ≤ Φ HI SD rt 13 - 1— ' φ SD rt Hi Hi CQ rt Φ rt
Hi CL 00 φ Hi 13 rr HI to 3 rt H- ' ∞ HT SD 13 Φ rt 0 μ CO μ SD CL SD H-1 13 HI HT μ Ω Ω rr rt rt CQ CO t— ' Φ SD -• Φ CO μ LQ Hi Hh CO rt SD ^ φ SD CL Φ N SD 3 ^ SD rt Φ
0 13 SD HJ rt 0 3 μ Ω 13 o SD SD CL rt μ Ω CO HI SD 13 SD CD μ
Ω SD rr ; μ 0 c φ CO μ HT Hi >fc> rt Hi rt SD Φ HT s: Φ rr μ rt CQ SD rt 13 μ SD φ 0 rt CQ 0 HH SD Φ Hj 0 rt r rt CO Φ - μ CO rr CQ Φ rr HT CO Φ μ SD μ Hi Hi < HJ μ
HT 0 HI ^ Hi Φ HI rr Φ Hi Ω CL <; Hh φ CO Ω μ - CL HI rt Ω 0 0 rt SD 0 CO
Φ Ω CL r CO Hi Φ CO Hi Φ CL SD Φ SD Φ Φ 0 Hi Φ Ω rt 13 LQ μ Ω HI 13 SD μ Hi μ rt
Φ rr rt 13 Φ 0 Hi rt rt Φ CO rt Hi Hi μ μ rr Ω rr Hi Hi 3 Φ H| μ CO Φ rr CQ φ HT ,-^ Hi Hj Mi Φ CD C Ω Φ Φ rt 0 Hi μ 13 tr rt 0 Φ 0 μ rt Φ CO Ω μ HI SD r CL
Φ CQ Ω μ to 0 φ μ 13 rt H Hi Hi Φ c Φ HJ φ HT 13 Hi Ω H-1 0 Hi CO C SD Φ tr rr 3
CO rt Hi Ω CO LΠ LQ HI rt CD Φ HI Φ rt 3 CD rt CL Φ 0 CL Φ 0 rt c Φ φ φ i rt CL Φ SD Hi rt φ μ c - HJ Ω rr φ vo 13 Φ 3 HT μ r Ω <! Hi μ Hi CO CO SD μ CL HI Φ Φ CL μ
13 tr H| μ SD Φ - -j CL Φ Φ Hi 0 rt μ μ tr Hi 0 Φ CO HT CO φ tr Φ Φ rt φ H| 3 Hi 3 LO Hi Φ rt 3 0 Hi C Φ ft rt Hi φ SD rt SD O ^ 13 X ~ Φ μ LO CL φ 13 0 rr 13 Ω σs r rt 3 CL μ φ φ H- ' Φ - CL CQ Φ SD Hi r Φ Φ CO
Ω H1 Hi Hi 0 0 - 0 Φ Φ Ω CD r SD CL 0 Hi rt tr CO CO Ω CL rt rr SD 3 Ω
- SD rt Φ CL SD HI H CL rr rt X HT € 3 rr Φ μ Hi rt rt r rr ^ 13 0 rt tr 3 Φ φ •x] ^ r Hh rt r Φ μ 0 Φ rt s: μ Φ μ Ω Hi c μ 13 μ φ HI rr
CO rr 0 SD φ X CO μ Hi HT rr μ Hi 3 CO Hh Φ μ Hi HJ c HI Φ < SD Hi rt SD r Φ rt rr <! <! HI SD μ LQ 0 HI Φ φ HI Φ rt O CO rt SD c LQ H| SD Hi SD SD <! LQ 13 μ Hj Hj
Φ Φ φ SD rt 3 LQ 0 rt Φ rt rt rt HT rt CO Hi rt CL rt ^ SD 3 "< 0 C- 3 μ SD 13 Hi rt 3 rt SD HT ^~. 13 HT 0 Φ φ Hi Φ CQ 0 Φ φ μ μ SD φ eo rt μ rt μ-1 SD LΠ μ - φ Φ SD 0 Φ 13 C SD CO H| Φ Hi rr CO CL i I—1 CO ^ μ Φ
LO Φ Hi SD μ φ rt ~ CO rt CQ CL rt HI vo CO Hi rr rt 0 Ω rt SD Φ SD Π 3 13 Hj
L CO tr O — ' Φ Ω Φ rt Φ Φ LΠ rt 13 φ rt μ C 13 0 Φ μ tr rt Hi CQ
CL <ϋ SD rt Ω Hi SD 13 0 Hi Ω ≤ Φ H- ' Hi 0 HT CO Hi ^ 3 13 Hi rr CO :>
Hi 0 Φ - Hi Hi SD Hi Φ Hi SD 3 CL CO SD 13 Φ Hi 13 13 μ Φ φ 13 SD Φ CQ μ
0 Φ Hi SD ^ O rt μ p φ CQ μ Φ rt CQ rt μ Φ Hi H- ' vo SD rr Hi C 3 Φ to
Hi Hi Hi HI rt rt to SD CQ Hi CO CL 3 Hi r rt μ 13 HI CL Φ SD Φ to rr rt Hi 0 rt φ CQ rr
CL φ C HT rr - φ 0 Φ 13 C Φ Φ CQ 0 0 Hi < 3 ^ rt CO 0 C LQ HT Hi Φ rt Ω 3 Φ Φ - rt CL i— ' rt CO Hi Hi rt Hi HI rt 13 HI 0 μ rt SD μ Hi rt CL Hj 0 rt rt CO
Φ CO rt u" Hi Φ Φ rt rt Φ Φ 3 CL Φ LQ rt 0 μ CO 0 0 SD Φ rt ξy SD Hj SD 0
CO rt μ Φ 3 13 Hi rt μ CD Φ < μ 13 CO rt Hi φ HI rt HI Hi Hi Ω HT Φ 3 μ rt rt rt Φ 0 Hi φ rr Hi HI 0 CO rt 13 3 μ μ CO rr 0 SD CL rt μ Φ - rt Hi Φ Hi N μ SD
13 H rr 0 μ i rt 0 SD Φ Φ 0 Hi φ rt vo Φ 3 rr Hi 13 rr ^ ^ Φ 0
Hi 0 Φ SD < rt rt Hi CL LO rt C CO Φ J 13 rt rt Φ LQ μ Φ Ω 13 C 0 NJ CL Hi CQ Q LO rr t, Mi Hi Hi μ μ rr Φ to Φ CO rt 13 Φ 0 0 vo HI CO rt CO Hi . Φ SD t μ CL < Φ rt Mi Hi HT vo H{ Hi rt 13 L rt 0 μ Φ rt 0 rt r <!
13 μ SD Φ φ C o ^ Φ HT o *> rr 3 CO φ I—1 s: μ Ω 0 Hi 0 Hi Φ
CO CO CO Hi Hi O Φ t > - μ H| Φ CQ SD ^~. rr Hi Hi rt 3
SD rt H> rt CO rt CO HI
HT SD c μ-1 rt rt μ LQ SD rij φ
^ CO O Φ Φ φ rr SD μ SD Hi φ rr Ω μ rt
Φ CO φ 13 CL 13 rt φ Hi Hi rt CO Ω Φ rr rr μ LQ Φ
Hi CL Φ rt Hi H|
whether a threshold period of time has elapsed from the start clock step 91 for avoiding debiting of the user's authorizations until play has proceeded for an introductory period of time. Once that introductory time has elapsed, the test tick step 95 reaches an affirmative result, with control passing to the decrement meter step 96 in which the play authorization is decremented by one. In the alternative implementation of Fig. 5, control passes from the decrement meter step 96 to a stop clock step 98 for stopping the clock so as to limit the decrementing of the meter to a single unit for each file played.
