WO2011123796A2 - Apparatus and method for processing digital content - Google Patents

Apparatus and method for processing digital content Download PDF

Info

Publication number
WO2011123796A2
WO2011123796A2 PCT/US2011/030963 US2011030963W WO2011123796A2 WO 2011123796 A2 WO2011123796 A2 WO 2011123796A2 US 2011030963 W US2011030963 W US 2011030963W WO 2011123796 A2 WO2011123796 A2 WO 2011123796A2
Authority
WO
WIPO (PCT)
Prior art keywords
digital content
content
server
local
management server
Prior art date
Application number
PCT/US2011/030963
Other languages
French (fr)
Other versions
WO2011123796A3 (en
Inventor
Enzo Stancato
Original Assignee
Enzo Stancato
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Enzo Stancato filed Critical Enzo Stancato
Publication of WO2011123796A2 publication Critical patent/WO2011123796A2/en
Publication of WO2011123796A3 publication Critical patent/WO2011123796A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • a further object of the invention is to provide hardware and software security for controlling, requesting, accessing, and receiving digital content.
  • an apparatus for processing digital content comprising: at least one client or system user electronic device including hardware and software for requesting and receiving digital content, and allowing viewing and listening thereof; a management server in electrical communication with the at least one client or system user, including hardware and software for identifying and authenticating the at least one client or system user, and a content distributor, when the content distributor is available and connected to the management server, the management server used to validate the sale, rental, purchases, and delivery of services and the digital content, including encryption and authentication tasks; a local content server in electrical communication with the management server, including hardware and software for storing, delivery, and distributing the digital content or encrypted digital content to the at least one client or system user; and a remote library in electrical communication with the local content server, including hardware and software for controlling and operation electronic decryption keys and codes, delivering, removing, modifying, and inserting encrypted digital content to the local content server, under the direction or permission
  • a payment/gateway processor device may also be provided for verifying, accessing, receiving, and authenticating payment from the at least one client, the payment/gateway processor device in electrical communication with the management server.
  • a secure system cable may also be included for connecting devices associated with the apparatus, comprising: an electronic transmission cable have two ends, each end terminating in a first connecting plug for connecting with a reciprocal second connecting plug located on individual devices associated with the apparatus; the first connecting plug including a male or female connecting plug part, having a first set of side apertures for receiving screws; the reciprocal second connecting plug including the mating plug connector, a corresponding female or male connecting plug part having a second set of side apertures for receiving screws; such that when the male connecting plug and the corresponding female connecting plug slidably connect, the first and second set of side apertures align for jointly receiving the screws; and screws having break-away heads for permanently securing the first connecting plug to the reciprocal second connecting plug upon attachment and removal of the breakaway heads.
  • the present invention is directed to a method of processing digital content comprising: receiving requests of digital content by at least one or a plurality of system users, the requests performed through a management server to access the availability of the digital content; inquiring of the availability the digital content from a local content server, accessible by the management server; if the digital content is available on the local content server, displaying the digital content on a system user's monitor; if the digital content is not available on the local content server, having the local content sever request the digital content from a remote library, the remote library under the control of a content provider to allow for permission to transfer the digital content from the remote library to the local content server; if the remote library includes the digital content, transmitting the digital content to the local content server by the remote library as requested by the system user, and allowed by the content provider; and transmitting the digital content from the local content server to the system user.
  • the method may include method requesting the digital content by the at least one or a plurality of system users to a content distributor to a final user (CDFU), the CDFU acting as an intermediary between the at least one or a plurality of system users and the management server and the local content server, such that the at least one or a plurality of system users communicates directly with the CDFU.
  • CDFU final user
  • the method may further include: providing each of the at least one or a plurality of system users with a subscription membership for identifying the at least one or a plurality of system users and authenticating each request for the digital content with a password protection scheme; and, if requested, providing additional password protections for other system users permitted or selected by the at least one or a plurality of system users; and authenticating each available password at the management server.
  • the method may include: controlling encrypted digital content with the management server, the local content server, or both; and delivering, adding, modifying, or removing digital content at the at least one or a plurality of system users' devices; reviewing the digital content stored on the local content server; allowing a content provider to add, modify, or remove digital content; and periodically updating the at least one or a plurality of system user devices with digital content information.
  • This may entail: recording, generating, and allowing a content provider to receive statistical information from system activity, the information comprising digital content requested, time requested, digital content pricing information, the at least one or a plurality of system users' identification, amount of digital content requested, digital content revenue, the at least one or a plurality of system uses' spending and buying habits, and preferences of the at least one or a plurality of system users.
  • the method may further include: controlling expenditures and access to other system users via a system administrator, the controlling access includes prohibiting access to selected digital content based on type, rating, time, or maximum overall time of access to the digital content from other system users.
  • the method may include adding said digital content by: inserting said digital content to said remote library; compressing said digital content in system format; encrypting said digital content with a key known and recognized by a content provider or a remote library, or both; and delivery said digital content to said local content server.
  • Fig. 1 depicts the distribution of digital content without utilizing a content distributor to the final user (CDFU).
  • Figure 2 depicts the process flow for the system user and/or client requesting and receiving digital content in the presence of a content distributor to the final user.
  • Fig. 3 depicts the connectivity structure of the remote libraries and local content servers for each content provider.
  • Fig. 4 depicts a connectivity diagram of the network security to secure the distribution of digital content.
  • Fig. 5 depicts a security plug for use with the present invention.
  • Fig. 6 depicts the mating connectivity of the security plug of Fig. 5.
  • Fig. 7 depicts a connectivity diagram of a client device with a generic screen or monitor.
  • the System is comprised of several main components and/or elements defined as:
  • Client The computer apparatus hardware and software designed, among other things, to receive digital content and to allow viewing and listening thereof by System User.
  • System User Person who is the receiver and/or end user of digital content.
  • SA System Administrator
  • CDFU Content Distributor to the Final User
  • Examples of content distributors include: delivery companies, service and cable companies, cable companies, satellite companies, telecom companies, and the like, or any other digital content deliverers.
  • LCS Local Content Server
  • Management Server A computer server utilized for the identification and authentication of the system user and/or client, and/or content distributor to the final user (CDFU), validation of the sale/rental/purchases/delivery of services and/or digital content, and for the functioning of various other management, encryption
  • +n o1 ' I ⁇ -o l content but has access to information about digital content, its availability for distribution to system user and/or client, and is capable of delivering encrypted digital content thereto.
  • CP Content Provider
  • Remote Library A computer server under the control and/or operation of the content provider that provides electronic decryption keys/codes and also delivers, removes, modifies, and/or inserts encrypted digital content to the local content server (LCS).
  • MMS Software Software the content provider uses to manage the Remote Library and Local Content Server.
  • the System can be utilized with or without the CDFU so as to permit a direct connection between the system user and/or client and management server, or through the mediation of the content provider.
  • Fig. 1 depicts the distribution process of acquiring digital content without utilizing a content distributor to the final user (CDFU).
