throbber
EWS-002745
`
`Early Warning Services 1008 (part 2)
`IPR of U.S. Pat. No. 8,887,308
`
`

`

`Byun
`Say
` Gatendar Mare +
`twive
`Ras
`Shay
`
`
`a,
`
`Ae ABS Rating
`
`
`
`
`
`
`
`me: now's vour ala an tesiabie baie” thers.
`
`
`
`
`
`EXHIBIT 20C-a
`
`taat account artis:
`
`{ hour
`tit
`
`
`
`
`
`EWS-002746
`
`EWS-002746
`
`

`

`Byun
`Say
` Gatendar Mare +
`twive
`Ras
`Shay
`
`
`a,
`
`Ae ABS Rating
`
`
`
`
`
`
`
`
`
`
`
`
`{ivan fall be rescy tomer
`PM ang: ok thanks
`
`
` realy of Epa
`
`
`
`
`
`Gisol your iCB
`
`
`
`
`
`wrt ast:
`
`EXHIBIT 25C-b
`
`EWS-002747
`
`EWS-002747
`
`

`

`twive
`
` Gatendar Mare +
`
` Mars May
`
`Hi Weill,
`
`
`
`
`thave sume gnublerns paying
`files baer ihe “pra version,
`
`ill be reeoy lomorow.
`id
`
`
`
`
`
`
`
`
`
`
`
`chk <id
`
`ato
`
`
`
`teal accu ccdieky f ceur
`Using 22 GBaf your
`4
`bt
`
`EXHIBIT 26C
`
`EWS-002748
`
`EWS-002748
`
`

`

`Byun
`Say
` Gatendar Mare +
`twive
`Ras
`Shay
`
`
`
`
`ntiNow fare Free 44 Day
`
`
`
` wate
`
`i,
`
`
`ity this Guile: bitp:/xemekeycorSTRIEMSetug Zi
`
`
`
` Wenger the auiontayta
`crveta vers
`
`
`AGWanOy sehkor<id ZoraunsofiGigmalcon»
`
`Wiltaro G, Slaachard oFkMiibCast Lid, <sa.cezedi(gmall. core
`
`
`
`
`
`
`
`of fio authoring elren message is missing.
`
`William G, Stanuhard of LAMbCast Lid, <sa.csZeaigmail.com>
`
`
`
`
`
`EXHIBIT 27C
`
`BG &
`
`
`
`4
`
`We:
`
`
`
`EWS-002749
`
`EWS-002749
`
`

`

`Byun
`Say
`Ras
`
`
`twive
`
` Gatendar Mare +
`
`WiltonG, Stancions Quer cl The STRIEM Tram =
`
`
`veut
`
`
`
`Shay a, AeABS Rating
`NOK
`
`ete
`
`Eosynent. simp
`
`
`
`
`
`EXHIBIT 28C
`
`
`
`
`
`EWS-002750
`
`EWS-002750
`
`

`

` eeCeeeeeeeeeeeeFeppeefe
`prrrrrrnnryiiiai:iiiiiien=iifog|iiiii4Sigii2|iiiiia|73:i|,oz|Pow|iiiaae2ime
`a):FeONEiiiie|:i5iiiiii=:3ii<<feiiiiiiijp2meijeSnneriiiijiii{z
`~$sft#:jiiSh.oe=i8#|&-i#|.gs.f2|ii|3aahi2a|&=isi7§@|£€Ff.|;BeiBe|=iE2=2i&i“sefboeUtUBgsBm|SeiEXeS
`aeii=Litpe|ii|ii|==2a12|:“i==|;SP|MBBrrrerencefiPoorer
`Bsij5—_~iiiiiiijas5aLe|P|# =&
`iiaCo3iiiiiiiae|=eiiaiji{;i;ig=i
`
`
`
` .|3Bdge.=tome|&SBSieS|BBiEtesei=i2oy|&i;=a2|2.ofB®ft&senSsi=|z=fgeUez=,#21=#SBbe|22teS|=|S*:adwe2feims=i;JSiei“Soete3Bi2,8€=(e127 €1'2:°58 £ZBILEBS:zi&-1£s&(2,8eS.FieSF2REe:Bi8ia=‘eei=i2é:”:i=2iE=ive|&mFe|jiS|ibkef;BoPm|BiiweiiZ2ii&|;2iiigaii=.i|;~*~ii=istEpiaa;|iijiweeEOEBBRbei|,|ftiiBeiswefes.|ft|fse|iiiEBe3Seieei$Reti;ii4i“4ig2.iiiiiiiiEBei1Ses:~ijiiiiiBei=i@1sBi|||es212£=iiiiiiiGa
`i{fiiiiiiiiZaieeeS!=i:iiiiiiii=3!=
`lakiERii
`5Hifi;ijiGej
`
`
`,y
`
`Warnings
`
` information:
`
`EWS-002751
`
`
`
`
`
`
`
`
`
`EWS-002751
`
`
`
`