In another alternative, the play authorization is for a period of time as m the implementation of Fig. 4, but with play continuing to the end of a file being played when timeout occurs. In this case, the test timeout step 97 is omitted from the implementation of Fig. 4, control returning directly from the decrement meter step 96 to the test end step 92.
The player program 82 can utilize a conventional clock of the customer computer 16C m the start clock step 91 and the test tick step 95, for example by storing a counterpart of the system time m the start clock step 91, and comparing that counterpart with current system time m the test tick step 95, finding a positive outcome when the time difference reaches a predetermined interval (one minute in the example described previously) . In connection with the positive outcome, the stored counterpart of the system time can be incremented by one minute for subsequent comparisons m a next tick interval. Of course, the stored counterpart can alternatively be initially set m the start clock step 91 to one minute ahead of the system time for facilitating the comparison by detecting a change m sign of the difference between the values m the test tick step 95. This approach is impervious to errors or intentional offsetting of the system time from actual time that may be present m the customer computer 16C prior to execution of the start clock step 91. To guard against unauthorized resetting of system time during playing time, there are several alternatives. For example:
1. Use a separate software clock that is responsive to a system timer interrupt; 2. The above in combination with a periodic integrity check of the software clock program instructions;
3. Either of the above in combination with periodically relocating the software clock program instructions and registers;
4. Any of the above in combination with downloading of new encrypted timer software in each activation of the output files step of the library server program 30; and
. Requiring use of a clock or system time of the server computer 12 during operation of the player program 42.
Instead of having the authorizations be for a predetermined amount of playing time, it is also contemplated, even preferred, to have authorizations based on calendar time, in which case there is a need to guard against resetting of system time whether or not the player program 42 is in operation. For this purpose, the library server program can be implemented to provide an encoded counterpart of the system time (and date) of the server computer 12, as well as an expiration time, in the output files step 78 (whether for downloading data files or just for recharging) . The player program 42 can then make comparisons between the system times, taking appropriate action in the event that there is a significant change in the difference. It will be understood that in implementations based on calendar time there is no need to monitor elapsed playing time as described above in connection with Figs. 4 and 5.
With further reference to Fig. 6, another counterpart of the player program, designated 42", has a timer module 100 associated therewith, the timer module 100 being implemented to run when the customer computer 16C is operating, notwithstanding the player program 42" being inactive. As shown in Fig. 6, upon starting the player program 42", a determination is made of whether the program is being run for the first time by the customer computer 16C in a test first play step 102, in which case a launch timer module step 104 generates and stores appropriate files for implementing and running the timer module 100, using programming elements that are known to those having skill in the art. Accordingly, the "irner module 100 is restarted whenever the computer 16C is subsequently booted-up or restarted, the module 100 monitoring a system date and time of the computer 16C as well as separately maintaining a timer calendar date and time. The timer calendar date and time is automatically advanced by a difference between the system date and time and a corresponding date and time last saved in a previous period of running of the timer module 100.