  • digital content is requested by a plurality of system users 1 and/or clients 10 (SU/CLT) through management server 18, as indicated by process flow arrow 1 1.
  • Digital content may be requested via management server 18, as indicated by process flow arrow 13 to assess availability on the local content server 12, and if available, is delivered and displayed on the SU/CLT monitor, TV screen, or LCD screen, connected to the system via process flow arrow 19. If digital content is not available to the SU/CLT on local content server 12, the digital content may be requested by local content server 12 from the remote library 14, as indicated by process flow arrow 15.
  • Remote library 14 is generally under the control of content provider 16.
  • content provider 16 may allow for the transfer the digital content from remote library 14 to local content server 12, as indicate by process flow arrow 17.
  • Specific media management software MMS
  • MMS media management software
  • Management server 18 performs a search for the availability of the requested digital content on the local content server 12, and if available, local content server 12 delivers it to the SU/CLT 10 via process flow arrow 19.
  • a request to remote library 14 is electronically made via process flow arrow 15. This request can be fulfilled by content provider 16 by loading on local content server 12 the requested digital content, in an encrypted form. This last operation is executed using management media software.
  • FIG. 2 depicts the process flow for the SU/CLT 10 requesting and receiving digital content in the presence of a content distributor to the final user (CDFU) 20.
  • CDFU 20 acts as an intermediary between SU/CLT 10 and both the management server 18 and local content server 12.
  • SU/CLT 10 interacts with CDFU 20 via process flow arrow 21 to accesses management server 18.
  • CDFU 20 interacts with management server 18 via process flow 23, 25.
  • CDFU 20 may also communicate directly with SU/CLT 10 via process flow arrow 27. In this manner, through CDFU 20, SU/CLT 10 is able to communicate with management server 18.
  • SU/CLT 10 is identified, verified, and given access by management server 18, as it would be in the process flow indicated by Fig. 1 , and in the same manner, CDFU 20 is identified, verified, and given access to the system.
  • the identification and verification method is intended to identify CDFU20 and the system user who is a subscriber of the content distributor services, while allowing access to management server 18 pursuant to agreement, providing limited or iota! access to the system and the available digital content.
  • CDFU 20 examples include content delivery and distribution companies, service and cable companies, cable companies, satellite companies, telecom companies, and the like, or any other digital content deliverers that can provide their users with connectivity and electronic access to the system.
  • the client hardware and the operating software as well as management server 18, local content server 12, and remote library 14 function the same in the system in both models, with the exception of the role of the third party CDFU 20, which is to provide connectivity for the distribution of digital content to system user/client 10.
  • CDFU 20 which is to provide connectivity for the distribution of digital content to system user/client 10.
  • Every SU/CLT 10 is provided with, and maintains, a subscription membership particularly identifying the SU/CLT 10 and authenticating a SU/CLT 10 request for digital content with by a main password.
  • SU/CLT 10 is also provided with, upon request, additional passwords for other system users, permitted or selected by the SU/CLT 10 to use the system for identifiable and permissible uses, content, or at locations.
  • Each system user and other system user password is authenticated by management server 18, including another system user who may have any number of use restrictions, as directed by SU/CLT 10 as part of the system management and controls.
  • SU/CLT 10 may control or restrict the use of digital content, the type of digital content ordered, and may limit the spending or cost of digital content for any given period of time or per location for other system users.
  • Every content provider 16 utilizing the system has or will maintain a remote library and a local content server, so there are as many remote libraries and local content servers as there are content providers existing or desired.
  • Fig. 3 depicts the connectivity structure of the remote libraries and local content servers for each content provider.
  • Remote library 14 is physically housed and located at a premises selected or dedicated by the content provider
  • local content server 12 is physically housed and located at the same premises whereat the management server 18 is located.
  • All digital content stored on the local content server 12 or remote library 14 is encrypted in a manner that the content provider may release or provide a code or key to decrypt the digital content requested by client, system user, or other system users.
  • Fig. 3 depicts the connectivity structure of the remote libraries 14 and local content servers 12 for each content provider 16.
  • management server 18 accesses three local content servers 12a-c, which in turn, individually access corresponding remote libraries 14a-c, respectively.
  • Management server 18 also accesses clients 10.
  • the Media Management System (MMS)
  • the media management system application allows the content provider to control directly the computer server that contains encrypted digital content, to deliver, add, modify, or remove digital content, thereby maintaining control of the transmission of digital content to computer servers, clients, system users, other system users, and most importantly, the encryption and conversion of the digital content that will be sent to the content provider local content server.
  • the media management system tracks and maintains statistical information, including information concerning the digital content, clients or SU/OSU identification, via system controls and/or interfaces, enabling the content provider to gather a constant flow of statistics and/or information, as an example: information about how much of their digital content, which type, when, where, and by whom it is sold, rented to, or viewed by.
  • the media management system software application is divided in three distinct areas or functions: management, statistics and request analysis.
  • the content provider may view the digital content stored on its local content server, add, modify, or remove whatever digital content it chooses.
  • the system interfaces at all locations are updated with the new information in real time. All management operations are undertaken through the media management system by the content provider in and/or through the remote library and/or local content server, as an example: the content provider adds digital content by inserting the digital content file it wants to add from the remote library, and the system software will automatically: compress the digital content in system format, encrypt the digital content with a key only the content provider or remote library is aware of and recognizes, and deliver the digital content to the local content server, inserting all corresponding information in the database in the process.
  • the media management system application records, generates, and allows the content provider to receive statistical information from system activity and use, as an example: information concerning digital content requested, time requested, digital content price, client/system user requesting, and number of requested digital content all of which allows the content provider to monitor the system use, digital content revenues, spending or buying habits, and preferences of client or system user, and the like. All of which is important for the content provider to make future strategic and business decisions, as an example: to add digital content to the system, maximize customer satisfaction, or determine methods to increase revenues.
  • the content provider monitors all digital content requests through the system for digital content stored in the remote library, but not in the local content server, enabling the content provider to determine if, how, and when to satisfy digital content requests by simply accessing the media management system.
  • the transmission and delivery of digital content from the remote library to the local content server can be done in many ways such as, via Internet, satellite, dedicated cable, wired, radio, 3G, 4G, digital terrestrial, Wi-Fi, Wi-max or wireless signals/networks.
  • Fig. 4 depicts a connectivity diagram of the network security to secure the distribution of digital content.
  • the client/system user 10 requests digital content from management server 18 (a content distribution manager server) serving to validate the request for digital content and the identity of the requesting client or system user's IP address and password. This is the "user validation" communication 42.
  • Management server 18 upon verification described above, requests 44 a first key ("Access Key") of the content provider - local content server, that may be physically housed at the same location of the management server. This procedure is part of the process to ensure the quickest and most efficient method of the delivery of digital content to client/system user 10, and to maximize the secure delivery of digital content for the benefit of the content provider.
  • Access Key a first key of the content provider - local content server
  • Local content server 12 contains and distributes only encrypted digital content preventing management server 18, client/system user 10, or any third party from accessing, decrypting, corrupting, interfering with, burning, or copying onto disc, computer, or other external device, unless otherwise authorized by the content provider as in the case of digital content purchase.