`

`Ualonmation Dischourh Satesen HIS
`Filed {S803
`
`.
`
`ei=)eIBtai
`infaration
`
`
`
`
`
`
`
`
`
`
`Sean
`SpritCOUN,
`
`t
`\
`Cains
`\
`S
`fh
`\‘\
`:
`\
`\
`\
`,
`t
`1
`5
`‘
`‘
`4
`!
`‘
`yrsssesssssasssscasasccsaaccczzcsnnzgcenznccnazeccaznccnazeccananananancanananarancanananarananannanannnaanansaeaeyELAARGAGAREELSREALENEELEARLSERLESAN‘iWEAeAAUESSARGOSRELSARCUSEREEMAEEE‘
`!
`t
`{
`‘
`Ag
`By
`Drawindenthy black andwhitadine drawings
`i
`‘
`i
`‘
`1
`1
`‘
`\
`1
`L
`‘
`(eaepohooseenenenannnnnananannannnaninaananasaanntananasaavasananaaaanasasannasaanaaananasaanasananasanasaanaaannthiaanasasnnaananasaanasavannsnanasasbanassananananasaananananaananasaannasand
`‘
`‘
`Warnings
`;
`:
`Mennnnntnnnnnnnentnnntnnnnnsssntnninnssstinssstninsnsnnn‘
`|
`inhonmation:
`
`
`
`bemnseemenneenseenpeersrannseannteannenaansnesseninnaasaasenanaanasanaseyfinnnanassaneseninnanmaaseannannmnanasoasessnannnyyasaansanannanasaaseananananasaaseananenanassansaeannatesnasnannsaannaaa
`I
`!
`‘
`
` \
`
`\
`'
`
`hss
`Abriact
`
`.
`4
`
`:
`‘
`
`.
`3
`
`‘
`i
`\
`
`’‘'‘
`
`‘‘!
`
`i)
`
`4
`a
`
`Fas WasishoetPTY
`
`:4
`
`
`4‘
`
` ibnnananFana
`
`Warnings:
`Hn
`&.ae=mtweaheeFe
`
`f
`
`Thies Acknowledgement Racaiet evidencesneenint anthe noted date by the USPTO of the indicateddocuments,
`characterized by theapplicant,and inckuling pagecounts where applicable, It savesasauidenceof racaiptslinilaytealal
`Bost Coral,ag deactihied I MPEP 508,
`
` anew;app eaton|5sigladandtheapplicationincludes:thenecessarycomponentsforaflingdate(ace87CER
`
`nh
`TEMDHal and MPEP SCS),a Filling Recaink (87 CAR 1.34) will he lonuad in due conree and the date shown on (his
`Acknowledaement Raceiotwill astablichsthe Ming dateaftheapalicatan,
`
`NattonalStageofaninternatinnalApplicationunder
`35USC37)
`
`ifa Himaly subsulssian feenter the national tageofan international appheation is compliant with the conditions af 3%
`US.C. 377 ud athersaglable romuiemants 3 Form PCTG90indicating audeptence af theanplication as a
`national stage subimission ehder33 U5.C 47 will bet lise in addition to the Piling Raceigt,indue course,
`
`
`Fa newinternedional apntication is helng Med and the intematienal applicationincludesthe nacessary camnponents for
`au lotarnationalfillydate(see PLT Arlee11 and MPEP TANG)a Mutilation af the international Application Runber
`and ofthe international Flbig Bate (Form BCTNO)HOS}will be issuebe de cauans,subjentto presciiptionsconcerning
`ational security, and the date shawn on this AcknowledgementReneiit will astabish the imeiational Hing date af
`the application.
`i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
`
`poOS
`
`EWS-002752
`
`EWS-002752
`
`

`

`EXHIBITS SUBSECTION /C
`
`
`PROOF0 GENE
`
`
`
`
`tomeydiligencecoveringcriticaldatesrete
`Exhibits of this subsection support further evidence of atto
`February 19, 2010 to March 20, 2010, the day before fitin
`¢ of parent case - U.S non-provisional paten
`ed to skilled USPTOartisan are sitedif
`application 12/728,218 ~ Copies of the docurnents suamitt
`this section and was relied in part with instruction manual information resulting from co-active
`engineering diligence found at www.strem.com/instructions - note: screenshots of product manual
`titted to showthe totality of information
`fc
`relied unon to suoport attorneydiligence of reduction to constructive practice om March 24, 2010,
`
`informationdoes evnntaynbutsubr
`
`EWS-002753
`
`EWS-002753
`
`