When the test first play step 102 has a negative outcome (on a subsequent starting of the player program 42") control passes to a test timer step 106, wherein the presence and operation of the timer module 100 is verified, and an appropriate match of the timer date and time with the system date and time is determined, in which case control is passed to the display list collection step 80, described above in connection with Fig. 4; otherwise, the player program 42" is terminated based on unauthorized tampering with calendar/time settings. The player program 42" of Fig. 6 is implemented for operation with authorizations based on calendar time, with the set meter, start clock, test tick, and decrement meter steps 88, 91, 95, and 96 of Fig. 4 being omitted. Thus control passes directly from the select file step 86 to the start play step 90; from the start play step 90 to the test end stop 92; and from a negative outcome of the test user stop step 94 to a counterpart of the timeout test step, designated 97'. In the timeout test step 97', the calendar date and time of the timer module 100 is compared with termination date and time as currently authorized, with control returning to the test end step 92 or the stop play step 93 as described above in connection with Fig. 4. It will be understood the timeout test step 97' (as well as the test user stop step 94) can be omitted when it is desired that play continue to the end of a particular data file, control passing from a negative result of the test user stop step 94 to the test end step 92.
Thus the player program 42" as shown in Fig. 6 provides additional protection against unauthorized tampering with calendar and time settings of the customer computer 16C. Further protection can be provided by including, m the obtain authorization step 85, a comparison of the calendar date and time of the timer module 100 and/or the system time of the customer computer 16C with the system time and date of the server computer 12, with termination in the event that tampering is detected.
Similarly, the above comparison would be performed in the get list step 70, the set authorization step 72 and/or the do transaction step 74 of the distribution process 50, with the process being terminated as to customers that are determined to have attempted to misuse the process.
It is further contemplated that a standalone device can be provided for implementing all or appropriate functions of the customer computer 16C, in which case a battery powered system clock can be implemented in a secure manner for setting only m accordance with the system time of the server computer 12. (Such device m implementations according to Figs. 4 and 5 would not require the clock to be settable to date and time of day.)
Although the present invention has been described m considerable detail with reference to certain preferred versions thereof, other versions are possible. For example, kiosks can be provided for dispensing and/or recharging standalone devices that serve in place of at lease some of the customer computer 16C. Also, the data files, suitably encrypted, can be provided from the service facility 11 m the form of a CD or other form of removable drive medium, for play on the standalone devices and/or customer computers 16C. Therefore, the spirit and scope of the appended claims should not necessarily be limited to the description of the preferred versions contained herein.