  • the digital content is stored on a client dedicated system server also housed at the management server and local content server 12 location for retrieval and decryption of digital content by the client or system user at anytime.
  • Local content server 12 verifies the digital content request, the client/system user 10 IP address and password. Upon authentication local content server 12 returns 46 a unique access key to management server 18.
  • management server 18 determines digital content availability on local content server 12 and the "method of payment" procedure is commenced by management server 18 to ensure payment of digital content by client/system user 10 by any number of payment methods, as an example: direct bill, secured credit card, or charge card transaction with preferred financial institution.
  • a payment gateway/processor 48 is utilized for this activity.
  • a second key (“decrypting key”) is requested 50 by management server 18 from the content provider, such as remote library 14, located offsite from management server 18 and local content provider 12, which serves to authenticate 52 the access key request of management server 18 and local content provider 12, verify receipt of payment, and allow the release of the digital content requested. Following authentication and verification the decrypting key is provided to local content server 12.
  • the content provider such as remote library 14, located offsite from management server 18 and local content provider 12, which serves to authenticate 52 the access key request of management server 18 and local content provider 12, verify receipt of payment, and allow the release of the digital content requested. Following authentication and verification the decrypting key is provided to local content server 12.
  • An alternative way of returning the decryption key, following authentication and verification, is to provide the decryption key directly to the client/system user 10.
  • This method provides extra security by leaving the decryption key exclusively in remote library 14 (typically owned by the content provider, who also typically the owner of the digital content) and to be used with the clients' software.
  • the decrypting key and access key are electronically returned to client/system user 10 without the content that is decrypted by that key.
  • the client/system user 10 requests the encrypted digital content utilizing the access key from local content server 12.
  • Local content server 12 then delivers the encrypted digital content to client/system user 10.
  • the client/system user utilizes the decrypting key to decrypt the digital content, which occurs electronically in the client/system user 10 device during decryption of the digital content.
  • the digital content itself can only be delivered and decrypted at the moment or instant the client/system user commences to view or listen to the digital content. All computer servers and/or devices utilized in the process maintain strict security protocols and system certifications that serve to protect all system interfaces, applications, and communications via the latest SSL standards. If in the event digital content is unavailable on the local content server, an electronic request is transmitted to the content provider, typically the remote library.
  • the remote library will deliver in real time encrypted digital content to the content provider - local content server.
  • the delivery, verification, payment, encryption, decryption, and the management of digital content are transparent and instantaneous while easy to use.
  • SA Super Administrator
  • An administrator referred to herein as super administrator or SA, may control all expenditures and content viewed by other system users of the client, registered in the client's name.
  • the SA may control the access to the client, especially as to other system users who are minors, thereby creating within the system a parental control function.
  • the SA may prohibit the access to digital content based type, rating, time, or maximum overall time of access to digital content for the other system users. This function limits access to digital content that is inappropriate for minor other system users.
  • the parental control is designed to manage the access to the client, time, content, and expense wise.
  • the SA may define restrictions for other system users as well.
  • the SA may limit total time access, prohibit/grant access to other system users in certain hours of the day, prohibit/grant access to digital content based on content or rating.
  • the SA may also control other system user expenditures, limit monthly expense for other system users, or every purchase of digital content, both in the form of percentage on the total monthly expense or as an absolute value, representing the expense limit for the other system users.
  • the system user and/or SA may also remotely monitor other system users by viewing from client device what the other system users are viewing.
  • this function may be used by parents to monitor the activities of their children.
  • the system currently utilizes four (4) different methods of payment, although other methods of payments are not precluded from being adopted for this purpose.
  • the system payment interface requests the client/system user to confirm the purchase or rental of the digital content, the purchase or rental price, and method of payment, which may include:
  • the monthly line of credit is a monetary credit amount made available to the system user in the form of prepaid credit with a system service provider. If the monthly line of credit is unavailable to the system user the purchase or rental of digital content may be made via credit/debit card, company credit card (a credit card issued specifically for use with the system) or secured pay-pal transaction.
  • the super administrator shall receive a monthly invoice/statement detailing the digital content (with codes) purchased/rented, system user and other system user profiles, date and time of digital content purchase/rental, and method of payment (line of credit, credit card, company card, pay-pal, etc.).
  • the monthly invoice also provides a log of which system user/other system user has accessed the digital content with identifying information.
  • Digital content may be purchased or rented by the client or system user.
  • a purchase of encrypted digital content is permanent while a rental of digital content is for a specified period of time only.
  • Rented digital content may be accessed by the client/system user any time during the rental period, through an electronic decryption key each time access to the digital content is requested.
  • encrypted digital content may be accessed at anytime.
  • the client/system user is permitted unlimited access to the encrypted digital content from a client/system user dedicated system server also housed at the management server and local content server location for retrieval and decryption of digital content by the client or system user at anytime.
  • the system is equipped with a special cable and plug connecting the client to the TV screen or monitor.
  • the system hardware is also designed to prevent an unauthorized physical intrusion into the client device in an attempt to access digital content.
  • the system hardware sensors detect intrusion attempts, measure hardware tension, and detect attempts to penetrate and manipulate the client device causing a system shut down, thereby, effectively disabling the client/system user. Once a system shut down occurs the client/system user can only function following the replacement of the cable by an authorized technician. Again, the reason therefore is to prevent piracy.
  • Fig. 5 depicts a security plug for use with the present invention.
  • the security cable 100 has special connectors 1 10, 1 12 that are sealed permanently with special screws 1 14 with a breakable head.
  • the screw is inserted at the first connection and unites the male 1 10 and female 1 12 connectors.
  • Fig. 6 depicts the mating connectivity of the security plug 100 of Fig. 5.
  • male connector 1 10 is inserted in the female connector 1 12, with both male and female connectors have two side holes 1 16 that overlap when the connectors are completely inserted.
  • two special screws 1 14 are inserted in the connector and the screw heads are broken to render the connection permanent.
  • steps 2 and 3 indicate the slideable connection of male and female plugs 1 10, 1 12 with each other.
  • Step 4 depicts the complete connection between plugs with screws 1 14 not yet inserted.
  • Step 5 depicts the insertion of screw 1 14 with head still intact.
  • step 6 depicts the securing of the mating connectors by the removal of the screw head.
  • the permanent connection between the display device and the client guarantees that the user will not try to access the digital content via hardware ports, and try to record or clone the digital content with external devices. All video outputs of the client will be similarly sealed. If the user has the necessity of changing display or removing the box an authorized technician will provide this service.
  • the security cable 100 connects permanently the client device 16 with the screen 120 as depicted in Fig. 7. This system can protect any video input/output, such as VGA, composite , SCART, to name a few. Similarly, all unused video outputs may be sealed with a cover containing the same lock-in mechanism and fastened with breakable head screws.
  • Security cable 100 is designed to prevent intrusion, penetration, splicing, or unauthorized access to digital content therefrom.
  • the control signal electrical, magnetic, or any other form of uninterrupted signal, between the two plugs, known as the security signal (SC)
  • SC security signal