`

`sored8itersion to USPTGpatent drat Messages Elance
`
`
`
`FIND WORK
`
`
`
`
`
`supeneed
`
`Ties Tao
`
`Provisional conversionto USPTO patent drait
`y
`\
`
`hed a
`
`
`
`
`
`Age Peon
` Work
`
`Ado tachment
`
`
`
`
`
`Senuge
`
`MessagetAllschmants
`
`
`fad login 250 days aio.
`
`Caterine
`Binet Messages
`PRESay
`
`Racant Files
`
`ag
`8
`
`Messages
`
`Pays ents
`
`mings
`
`Work Moye
`
` Status Repos
`Terms & Migsinniag
`
`Proposals
`
`Aeats
`
`
`
`
`
`Mascage Piter
`
`
`
`8 CLI UZIIE Te S3zAo
`
`iitesh S.
` Hig an sncauiaging fenabeackand retaaging
`atyassigha
`
`
`an ure working for whi aid pleaseialug knowin
`
`‘TleANcad Now Fie
`
`Workracn Emi Aleiress (7)
`
`Thanks Rohit rad aceactthis wark as
`
`
`
`
`adfor our fling,
`
`
`Halll Chasetig ioe and release|
`
` Tun.
`
` nts fo this great war,
`
`Aheeh &.
`
`nina,
`
`Thank? for your feadback
`
`
`
`Weshianes erate the Squiss (out eagingers have
`
`Pigagg avew thanane fetus mowdt
`
`
`
`Regards
`
`
`
`
`arianas ner SPTNi,
`
` eds adiusiment ior age
`
`
`
`yeohan/tnantiegttahotphodbidid="9 195091
`
`
`riteswwwelance.con!
`
`EWS-002754
`
`EWS-002754
`
`

`

`isioreet
`
`Brsion to USPTO patent drat Messages Elance
`
`
`
` Mars
`Erba
`
`
`
`
`my!
`ote
`
`iy
`
`wantls Keay a broad
`
`
`
`nrines as
`
`Farige an iis,
`hae
`
`
`glad detal mada"
`
`shoula be just
`
`
`media! i wenging i cams are abstract
` acabon that 06
`
`
`iileave frat pnrage2
`
`Nad ahs WRG
`
`decryption is det
`Taw Tare
`
`
`
`
`
`Hheeh 0.
`
`
`
`eal the fret dhaofine som Mets &
`
`
`
`
`
`Pigase reviewthe camaandavovideyourfeedbackWe wil
`neonate
`
`chonsichaniaas youl vant us to incorporate it
`
`
`tha
`
`
` bet, Mar 32010 VORAa ql
`
` sncae
`
`
`
`
`
`Tharik you forthe undene, Vath lookathe docuang
`rasmond ithars is anynged,
`
`
`
` Ag foralaimng, thing we shaciel work within the Sad we hai 2
`‘floes to ilet
`
`
`
`tiieah &.
`
`
`
` ii case yau have ay
`
`HiyOu Gn Maret 18
`
`Hash G,
`
`
`
`
`He second arat of
`niges ater our
`
`
`we tas 2Scaine ngapendentndconarcantosing
`
`
`alti an 17 decancariteigims are adewe
`
`
`
`
`
`riteswwwelance.con!
`
`Nar
` ay an
`ey
`
`
`
`tSari
`
`EWS-002755
`
`EWS-002755
`
`

`

`isioreet version 10 USPTO patem drat Messages Eiance
`
`Fuutha
`
`comping pal
`
`
`rid,
`Pegarts
`
`=Mach ih 20h
`
`
`
` sta new delheranie date, adiise
`
`
`
`
`i WOT
`Sany, have @ coiracian to
`
`wei
`
`ich wae commentedin ine “rev! seat
`
`
`tranike
`
` bor Da, 71
`
`
`it
`
`
`Unique Wenlfienrev.aoe
`
`
`259 hawthe wean oad this Clef adaitonal ciswlasung in
`
`alos and calms thowing up au Slape cane
`
`
`
`
`
`
`
`
`
`ni Ronit
`
`
`
`
`
`Mitesh o.
`
`Thanks ‘or the feedback
`
`Mar 02 2089
`DB sa
`
`
`
`
`
`ike to tele to yOu& die muss theinves
`Hunter, we woud
`fart nas Soins quefies regaruing &,
`
`
`
`Plea lel us HAW a guia
`orrow! ata contact
`
`
`
`iia
`
`
`
`Whpra
`
`
`sr Gh Ooo
`
`
`
`OP AYEL WOME St TOE,Hanks
`
` any TAM s. aS NEISIO
`
`Horan te addte Sed crawing explanaten fh myariging!
`
`
`disolosure, bul harg 6 4 blot aspiariationof alfinestar your
`&
`
`
` ai
`
`
`comminitativg pais requirad tfuithe age:
`ayn
`fine
`invention. 404 is he Gu oy
`ip anparatis tr
`
`
`hitps:/Avmw.elan
`
`
`
` S601
`
`3a
`
`EWS-002756
`
`EWS-002756
`
`