Claims

1. A system for distributing and playing electronic media, comprising:
(a) a service facility having an electronically accessible library of data files, an electronically accessible catalog of the data files, and a network interface for communicating over a communications network;
(b) means for transmitting the catalog in response to a user request;
(c) means for defining a customer account for a user to identify the user as a customer, to process payments from the customer and establish authorization for accessing the library;
(d) means for receiving from the network interface an order from the customer requesting selected ones of the data files ; (e) means for transmitting the selected files by the network interface to the customer as received data files; and (f) means for providing to the customer a player program for accessing the received data files, the player program being implemented for metering access to the received data files as limited by the authorization.
2. The system of claim 1, wherein the means for transmitting the selected files is enabled only while the authorization remains established.
3. The system of claim 1, wherein the means for transmitting the catalog is connected to the network interface for receipt of the user request therefrom and feeding the catalog thereto .
4. The system of claim 1, wherein the means for defining the user account is operatively connected to the network interface for communications with the user.
5. The system of claim 1, wherein the means for transmitting comprises means for encrypting the data files and the player program comprises means for decrypting the received data files, the means for decrypting being operable only while the authorization remains established.
6. The system of claim 1, wherein the authorization is independent of the selected ones of the data files.
7. The system of claim 6, wherein the authorization is further independent of the number of the selected ones of the data files.
8. The system of claim 7, wherein the authorization is for a period of time.
9. The system of claim 8, wherein the period of time is measured only during accessing data of the received data files by the player program.
10. The system of claim 7, wherein the authorization is for a collective number of accesses of data of the received data files.
11. The system of claim 10, wherein the number of accesses are counted only after a threshold period of time of accessing each of the received data files.
12. A method for distributing electronic media to be played, comprising:
(a) providing the media at a service facility as an electronically accessible library of data files; (b) providing a catalog of the library files;
(c) defining a customer account for a user to identify the user as a customer, to process payments from the customer and to establish authorization for accessing the library,
(d) providing selected data files from the library to the customer as received data files m response to a customer order; and
(e) providing to the customer a player program for accessing and metering access to the received data files.
13. The method of claim 12 wherein the step of providing a catalog includes enabling access to the catalog by users of a communicatior network.
14. The method of claim 13, wherein the step of providing selected data files comprises transmitting the data files over the communication network.
15. The method of claim 12 wherein the step of providing the player program comprises providing a player device having the player program implemented therein.
16. The method of claim 12, further comprising encrypting the data files, and providing with the player program means for decrypting the received data files only while the authorization remains established.
17. The method of claim 12, wherein the authorization is independent of a number of the received data files.
18. A process for playing electronic media using the method of claim 12 wherein the authorization is for a predetermined period of time, the process further comprising:
(a) activating the player program; (b) monitoring elapsed time only during accessing of data of the received data files; and
(c) inhibiting operation of the player program when the elapsed time reaches the predetermined period.
19. The method of claim 18, wherein the inhibiting is suppressed until the end of a currently accessed data file.
20. A process for playing electronic media using the method of claim 12 wherein the authorization is for a predetermined period of calendar time, the process further comprising : (a) activating the player program;
(b) under user control, selecting a data file to be played;
(c) monitoring a calendar time; (d) playing a selected file; and
(e) inhibiting operation of the player program when the calendar time reaches termination of the predetermined period.
21. The method of claim 20, wherein the inhibiting is suppressed until the end of a currently accessed data file.
22. A system for distributing and accessing electronic files, comprising:
(a) a service facility having an electronically accessible library of files, an electronically accessible catalog of the files, and a network interface for communicating over a communications network;
(b) means for transmitting the catalog m response to a user request;
(c) means for defining a customer account for a user to identify the user as a customer, to process payments from the customer and establish authorization for accessing the library;
(d) means for receiving from the network interface an order from the customer requesting selected ones of the files;
(e) means for transmitting the selected files by the network interface to the customer as received files; and
(f) means for providing to the customer an access program for accessing the received files, the access program being implemented for metering access to the received files as limited by the authorization.
23. A method for distributing electronic files to be accessed, comprising:
(a) providing the files at a service facility as an electronically accessible library of files; (b) providing a catalog of the library files;
(c) defining a customer account for a user to identify the user as a customer, to process payments from the customer and to establish authorization for accessing the library;
(d) providing selected ones of the library files from the library to the customer as received files m response to a customer order; and
(e) providing to the customer an access program for accessing and metering access to the received data files.
PCT/US2001/001586 2000-01-18 2001-01-18 Rechargeable media distribution and play system WO2001054022A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CA002397717A CA2397717A1 (en) 2000-01-18 2001-01-18 Rechargeable media distribution and play system
EP01942752A EP1250674A1 (en) 2000-01-18 2001-01-18 Rechargeable media distribution and play system
AU2001229573A AU2001229573A1 (en) 2000-01-18 2001-01-18 Rechargeable media distribution and play system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US48463200A 2000-01-18 2000-01-18
US09/484,632 2000-01-18