Abstract

A system and/or platform for the method or process utilized in the sale, rental, distribution, delivery, encryption, decryption, and payment methods of digital content, media and/or entertainment, and the system of electronic devices performing the method.

Description

_ι_
APPARATUS AND METHOD FOR PROCESSING DIGITAL CONTENT
This is a Patent Cooperation Treaty (PCT) application which claims priority to United States Provisional Application No. 61/282,802 filed on April 2, 2010.
Background Of The Invention Field of the Invention
A system and/or platform for the method or process utilized in the sale, rental, distribution, delivery, encryption, decryption, and payment methods of digital content, media and/or entertainment, and the system of electronic devices performing the method. Summary of the Invention
Bearing in mind the problems and deficiencies of the prior art, it is therefore an object of the present invention to provide a system and method for controlling, requesting, accessing, and receiving digital content.
A further object of the invention is to provide hardware and software security for controlling, requesting, accessing, and receiving digital content.
Still other objects and advantages of the invention will in part be obvious and will in part be apparent from the specification.
The above and other objects, which will be apparent to those skilled in the art, are achieved in the present invention which is directed to, in a first aspect, an apparatus for processing digital content comprising: at least one client or system user electronic device including hardware and software for requesting and receiving digital content, and allowing viewing and listening thereof; a management server in electrical communication with the at least one client or system user, including hardware and software for identifying and authenticating the at least one client or system user, and a content distributor, when the content distributor is available and connected to the management server, the management server used to validate the sale, rental, purchases, and delivery of services and the digital content, including encryption and authentication tasks; a local content server in electrical communication with the management server, including hardware and software for storing, delivery, and distributing the digital content or encrypted digital content to the at least one client or system user; and a remote library in electrical communication with the local content server, including hardware and software for controlling and operation electronic decryption keys and codes, delivering, removing, modifying, and inserting encrypted digital content to the local content server, under the direction or permission of a content provider. The remote library may include a plurality of remote libraries, each in electrical communication with one of a plurality of corresponding local content servers, the local content servers in electrical communication with the management server.
A payment/gateway processor device may also be provided for verifying, accessing, receiving, and authenticating payment from the at least one client, the payment/gateway processor device in electrical communication with the management server.
A secure system cable may also be included for connecting devices associated with the apparatus, comprising: an electronic transmission cable have two ends, each end terminating in a first connecting plug for connecting with a reciprocal second connecting plug located on individual devices associated with the apparatus; the first connecting plug including a male or female connecting plug part, having a first set of side apertures for receiving screws; the reciprocal second connecting plug including the mating plug connector, a corresponding female or male connecting plug part having a second set of side apertures for receiving screws; such that when the male connecting plug and the corresponding female connecting plug slidably connect, the first and second set of side apertures align for jointly receiving the screws; and screws having break-away heads for permanently securing the first connecting plug to the reciprocal second connecting plug upon attachment and removal of the breakaway heads. In a second aspect, the present invention is directed to a method of processing digital content comprising: receiving requests of digital content by at least one or a plurality of system users, the requests performed through a management server to access the availability of the digital content; inquiring of the availability the digital content from a local content server, accessible by the management server; if the digital content is available on the local content server, displaying the digital content on a system user's monitor; if the digital content is not available on the local content server, having the local content sever request the digital content from a remote library, the remote library under the control of a content provider to allow for permission to transfer the digital content from the remote library to the local content server; if the remote library includes the digital content, transmitting the digital content to the local content server by the remote library as requested by the system user, and allowed by the content provider; and transmitting the digital content from the local content server to the system user.
The method may include method requesting the digital content by the at least one or a plurality of system users to a content distributor to a final user (CDFU), the CDFU acting as an intermediary between the at least one or a plurality of system users and the management server and the local content server, such that the at least one or a plurality of system users communicates directly with the CDFU.
The method may further include: providing each of the at least one or a plurality of system users with a subscription membership for identifying the at least one or a plurality of system users and authenticating each request for the digital content with a password protection scheme; and, if requested, providing additional password protections for other system users permitted or selected by the at least one or a plurality of system users; and authenticating each available password at the management server.
Additionally, the method may include: controlling encrypted digital content with the management server, the local content server, or both; and delivering, adding, modifying, or removing digital content at the at least one or a plurality of system users' devices; reviewing the digital content stored on the local content server; allowing a content provider to add, modify, or remove digital content; and periodically updating the at least one or a plurality of system user devices with digital content information. This may entail: recording, generating, and allowing a content provider to receive statistical information from system activity, the information comprising digital content requested, time requested, digital content pricing information, the at least one or a plurality of system users' identification, amount of digital content requested, digital content revenue, the at least one or a plurality of system uses' spending and buying habits, and preferences of the at least one or a plurality of system users.
The method may further include: controlling expenditures and access to other system users via a system administrator, the controlling access includes prohibiting access to selected digital content based on type, rating, time, or maximum overall time of access to the digital content from other system users.
Moreover, the method may include adding said digital content by: inserting said digital content to said remote library; compressing said digital content in system format; encrypting said digital content with a key known and recognized by a content provider or a remote library, or both; and delivery said digital content to said local content server.
Brief Description of the Drawings
The features of the invention believed to be novel and the elements characteristic of the invention are set forth with particularity in the appended claims. The figures are for illustration purposes only and are not drawn to scale. The invention itself, however, both as to organization and method of operation, may best be understood by reference to the detailed description which follows taken in conjunction with the accompanying drawings in which: Fig. 1 depicts the distribution of digital content without utilizing a content distributor to the final user (CDFU).