`

`isioreet Brsion to USPTO patent drat Messages Elance
`
`
`
`
`Token, 302 18 the waaakarl
`adeia ofthe dighal nadia,
`
`388 13 tha nepworking card in whigh the MAGacctaas ig
`qqaavied for optioriai m etadara branaing process
`and
`cai, 008 - represant tie dateoes ademant usad
`
`reactwnile ang store ihe tokens Orproseasas Othe
`inyandtan,
`
`
`08 v9
`ringcions Str is the
`
`
`
`Thess tie AP Hn whieh
`siemvonie Dig
`the
`
`
`
`a nack 0 307 aoperana, 349 «i the datinase
`oonvncladte tha woos
`
`vod marnibershige ce wniehtheuser's
`
`
`ore
`
`ayanteonie 1D ie
`
`
`
`tows a flewchart giving ai averwawol tie procassof
` ragues tinadeuyan anebler and euscequeniiy checks
`communicative pars {c eoss-leferenceinfomation storedin
`tha
`mataats
`3 mace asaoiwhichhas dean pravoushy
`The figure sunbders af
`
`gan ovaniewof the
` nf a thaayshart or Uaefe white
` rend thas Ka]
`La fiehy:
` 0) tO Mhattr
`lycanstructen!key
`
`mene
`1
`Ie
`ape
`
`
`way
`hing conoeinginomstontan the APL
`
`i
`Hat ae ofFig?
`
`
`
`pigosssof
`
`
`
`
`
` Hieah G.
`
`Thanks 40rthe tid
`
`AS Og
`
`Weil ayes
`
`
`vate tha suggests
`
`
`
`
`feature,
`
`chen a frowdrad cicigims a
`
` wy
`
`
`
`ye will
`sanofe hese are onhemahon ¢
`
`
`correspon
`Sens ce
`Pigage roving wou"
` vanes otivaTH cari be
`
`
`
`
`Piaaba ENS KnOWiN CASS Yu NBue any commen
`
`Rayerds
`Pram
`
`
`
`Noge this small deta
`
`
`tha ROWenv faqu
`
`
`
`nian
`
`
`
`us the oract
`ve dacuranty ana fetyouAfowicage
`
`
`
`— william G.
`
`Froduerin which trig ig
`
`2195081
` hitps:/Auww.elance.c
`
`i
`
`o practice
`
`
`Fou ies 2080
`
`EWS-002757
`
`EWS-002757
`
`

`

`t
`wo
`SiOredSMErsion io USPTO patem drat Messages Elance
`
`aevd
`
`at
`
` hom Bnage
`
`Systenn In provisionasin product:
`
`
`
`
`
` anyuselul
`
`
`
`eaa oes
`
` rrainigollabphot
`
`EWS-002758
`
`EWS-002758
`
`

`

`1242
`
`Elance - Files
`
`
`
`HIRE
`
`FANS WORK
`
`MANAGE
`
`RESOUROES
`
`Cadracters
`
`tk
`
`
`
`
`
` 3:45 on a af Storage Used
`
`SE MBG OMB
`te ortINS We arn
`
`
`7
`glbloadtew
`Sot By Gala Added
`Payngnts
`Fas
`CURL)
`POMAS_ooivers
`
`
`
`Work Views
`
`TSURB
`
` Ophens »
`
`Status Repos “HOKE|Optons v
`
`
` figs
`baring
`
`Userbr200 Panty willanig.
`
`
`
`
` CAGody vetlianyg
`
`Team
`More
` eB
`
`JoatinuationAvalcaton
`egan ua
`cadaANG TY
`aeidy Hess 0
`
`
`Uigtal
`is_Mangoanel_
` gr it 2 ett i
`OPM tay thesh ©.
`
`iFigures 2
`a8 NGME AN
`
`
`DHEESLABnon
` oS anigySesh ©,
`
` Celing -08
`Udeatiad War 28, SMO EDthy Mesh ©
`
`Unaquganifer
`
` Ukaver iar
`ERERRCa
`
`“ies 30
`.
`neNEE
`TQ arg
`
`
`
`ChENS_-
`
`
`
`Haren.
`
`ao.
`
`
`”
`.
`STSSEM Norkaung oct
`
`AentadFoo 8, Ss Hsehywillamg,
`
`Sracignal age
`eeerasionalsos
`.
`
`Pet hy te TGamitvel
`iloated
`
`ESB
`
`Option v
`
`
`
`SRB
`
`Oohoas &
`
`HOKE Glow
`
`aS
`
`a3
`
`
`
`
`
`SKE
`
`Options w
`
`ayn
`KE
`
`Tit NrO
`Gators v
`
`ye
`
`ay yn
`cf MD
`
`into ye
`Oolong v
`
`WRue
`ATS RB
`
`Ae
`Oullons s
`
`KKOROUSIONALpd?
`
`Options v
`TB88B
`HAE AMO ON aS aay
`
`
`
`
`
`
`EWS-002759
`
`EWS-002759
`
`