Publications (1)

Publication Number Publication Date
WO2001054022A1 true WO2001054022A1 (en) 2001-07-26

Family

ID=23924946

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/001586 WO2001054022A1 (en) 2000-01-18 2001-01-18 Rechargeable media distribution and play system

Country Status (4)

Country Link
EP (1) EP1250674A1 (en)
AU (1) AU2001229573A1 (en)
CA (1) CA2397717A1 (en)
WO (1) WO2001054022A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5600573A (en) * 1992-12-09 1997-02-04 Discovery Communications, Inc. Operations center with video storage for a television program packaging and delivery system
US5802283A (en) * 1991-09-27 1998-09-01 Bell Atlantic Network Services, Inc. Method and system for accessing multimedia data over public switched telephone network
WO1999049663A1 (en) * 1998-03-24 1999-09-30 The Fantastic Corporation Method and system for broadcast transmission of media objects

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802283A (en) * 1991-09-27 1998-09-01 Bell Atlantic Network Services, Inc. Method and system for accessing multimedia data over public switched telephone network
US5600573A (en) * 1992-12-09 1997-02-04 Discovery Communications, Inc. Operations center with video storage for a television program packaging and delivery system
WO1999049663A1 (en) * 1998-03-24 1999-09-30 The Fantastic Corporation Method and system for broadcast transmission of media objects

Also Published As

Publication number Publication date
EP1250674A1 (en) 2002-10-23
AU2001229573A1 (en) 2001-07-31
CA2397717A1 (en) 2001-07-26

Similar Documents

Publication Publication Date Title
US10866979B2 (en) Subscription media on demand IX
EP0840194B1 (en) System and method for controlling the use of a package of distributed application software
US6974076B1 (en) Portable music player with pay per play usage and method for purchase of credits for usage
JP3792896B2 (en) Information reproducing apparatus and information reproducing method
EP1334415B1 (en) Method and system for monitoring utilizing condition of contents
US5825876A (en) Time based availability to content of a storage medium
US20040133600A1 (en) Rechargeable media distribution and play system
WO2000058811A2 (en) Structure of digital rights management (drm) system
WO2000059152A2 (en) Method for interdependently validating a digital content package and a corresponding digital license
JP2002197379A (en) Contents delivery and return system
US10586221B1 (en) Regulating access to content using a multitiered rule base
US20040128251A1 (en) Apparatus, system and method for licensing
EP1368720B1 (en) Method and system for content distribution and fees management
WO2000059151A2 (en) Rendering digital content in an encrypted rights-protected form
WO2001054022A1 (en) Rechargeable media distribution and play system
JP2000092004A (en) Reception terminal equipment and center unit
AU2002316727A1 (en) Rechargeable media distribution and play system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2397717

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2001942752

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2001942752

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: JP