Figure 2 depicts the process flow for the system user and/or client requesting and receiving digital content in the presence of a content distributor to the final user.
Fig. 3 depicts the connectivity structure of the remote libraries and local content servers for each content provider.
Fig. 4 depicts a connectivity diagram of the network security to secure the distribution of digital content.
Fig. 5 depicts a security plug for use with the present invention.
Fig. 6 depicts the mating connectivity of the security plug of Fig. 5.
Fig. 7 depicts a connectivity diagram of a client device with a generic screen or monitor.
Description of the Preferred Embodiment(s)
In describing the preferred embodiment of the present invention, reference will be made herein to Figs. 1- 7 of the drawings in which like numerals refer to like features of the invention.
Elements composing the system, method, platform and/or process
The System is comprised of several main components and/or elements defined as:
Client (CLT): The computer apparatus hardware and software designed, among other things, to receive digital content and to allow viewing and listening thereof by System User.
System User (SU): Person who is the receiver and/or end user of digital content. System Administrator (SA): A system user with complete control over the options of the client, who has a verified identity and address in the system, and who also receive the invoices or is responsible for all purchases and/or transactions made with the client registered in his or her name. Content Distributor to the Final User (CDFU): The deliverer of services and/or digital content to the System User and/or client (SU/CLT). Examples of content distributors include: delivery companies, service and cable companies, cable companies, satellite companies, telecom companies, and the like, or any other digital content deliverers. Local Content Server (LCS): A computer server utilized for the storage, delivery, and/or distribution of digital content, and/or encrypted digital content to the system user and/or client.
Management Server (MS): A computer server utilized for the identification and authentication of the system user and/or client, and/or content distributor to the final user (CDFU), validation of the sale/rental/purchases/delivery of services and/or digital content, and for the functioning of various other management, encryption
+n o1 ' I Ί -o l content but has access to information about digital content, its availability for distribution to system user and/or client, and is capable of delivering encrypted digital content thereto.
Content Provider (CP): An owner and provider of digital content, media, or entertainment, as well as owner and operator of the Remote Library.
Remote Library (RL): A computer server under the control and/or operation of the content provider that provides electronic decryption keys/codes and also delivers, removes, modifies, and/or inserts encrypted digital content to the local content server (LCS). MMS Software: Software the content provider uses to manage the Remote Library and Local Content Server.
The System can be utilized with or without the CDFU so as to permit a direct connection between the system user and/or client and management server, or through the mediation of the content provider.
Fig. 1 depicts the distribution process of acquiring digital content without utilizing a content distributor to the final user (CDFU).
Selection of available digital content by the client
Referring to Fig. 1 , digital content is requested by a plurality of system users 1 and/or clients 10 (SU/CLT) through management server 18, as indicated by process flow arrow 1 1. Digital content may be requested via management server 18, as indicated by process flow arrow 13 to assess availability on the local content server 12, and if available, is delivered and displayed on the SU/CLT monitor, TV screen, or LCD screen, connected to the system via process flow arrow 19. If digital content is not available to the SU/CLT on local content server 12, the digital content may be requested by local content server 12 from the remote library 14, as indicated by process flow arrow 15. Remote library 14 is generally under the control of content provider 16. If the specific digital content is available, content provider 16 may allow for the transfer the digital content from remote library 14 to local content server 12, as indicate by process flow arrow 17. Specific media management software (MMS) may be used for the process flow. In this manner, the digital content is delivered from local content user 12 to the SU/CLT 10, as indicated by process flow arrow 19.
Management server 18 performs a search for the availability of the requested digital content on the local content server 12, and if available, local content server 12 delivers it to the SU/CLT 10 via process flow arrow 19. In case the requested digital content is not available from local content server 12, a request to remote library 14 is electronically made via process flow arrow 15. This request can be fulfilled by content provider 16 by loading on local content server 12 the requested digital content, in an encrypted form. This last operation is executed using management media software.
Figure 2 depicts the process flow for the SU/CLT 10 requesting and receiving digital content in the presence of a content distributor to the final user (CDFU) 20. CDFU 20 acts as an intermediary between SU/CLT 10 and both the management server 18 and local content server 12. SU/CLT 10 interacts with CDFU 20 via process flow arrow 21 to accesses management server 18. CDFU 20 interacts with management server 18 via process flow 23, 25. CDFU 20 may also communicate directly with SU/CLT 10 via process flow arrow 27. In this manner, through CDFU 20, SU/CLT 10 is able to communicate with management server 18.
In this scenario, SU/CLT 10 is identified, verified, and given access by management server 18, as it would be in the process flow indicated by Fig. 1 , and in the same manner, CDFU 20 is identified, verified, and given access to the system. The identification and verification method is intended to identify CDFU20 and the system user who is a subscriber of the content distributor services, while allowing access to management server 18 pursuant to agreement, providing limited or iota! access to the system and the available digital content.
Examples of CDFU 20 are: content delivery and distribution companies, service and cable companies, cable companies, satellite companies, telecom companies, and the like, or any other digital content deliverers that can provide their users with connectivity and electronic access to the system.
The client hardware and the operating software as well as management server 18, local content server 12, and remote library 14 (servers) function the same in the system in both models, with the exception of the role of the third party CDFU 20, which is to provide connectivity for the distribution of digital content to system user/client 10. Content providers, local content server, and remote library
Every SU/CLT 10 is provided with, and maintains, a subscription membership particularly identifying the SU/CLT 10 and authenticating a SU/CLT 10 request for digital content with by a main password. SU/CLT 10 is also provided with, upon request, additional passwords for other system users, permitted or selected by the SU/CLT 10 to use the system for identifiable and permissible uses, content, or at locations. Each system user and other system user password is authenticated by management server 18, including another system user who may have any number of use restrictions, as directed by SU/CLT 10 as part of the system management and controls.
The system allows the system user to restrict or control other system users, as an example: SU/CLT 10 may control or restrict the use of digital content, the type of digital content ordered, and may limit the spending or cost of digital content for any given period of time or per location for other system users. Every content provider 16 utilizing the system has or will maintain a remote library and a local content server, so there are as many remote libraries and local content servers as there are content providers existing or desired. Fig. 3 depicts the connectivity structure of the remote libraries and local content servers for each content provider. Remote library 14 is physically housed and located at a premises selected or dedicated by the content provider, and local content server 12 is physically housed and located at the same premises whereat the management server 18 is located. The reason therefore is to promote quicker connectivity and faster network access to the digital content present on the local content server. All digital content stored on the local content server 12 or remote library 14 is encrypted in a manner that the content provider may release or provide a code or key to decrypt the digital content requested by client, system user, or other system users.