`

`PERSONILIZED DIGITAL MEDIA ACCESS SYSTEM
`
`INVENTOR: WILLIAM GRECTA
`
`Abstract
`
`The invention is an apparatus thatfacilitates access to encrypted
`
`digital media to accept verification and authentication from an
`
`excelsior enabler using at least one token and at least one
`
`electronic identification. The said at least one electronic
`
`identification could be a device serial number, a networking MAC
`
`address, or a membershio ID reference from a web service,
`
`Access to the productis also managed with a plurality of
`
`secondary enablers using the said at least one electronic
`
`identification reference. In one embodiment, the invention is a
`
`process that in accordance with said apparatus is used to handle
`
`writable metadata of encrypted digital media to identify and
`
`manage requests from a plurality of said enablers. In a second
`
`embodiment, the invention may include a plurality of support
`
`tokens to satisfy authenticity requests which may include an
`
`alternative version of the said at least one verification token. In
`
`yet another embodiment, said apparatus can require additional
`
`status requirements from said plurality of said enablers
`
`relationship with said web service before allowing decryoted
`
`access. In a third embodiment, the said at least one verification
`
`token and said plurality of support tokens can host using a HTTP
`
`PUT calculation scheme to pay royalties to the apparatus
`
`EWS-002760
`
`EWS-002760
`
`

`

`provider.
`
`BACKGROUND OF THE INVENTION
`
`1, Field of the Invention
`
`The invention presented in this documentrelates to thefield of
`
`cigital rights management schemes used by creators of electronic
`
`products to protect commercialintellectual property copyrights
`
`privy to illegal copying using computerized devices. The invention
`
`contained here teaches a more personal system of digital rights
`
`management in which the electronic ID as part of a web service
`
`membership can be used to manage access rights across a
`
`plurality of devices. The invention is particularly useful for giving
`
`users the freedom to use products outside of the device in which
`
`the product was acquired and extend unlimited interoperability
`
`with other compatible devices.
`
`2. Description of Related Art
`
`Digital rights management (DRM) is a generic term for access
`
`control technologies that can be used by hardware
`
`manufacturers, publishers, copyright holders and individuals to
`
`imposelimitations on the usage of digital content and devices.
`
`The term is used to describe any technology thatinhibits uses
`
`(legitimate or otherwise)of digital content that were not desired
`
`or foreseen by the content provider. The term generally doesn't
`
`EWS-002761
`
`EWS-002761
`
`

`

`refer to other forms of copy protection that can be circumvented
`
`without modifying thefile or device, such as serial numbers or
`
`key files. It can also refer to restrictions associated with specific
`
`instances of digital works or devices.
`
`Consumer entertainment industries are in the transition of
`
`delivering products on physical media such as CD and DVD to
`
`Internet delivered systems. The Compact Disc, introduced to the
`
`public in 1982, wasinitially cesigned as a proprietary system
`
`cifering strict media to player compatibility. As the popularity of
`
`home computers and CD-ROM drives rose, so did the availability
`
`of CD ripping applications to make local copies of music to be
`
`enjoyed without the use of the disc. After a while, users found
`
`ways to share digital versions of music in the form of MP3files
`
`that could be easily shared with family and friends over the
`
`Internet. The DVD formatintroduced in 1997 included a new
`
`apparatus for optical discs technology with embedded copy
`
`protection schemes also recognized as an early form of DRM,
`
`With internet delivered music and videofiles, DRM schemes has
`
`been developed to lock acquired media to specific machines and
`
`most timeslimiting playback rights to a single machine or among
`
`a limited number of multiple machines regardless if the model
`
`numberis the same or not. Writing the machine device ID to the
`
`metadata of the media file, then cross referencing with a trusted
`
`clearinghouse according to pre-set rules doesthis.
`
`DRM systems employed by DVD and CD technologies consisted of
`
`EWS-002762
`
`EWS-002762
`
`