Fig. 3 depicts the connectivity structure of the remote libraries 14 and local content servers 12 for each content provider 16. In this example, management server 18 accesses three local content servers 12a-c, which in turn, individually access corresponding remote libraries 14a-c, respectively. Management server 18 also accesses clients 10.
The Media Management System (MMS)
The media management system application allows the content provider to control directly the computer server that contains encrypted digital content, to deliver, add, modify, or remove digital content, thereby maintaining control of the transmission of digital content to computer servers, clients, system users, other system users, and most importantly, the encryption and conversion of the digital content that will be sent to the content provider local content server. The media management system tracks and maintains statistical information, including information concerning the digital content, clients or SU/OSU identification, via system controls and/or interfaces, enabling the content provider to gather a constant flow of statistics and/or information, as an example: information about how much of their digital content, which type, when, where, and by whom it is sold, rented to, or viewed by.
The media management system software application is divided in three distinct areas or functions: management, statistics and request analysis.
Functional Area 1 - "Management"": The content provider may view the digital content stored on its local content server, add, modify, or remove whatever digital content it chooses. The system interfaces at all locations are updated with the new information in real time. All management operations are undertaken through the media management system by the content provider in and/or through the remote library and/or local content server, as an example: the content provider adds digital content by inserting the digital content file it wants to add from the remote library, and the system software will automatically: compress the digital content in system format, encrypt the digital content with a key only the content provider or remote library is aware of and recognizes, and deliver the digital content to the local content server, inserting all corresponding information in the database in the process. Functional Area 2 - "Statistics": The media management system application records, generates, and allows the content provider to receive statistical information from system activity and use, as an example: information concerning digital content requested, time requested, digital content price, client/system user requesting, and number of requested digital content all of which allows the content provider to monitor the system use, digital content revenues, spending or buying habits, and preferences of client or system user, and the like. All of which is important for the content provider to make future strategic and business decisions, as an example: to add digital content to the system, maximize customer satisfaction, or determine methods to increase revenues.
Functional Area 3 - "Request Analysis": The content provider monitors all digital content requests through the system for digital content stored in the remote library, but not in the local content server, enabling the content provider to determine if, how, and when to satisfy digital content requests by simply accessing the media management system. The transmission and delivery of digital content from the remote library to the local content server can be done in many ways such as, via Internet, satellite, dedicated cable, wired, radio, 3G, 4G, digital terrestrial, Wi-Fi, Wi-max or wireless signals/networks.
These Applications make the streaming and the delivery of digital content quick, easy, and secure - making the system a unique method and/or process.
Network Security and Secure Distribution of Digital Content
Fig. 4 depicts a connectivity diagram of the network security to secure the distribution of digital content. The client/system user 10 requests digital content from management server 18 (a content distribution manager server) serving to validate the request for digital content and the identity of the requesting client or system user's IP address and password. This is the "user validation" communication 42. Management server 18, upon verification described above, requests 44 a first key ("Access Key") of the content provider - local content server, that may be physically housed at the same location of the management server. This procedure is part of the process to ensure the quickest and most efficient method of the delivery of digital content to client/system user 10, and to maximize the secure delivery of digital content for the benefit of the content provider. Local content server 12 contains and distributes only encrypted digital content preventing management server 18, client/system user 10, or any third party from accessing, decrypting, corrupting, interfering with, burning, or copying onto disc, computer, or other external device, unless otherwise authorized by the content provider as in the case of digital content purchase. In such event the digital content is stored on a client dedicated system server also housed at the management server and local content server 12 location for retrieval and decryption of digital content by the client or system user at anytime. Local content server 12 verifies the digital content request, the client/system user 10 IP address and password. Upon authentication local content server 12 returns 46 a unique access key to management server 18.
Following verification and authentication described above, management server 18 determines digital content availability on local content server 12 and the "method of payment" procedure is commenced by management server 18 to ensure payment of digital content by client/system user 10 by any number of payment methods, as an example: direct bill, secured credit card, or charge card transaction with preferred financial institution. A payment gateway/processor 48 is utilized for this activity.
Following payment, a second key ("decrypting key") is requested 50 by management server 18 from the content provider, such as remote library 14, located offsite from management server 18 and local content provider 12, which serves to authenticate 52 the access key request of management server 18 and local content provider 12, verify receipt of payment, and allow the release of the digital content requested. Following authentication and verification the decrypting key is provided to local content server 12.
An alternative way of returning the decryption key, following authentication and verification, is to provide the decryption key directly to the client/system user 10. This method provides extra security by leaving the decryption key exclusively in remote library 14 (typically owned by the content provider, who also typically the owner of the digital content) and to be used with the clients' software.
The decrypting key and access key are electronically returned to client/system user 10 without the content that is decrypted by that key. The client/system user 10 requests the encrypted digital content utilizing the access key from local content server 12. Local content server 12 then delivers the encrypted digital content to client/system user 10.
The client/system user utilizes the decrypting key to decrypt the digital content, which occurs electronically in the client/system user 10 device during decryption of the digital content. The digital content itself can only be delivered and decrypted at the moment or instant the client/system user commences to view or listen to the digital content. All computer servers and/or devices utilized in the process maintain strict security protocols and system certifications that serve to protect all system interfaces, applications, and communications via the latest SSL standards. If in the event digital content is unavailable on the local content server, an electronic request is transmitted to the content provider, typically the remote library. The remote library will deliver in real time encrypted digital content to the content provider - local content server. The delivery, verification, payment, encryption, decryption, and the management of digital content are transparent and instantaneous while easy to use.