`

`scrambling (also known as encryption) disc sectors in a pattern
`
`to which hardware developed to unscrambie (also known as
`
`decryption) said disc sectors are required for playback, DRM
`
`systems duilt into operating systems such as Microsoft Windows
`
`Vista block viewing of media when an unsigned software
`
`application is running to prevent unauthorized copying of a media
`
`asset during playback. DRM used in computer games such as
`
`SecuROM and Steam are used to limit the amount of times a user
`
`can install a game on a machine, DRM schemesfor e-books
`
`include embedding credit card information and other personal
`
`information inside the metadata area of a delivered file format
`
`afd restricting the compatibility of the file with a limited number
`
`of reader devices and comouter applications.
`
`Ina typical DRM system, a productis encrypted using Symmetric
`
`block ciphers such as DES and AESto provide high levels of
`
`security. Ciphers known as asymmetric or public key/private key
`
`systems are used to manage access to encrypted products. In
`
`asymmetric systems the key used to encryot a product is not the
`
`same as that used to decrypt if, Ifa product has been encrypted
`
`using one key of a pair it cannot be decrypted even by someone
`
`else who has that key. Only the matching key of the pair can be
`
`used for decryption. After receiving an authorization token from a
`
`first-use action are usually triggers to decrypt block ciphers in
`
`most DRMsystems. Use rights and restrictions are established
`
`Curing this first-use action with the corresponding hosting device
`
`of a DRM protected product.
`
`EWS-002763
`
`EWS-002763
`
`

`

`Examples of such prior DRM art include Hurtado (U.S. Pat. No.
`
`6,611,812) who described a digital rights management system,
`
`where upon request to access digital content, encryption and
`
`ecryption keys are exchanged and managed with use of an
`
`authenticity clearing house. Other examples include Alve (U.S.
`
`Pat. No. 7,568,111) who teaches a DRM and Tuoriniemi (U.S. Pat.
`
`No. 20090164776) who described a management scheme to
`
`control access to electronic content by recording use across a
`
`plurality of trustworthy devices that has been granted permission
`
`to work within the scheme.
`
`DRMschemes have proven unpopular with consumers and rights
`
`organizations that oppose the complications with compatibility
`
`across machines manufactured by different companies. Reasons
`
`given to DRM opposition range from limited device playback
`
`rasirictions to the loss of fair-use which defines the freedom to
`
`share media products will family members.
`
`Prior art DRM methods rely on content providers to maintain
`
`computer servers to receive and send session authorization keys
`
`to client computers with an Internet connection, Usually rights
`
`are given from the serverfor an amountof time or amountof
`
`access actions before a requirement to reconnect with the server
`
`is required for reauthorization. At times, content providers will
`
`ciscontinue servers or even go out of business some years after
`
`DRM encrypted content was sold to consumers causing the ability
`
`EWS-002764
`
`EWS-002764
`
`

`

`to accessfiles to terminate,
`
`A solution is needed to give consumers the unlimited
`
`interoperability between devices and "fair use” sharing partners
`
`for an infinite time frame while protecting commercial digital
`
`media from unlicensed distribution to sustain long-term return of
`
`investments,
`
`BRIEF SUMMARY OF THE INVENTION
`
`The current state of DRM measures are not satisfactory because
`
`unavoidable issues can arise such as hardware failure or property
`
`theft that could lead to a paying customer locsing the right to
`
`recover purchased products. The current metadata writable DRM
`
`measures do notoffer a way to provide unlimited interoperability
`
`between unlimited machines because this theory goes against
`
`the very reason why traditional DRM exist.
`
`The invention describes an improvement on prior art DRM
`
`methods in which allows unlimited interoperability of digital
`
`media between unlimited machines with management of end-
`
`user access to said digital media.
`
`Tn one embodiment, the invention is a process of an apparatus
`
`which in accordance with an embodiment, another apparatus,
`
`tangible computer medium, or associated methods (herein
`
`referred to as The App) is used to: handle at least one branding
`
`EWS-002765
`
`EWS-002765
`
`

`

`action which could include post read and write requests of at
`
`least one writable metadata as part of at least one digital media
`
`asset to identify and manage requests from at least one excelsior
`
`enabler, and can further identify and manage requests from a
`
`plurality of connected second enablers; with at least one token
`
`and at least one electronic identification reference received from
`
`said at least one excelsior enabler utilizing at least one
`membership, Here, controlled by the said at least one excelsior
`
`enabier, The App will proceed to receive the said at least one
`
`token to verify the authenticityof said branding action and
`
`further requests: then establish at least one connection with at
`
`least one programmable communications console of the said at
`
`least one membership to request and receive the said at least
`
`one electronic identification reference; and could request and
`
`receive other data information from said at least one
`
`membership, The method then involves sending and receiving
`
`variable data information from The App to the said at least one
`
`membership to verify a preexisting said at least one branding
`
`action of said at least one writable metadata as part of said at
`
`least one digital media asset; or to establish permission or denial
`
`to execute said at least one branding action or said post read and
`
`write requests of said at least one writable metadata. To dothis,
`
`controlled by the said at least one excelsior enabler. The App
`
`may establish at least one connection, which is usually through
`
`the internet, with a programmable communications console,
`
`which is usually a combination of an API protocol and graphic
`
`user interface (GUI) as part of a web service, In addition, the
`
`EWS-002766
`
`EWS-002766
`
`