Super Administrator (SA): Control and Security An administrator, referred to herein as super administrator or SA, may control all expenditures and content viewed by other system users of the client, registered in the client's name.
The SA may control the access to the client, especially as to other system users who are minors, thereby creating within the system a parental control function. The SA may prohibit the access to digital content based type, rating, time, or maximum overall time of access to digital content for the other system users. This function limits access to digital content that is inappropriate for minor other system users.
The parental control is designed to manage the access to the client, time, content, and expense wise.
The SA may define restrictions for other system users as well. The SA may limit total time access, prohibit/grant access to other system users in certain hours of the day, prohibit/grant access to digital content based on content or rating. The SA may also control other system user expenditures, limit monthly expense for other system users, or every purchase of digital content, both in the form of percentage on the total monthly expense or as an absolute value, representing the expense limit for the other system users.
Other system users may also be protected from digital content, for example, digital content not appropriate for his/her age. The other system user, upon insertion of his/her password, is automatically verified.
The system user and/or SA may also remotely monitor other system users by viewing from client device what the other system users are viewing. As an example, this function may be used by parents to monitor the activities of their children.
All of the aforementioned limitations may be set separately for every system function and every type of digital content the client receives.
Payment System The system currently utilizes four (4) different methods of payment, although other methods of payments are not precluded from being adopted for this purpose. The system payment interface requests the client/system user to confirm the purchase or rental of the digital content, the purchase or rental price, and method of payment, which may include:
• monthly line of credit;
• credit/debit card; β company credit card; and/or
• pay-pal. The monthly line of credit is a monetary credit amount made available to the system user in the form of prepaid credit with a system service provider. If the monthly line of credit is unavailable to the system user the purchase or rental of digital content may be made via credit/debit card, company credit card (a credit card issued specifically for use with the system) or secured pay-pal transaction. At the end of each month the super administrator shall receive a monthly invoice/statement detailing the digital content (with codes) purchased/rented, system user and other system user profiles, date and time of digital content purchase/rental, and method of payment (line of credit, credit card, company card, pay-pal, etc.). The monthly invoice also provides a log of which system user/other system user has accessed the digital content with identifying information.
Digital content may be purchased or rented by the client or system user. A purchase of encrypted digital content is permanent while a rental of digital content is for a specified period of time only. Rented digital content may be accessed by the client/system user any time during the rental period, through an electronic decryption key each time access to the digital content is requested. In the event of a purchase, encrypted digital content may be accessed at anytime. The client/system user is permitted unlimited access to the encrypted digital content from a client/system user dedicated system server also housed at the management server and local content server location for retrieval and decryption of digital content by the client or system user at anytime.
The process of network security described above is repeated every time the digital content is requested by the client or system user. All retrieval requests for purchased encrypted digital content stored on the dedicated system server are easily and quickly made without any additional charge or inconvenience to the system user. Security Cable
To finalize the secure transmission of digital content to the client/system user the system is equipped with a special cable and plug connecting the client to the TV screen or monitor. The system hardware is also designed to prevent an unauthorized physical intrusion into the client device in an attempt to access digital content. The system hardware sensors detect intrusion attempts, measure hardware tension, and detect attempts to penetrate and manipulate the client device causing a system shut down, thereby, effectively disabling the client/system user. Once a system shut down occurs the client/system user can only function following the replacement of the cable by an authorized technician. Again, the reason therefore is to prevent piracy.
Fig. 5 depicts a security plug for use with the present invention.
The security cable 100, has special connectors 1 10, 1 12 that are sealed permanently with special screws 1 14 with a breakable head. The screw is inserted at the first connection and unites the male 1 10 and female 1 12 connectors. Fig. 6 depicts the mating connectivity of the security plug 100 of Fig. 5. As indicated by Fig. 6, male connector 1 10 is inserted in the female connector 1 12, with both male and female connectors have two side holes 1 16 that overlap when the connectors are completely inserted. At that point, two special screws 1 14 are inserted in the connector and the screw heads are broken to render the connection permanent.
Once male plug 1 10 is inserted into female plug 1 12, the screw head can be broken, leaving the screw 1 14 inside, making it impossible to remove the screws without destroying the plug itself. The procedure is repeated on both ends of cable 100. As shown in Fig. 6, steps 2 and 3 indicate the slideable connection of male and female plugs 1 10, 1 12 with each other. Step 4 depicts the complete connection between plugs with screws 1 14 not yet inserted. Step 5 depicts the insertion of screw 1 14 with head still intact. And step 6 depicts the securing of the mating connectors by the removal of the screw head.
The permanent connection between the display device and the client guarantees that the user will not try to access the digital content via hardware ports, and try to record or clone the digital content with external devices. All video outputs of the client will be similarly sealed. If the user has the necessity of changing display or removing the box an authorized technician will provide this service. The security cable 100 connects permanently the client device 16 with the screen 120 as depicted in Fig. 7. This system can protect any video input/output, such as VGA, composite , SCART, to name a few. Similarly, all unused video outputs may be sealed with a cover containing the same lock-in mechanism and fastened with breakable head screws.
Security cable 100 is designed to prevent intrusion, penetration, splicing, or unauthorized access to digital content therefrom.
The control signal, electrical, magnetic, or any other form of uninterrupted signal, between the two plugs, known as the security signal (SC), is transmitted through cable 100 and if broken disables the plug, thereby, preventing the transmission of digital content to the client/system user. The interruption of the control signal from one end to the other end of the cable, immediately triggers a small short circuit in the plugs, rendering a printed circuit board inside the plugs non functional, and thus blocking the digital signal, rendering the client/user device effectively inactive until the device is returned to its original state by an authorized technician.
While the present invention has been particularly described, in conjunction with a specific preferred embodiment, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art in light of the foregoing description. It is therefore contemplated that the appended claims will embrace any such alternatives, modifications and variations as falling within the true scope and spirit of the present invention.
Thus, having described the invention, what is claimed is:

Claims

Claims
1. An apparatus for processing digital content comprising:
at least one client or system user electronic device including hardware and software for requesting and receiving digital content, and allowing viewing and listening thereof;
a management server in electrical communication with said at least one client or system user, including hardware and software for identifying and authenticating said at least one client or system user, and a content distributor, when said content distributor is available and connected to said management server, said management server used to validate the sale, rental, purchases, and delivery of services and said digital content, including encryption and authentication tasks;
a local content server in electrical communication with said management server, including hardware and software for storing, delivery, and distributing said digital content or encrypted digital content to said at least one client or system user; and
a remote library in electrical communication with said local content server, including hardware and software for controlling and operation electronic decryption keys and codes, delivering, removing, modifying, and inserting encrypted digital content to said local content server, under the direction or permission of a content provider.
2. The apparatus of claim 1 wherein said remote library includes a plurality of remote libraries, each in electrical communication with one of a plurality of corresponding local content servers, said local content servers in electrical communication with said management server.
3. The apparatus of claim 1 including a payment/gateway processor device for verifying, accessing, receiving, and authenticating payment from said at least one client, said payment/gateway processor device in electrical communication with said management server.
4. The apparatus of claim 1 including a secure system cable for connecting devices associated with said apparatus, comprising:
an electronic transmission cable have two ends, each end terminating in a first connecting plug for connecting with a reciprocal second connecting plug located on individual devices associated with said apparatus;
said first connecting plug including a male or female connecting plug part, having a first set of side apertures for receiving screws;
said reciprocal second connecting plug including the mating plug connector, a corresponding female or male connecting plug part having a second set of side apertures for receiving screws;
such that when said male connecting plug and said corresponding female connecting plug slidably connect, said first and second set of side apertures align for jointly receiving said screws; and
screws having break-away heads for permanently securing said first connecting plug to said reciprocal second connecting plug upon attachment and removal of said break-away heads.
5. A method of processing digital content comprising:
receiving requests of digital content by at least one or a plurality of system users, said requests performed through a management server to access the availability of said digital content;
inquiring of the availability said digital content from a local content server, accessible by said management server;
if said digital content is available on said local content server, displaying said digital content on a system user's monitor;
if said digital content is not available on said local content server, having said local content sever request said digital content from a remote library, said remote library under the control of a content provider to allow for permission to transfer said digital content from said remote library to said local content server;
if said remote library includes said digital content, transmitting said digital content to said local content server by said remote library as requested by said system user, and allowed by said content provider; and
transmitting said digital content from said local content server to said system user.
6. The method of claim 5 including requesting said digital content by said at least one or a plurality of system users to a content distributor to a final user (CDFU), said CDFU acting as an intermediary between said at least one or a plurality of system users and said management server and said local content server, such that said at least one or a plurality of system users communicates directly with said CDFU.
7. The method of claim 6 including:
identifying and verifying said CDFU and said at least one or a plurality of system users who are subscribers of content distribution services; and allowing access to said management server for limited or total access of available digital content.
The method of claim 5 including:
providing each of said at least one or a plurality of system users with a subscription membership for identifying said at least one or a plurality of system users and authenticating each request for said digital content with a password protection scheme; and, if requested,
providing additional password protections for other system users permitted or selected by said at least one or a plurality of system users; and
authenticating each available password at said management server.
The method of claim 5 including: controlling encrypted digital content with said management server, said local content server, or both; and
delivering, adding, modifying, or removing digital content at said at least one or a plurality of system users' devices.
10. The method of claim 5 including:
reviewing said digital content stored on said local content server;
allowing a content provider to add, modify, or remove digital content; and periodically updating said at least one or a plurality of system user devices with digital content information.
1 1. The method of claim 10 wherein adding said digital content includes:
inserting said digital content to said remote library;
compressing said digital content in system format;
encrypting said digital content with a key known and recognized by a content provider or a remote library, or both; and
delivery said digital content to said local content server.
12. The method of claim 10 including recording, generating, and allowing a content provider to receive statistical information from system activity, said information comprising digital content requested, time requested, digital content pricing information, said at least one or a plurality of system users' identification, amount of digital content requested, digital content revenue, said at least one or a plurality of system uses' spending and buying habits, and preferences of said at least one or a plurality of system users.
13. The method of claim 5 including:
providing an electronic access key representing an individual content provider, said electronic access key housed at said management server, or local content server, or both;
delivering encrypted digital content based on verification of said access key; determining method of payment, and validating payment of requested digital content;
providing decrypting key to local content server; and
decrypting of said encrypted digital content at said at least one or a plurality of system user sites.
14. The method of claim 5 including:
providing an electronic access key representing an individual content provider, said electronic access key housed at said management server, or local content server, or both;
delivering encrypted digital content based on verification of said access key; determining method of payment, and validating payment of requested digital content;
providing decrypting key directly to said at least one or a plurality of system users; and
decrypting of said encrypted digital content at said at least one or a plurality of system user sites.
15. The method of claim 5 including controlling expenditures and access to other system users via a system administrator, said controlling access includes prohibiting access to selected digital content based on type, rating, time, or maximum overall time of access to said digital content from other system users.
16. The method of claim 15 including remotely monitoring other system users by viewing from said at least one or a plurality of system user devices to ascertain what said other system users are viewing.
PCT/US2011/030963 2010-04-02 2011-04-01 Apparatus and method for processing digital content WO2011123796A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US28280210P 2010-04-02 2010-04-02
US61/282,802 2010-04-02

Publications (2)

Publication Number Publication Date
WO2011123796A2 true WO2011123796A2 (en) 2011-10-06
WO2011123796A3 WO2011123796A3 (en) 2012-04-05

Family

ID=44712858

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/030963 WO2011123796A2 (en) 2010-04-02 2011-04-01 Apparatus and method for processing digital content

Country Status (1)

Country Link
WO (1) WO2011123796A2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6081840A (en) * 1997-10-14 2000-06-27 Zhao; Yan Two-level content distribution system
US20040049598A1 (en) * 2000-02-24 2004-03-11 Dennis Tucker Content distribution system
US6944634B2 (en) * 2002-04-24 2005-09-13 Hewlett-Packard Development Company, L.P. File caching method and apparatus
US7289519B1 (en) * 2002-05-01 2007-10-30 Cisco Technology, Inc. Methods and apparatus for processing content requests using domain name service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6081840A (en) * 1997-10-14 2000-06-27 Zhao; Yan Two-level content distribution system
US20040049598A1 (en) * 2000-02-24 2004-03-11 Dennis Tucker Content distribution system
US6944634B2 (en) * 2002-04-24 2005-09-13 Hewlett-Packard Development Company, L.P. File caching method and apparatus
US7289519B1 (en) * 2002-05-01 2007-10-30 Cisco Technology, Inc. Methods and apparatus for processing content requests using domain name service

Also Published As

Publication number Publication date
WO2011123796A3 (en) 2012-04-05

Similar Documents

Publication Publication Date Title
JP5274096B2 (en) Non-repudiation for digital content distribution
US6332025B2 (en) Software distribution system and software utilization scheme for improving security and user convenience
JP4824309B2 (en) Method for monitoring digital content provided by a content provider via a network
AU2007237159B2 (en) Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM)
US7228427B2 (en) Method and system to securely distribute content via a network
US7404084B2 (en) Method and system to digitally sign and deliver content in a geographically controlled manner via a network
CN102160391B (en) Digital rights management licensing over third party networks
CN103026335B (en) Device for the secure key retrieval of stream media player differentiates
US20060123484A1 (en) Method of clearing and delivering digital rights management licenses to devices connected by IP networks
US20050066353A1 (en) Method and system to monitor delivery of content to a content destination
US20050195978A1 (en) Method and apparatus for encoding and selective distribution of licensed digital content
US20050021467A1 (en) Distributed digital rights network (drn), and methods to access operate and implement the same
EP1517470A2 (en) Communication terminal, billing apparatus, service providing apparatus, and program
US20040054584A1 (en) Electronic content transacting method and system therefor
AU2003220751A1 (en) Transaction System
JP3412709B2 (en) Information distribution apparatus and method
CN101022347A (en) Compatible CAS and DRM MMB charging system
EP1433095A1 (en) A distributed digital rights network (drn), and methods to access, operate and implement the same
CN106161187B (en) Method, equipment and system for providing public information service based on instant message
WO2011123796A2 (en) Apparatus and method for processing digital content
WO2005107259A1 (en) Streaming of digital content over the internet
JP2002329025A (en) Contents delivery method and contents delivery system
AU2007234620B2 (en) Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM)
AU2007234609B2 (en) Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM)
JP2003318876A (en) Contents distribution system, contents distribution device and contents using terminal equipment

Legal Events

Date Code Title Description
NENP Non-entry into the national phase in:

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 11/12/2012)

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11763523

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 11763523

Country of ref document: EP

Kind code of ref document: A2