`

`said at least one excelsior enabler provides reestablished
`
`credentials to the programmable communications console as part
`
`of the said at least one membership, in which The App is
`
`facilitating and monitoring, to authenticate the data
`
`communications session used to send and receive data requests
`
`between the said at least one membership and The App.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 shows a flow chart giving an overviewof the process of
`
`Cigital media personalization by way of an enabler using an
`
`apparatus or otherwise known as an application in which
`
`facilitates digital media files. Here the apparatus interacts with all
`
`communicative parts required to fulfill the actions of the
`
`invention.
`
`FIG, 2 showsa flow chart giving an overview of the process of an
`
`access request made by an enabler and subsequently checks
`
`communicative parts to cross-reference information stored in the
`
`metadata of the digital media asset which has been previously
`
`handled by the process of FIG. 1.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`Traditional digital rights management (DRM) schemesare
`
`defined as authentication components added to digital files that
`
`have been encrypted from public access. Encryption schemesare
`
`EWS-002767
`
`EWS-002767
`
`

`

`not DRM methods but DRM systems are implemented to use an
`
`additional layer of authentication in which permission is granted
`
`for access to the cipher key required to decryntfiles for access. A
`
`computer serveris established to host decryption keys and to
`
`accent authentication keys from Internet connected client
`
`computers running client software in which handles the
`
`encrypted files. The server can administer different authorization
`
`keys back to the client computer that can grant different sets of
`
`rules and a time frame granted before theclient is required to
`
`connect with the server to reauthorize access permissions.In
`
`some cases content can terminate accessalter a set amount of
`
`time, or the process can break if the provider of the DRM server
`
`ever cease to offer services,
`
`Encrypted digital fles as referred to in this document can
`
`comprise: videofiles, audio files, container formats, documents,
`
`metadata as part of video game software and other computer
`
`based apparatus in which processed data is facilitated.
`
`The novelty of the invention is in the interest of providing infinite
`
`access rights of legally acquired at least one encrypted digital
`
`media asset to the content acquirer, explained in this document
`
`as the excelsior enabler, and optionally to their recognizedfriends
`
`and family, explained in this document as a plurality of secondary
`
`enablers. To explain further, the excelsior and secondary enablers
`
`Gefined could be human beings or
`
`computerized mechanisms programmed to process steps of the
`
`EWS-002768
`
`EWS-002768
`
`

`

`invention as would normally be done manually by a human
`being. in addition to said enablers, an apparatus used alone orin
`
`accordance with an embodiment, another apparatus, tangible
`
`computer medium, or associated methods with a connection are
`
`needed (herein referred to as The Apo}. To deliver the
`
`requirements of the invention, communicative and connected
`
`elements comprise: verification, authentication, electronic ID
`
`metadata branding, additional technical branding, and cross-
`
`referencing. The connection handling the communicative actions
`
`of the invention will usually be the Internet and can also be an
`
`internal apparatus cooperative. The App can further be defined
`
`as a Windows 05, Apple OS, Linux 05, and other operating
`
`systems hosting software running on a machine or device with a
`
`capable CPU, memory, and data storage. The App can be even
`
`further defined as a system on a chip (SOC), embedded silicon,
`
`flash memory, programmable circuits, cloud computing and
`
`runtimes, and other systems of automated processes.
`
`The digital media assets used in this system are encrypted
`
`usually with an AES cipher and decryption keys are usually
`
`stored encoded, no encoded, encrypted, or no encrypted as part
`
`of the apparatus or as part of a connection usually an Internet
`
`server. As explained earlier, the system we will discuss will work
`
`as a front-end to encrypted files as an authorization agent for
`
`cecrypted access.
`
`The verification element of this invention is facilitated by at least
`
`EWS-002769
`
`EWS-002769
`
`

`

`one token handled by at least one excelsior enabler. A token can
`
`be a structured or random password, e-mail address associated
`
`with a e-commerce payment system (such as PayPal, Amazon
`
`Payments, and other credit card services} used to make an
`
`authorization payment, or other redeemable instruments of trade
`
`for access rights of digital media. Usually, an identifier for said
`
`digital media is stored in a database with another database of a
`
`list of associated tokensfor cross-reference identification to use
`
`with the said verification element. The said database of a list of
`
`associated tokens can be comprised of Instant Payment
`
`Notification (IPN) received frorn successful financial e-commerce
`
`transactions that includes the identifier for said digital media;
`
`import of CSV password lists, and manually created reference
`
`ohrases, For this discussion, the said structured or random
`
`password example will be used as reverence, Said structured or
`
`random passwords can be devised in encoded schemesto flag
`
`the apparatus of permission type such as: 1) Purchases can start
`
`a password sequence with "P" following a random number, so
`
`further example would be "PSJD42349MPIDF", 2) Rentals can
`
`start or end a password sequence with "R” plus (+) the number
`
`of days a rental is allowed, for example "R7"includedin
`
`"R/SIDHFG58473"flagging a seven day rental. 3} Memberships
`
`can start or end @ password sequence with "M" plus (+)
`
`optionally the length of months valid for example
`
`"MLLDFIGHS4KF" would flag an eleven-month membership
`
`period. The tokens of this invention could be stored in a relational
`
`catabase such as MySQL or Oracle but will teach a more robust
`
`EWS-002770
`
`EWS-002770
`
`

`

`afd long-term method. Cloud storage systems such as Amazon's
`
`web Services Simple Storage Solution, or also known as $3,
`
`crovides a highly available worldwide replicated infrastructure. In
`
`addition to $3, monetization offerings such as DevPay offer
`
`cevelopers the oppertunity to make money from applications
`
`ceveloped to use the services. The verification element defined in
`
`this disclosure will reference te said $3 and DevPay services for
`
`example purposes only as many options such as FTP, SimpleDB,
`
`solid state storage and others can be used to host the token
`
`hosting needed for the verification elementof this invention. The
`
`term "verification element” used in explanation of the at least
`
`one token required for this invention is because the token
`
`represents permission from the content provider to grant access
`
`rights to the excelsior enabler and thereafter the plurality of
`
`secondary enablers. To set up the verification element the
`
`content provider can manually or automatically generate a single
`
`or a plurality of structured or random password in which will
`
`represent the token, By using public or private access of $3 as
`
`part of an apparatus, the content provider can create empty text
`
`files giving each the name of the passwords Generated. Because
`
`53is associated with a highly available woridwideinfrastructure,
`
`to check this password token can be done mysimply constructing
`
`a HTTP request from the apparatus and triggering follow up
`
`actions based on either a 200 HTTP response, which means OK at
`
`which point the next action can happen, or a 400 HTTPresponse
`
`which means ERROR at which point the verification process is
`
`voided. An additional token can be used {0 provice a flag to the
`
`EWS-002771
`
`EWS-002771
`
`

`

`apparatus that the verification element has been fulfilled fora
`
`initia! verification token. Creating an alternate version of the first
`
`token by appending a reference to the end, for example, does
`
`this: "MUIDFIGH34KF_user@sir3em.com_O1_01_11". In this
`
`example,it is defined that the eleven month authorized
`
`membership token was verified by a user@str3em.comon
`
`January 1, 2011. By providing a second token, thefirst token
`
`becomes locked te ewnership by the excelsior enabler preventing
`
`unauthorized users from reusing thefirst token without providing
`
`the authentication associated with the alternative referenced
`
`second token. In the interest of providers of the apparatus
`
`celivering this invention, this document will teach a method of a
`
`HTTP PUT calculation scheme for automatic royalty billing and
`
`administration for the token element used in the invention,
`
`Amazon's DevPayallow developers to attach monetary charges
`to data services of S3 offered as an embedded componentofsaid
`
`apparatus. By using the "PUT" requests parameter, tokens
`
`generated by the apparatus are monitored, calculated, and
`
`charged to clients of said apparatus provider. For example: the
`
`default charge measure for DevPayis $0.05 for every 1000 PUT
`
`request, By changing the amount to $1.00 for every 1000 PUT
`
`requests, the apparatus provider is paid a $0.10 royaltyfor each
`
`token created. Content providers using a corinected apparatuslike
`
`DevPay to deliver and manage digital media distribution do not
`
`need to have restrictions on the tokens created as with prior art
`
`DRM key providers as DevPay is charged on a pay-as-you
`
`need model on a monthly basis, As a novelty to the apparatus
`
`EWS-002772
`
`EWS-002772
`
`

`

`provider, if a content providerfails to pay royalties due, the
`
`DeyPay hosting will automatically deny token access to ail related
`
`media productsin distripution and restore this verification element
`
`when royalties are paid in full. This relieves the need of physical
`
`reprimand as with prior art DRM in which delinquent accounts are
`
`subject to human auditing processes.
`
`The authentication element of this invention is at least handied
`
`first by the said at least one excelsior enabler with a connection
`
`to a membership. In this disclosure, the connection is equal te
`
`the Internet and the membership is equal to a web service.
`
`Further, the web service must be available for two way data
`
`exchange to complete the authentication process of this
`
`invention. Data exchange with a web service is usually facilitated
`
`with a programmable communications console, at mosttimes,
`
`will be an Applications Programmable Interface (API). An API is a
`
`set of routines, data structures, object classes, and/or protocols
`
`provided by libraries anc/or operating system services in orderto
`
`support the building of applications. An API maybe language-
`
`cependent: that is, available only in a particular programming
`
`language, using the particular syntax and elements of the
`
`programming language to make the API convenient to use in this
`
`particular context. Alternatively an API may be language-
`
`independent: that is, written in a way that meansit can be called
`
`from several programming lan

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket