`
`Early Warning Services 1008 (part 2)
`IPR of U.S. Pat. No. 8,887,308
`
`
`
`Byun
`Say
` Gatendar Mare +
`twive
`Ras
`Shay
`
`
`a,
`
`Ae ABS Rating
`
`
`
`
`
`
`
`me: now's vour ala an tesiabie baie” thers.
`
`
`
`
`
`EXHIBIT 20C-a
`
`taat account artis:
`
`{ hour
`tit
`
`
`
`
`
`EWS-002746
`
`EWS-002746
`
`
`
`Byun
`Say
` Gatendar Mare +
`twive
`Ras
`Shay
`
`
`a,
`
`Ae ABS Rating
`
`
`
`
`
`
`
`
`
`
`
`
`{ivan fall be rescy tomer
`PM ang: ok thanks
`
`
` realy of Epa
`
`
`
`
`
`Gisol your iCB
`
`
`
`
`
`wrt ast:
`
`EXHIBIT 25C-b
`
`EWS-002747
`
`EWS-002747
`
`
`
`twive
`
` Gatendar Mare +
`
` Mars May
`
`Hi Weill,
`
`
`
`
`thave sume gnublerns paying
`files baer ihe “pra version,
`
`ill be reeoy lomorow.
`id
`
`
`
`
`
`
`
`
`
`
`
`chk <id
`
`ato
`
`
`
`teal accu ccdieky f ceur
`Using 22 GBaf your
`4
`bt
`
`EXHIBIT 26C
`
`EWS-002748
`
`EWS-002748
`
`
`
`Byun
`Say
` Gatendar Mare +
`twive
`Ras
`Shay
`
`
`
`
`ntiNow fare Free 44 Day
`
`
`
` wate
`
`i,
`
`
`ity this Guile: bitp:/xemekeycorSTRIEMSetug Zi
`
`
`
` Wenger the auiontayta
`crveta vers
`
`
`AGWanOy sehkor<id ZoraunsofiGigmalcon»
`
`Wiltaro G, Slaachard oFkMiibCast Lid, <sa.cezedi(gmall. core
`
`
`
`
`
`
`
`of fio authoring elren message is missing.
`
`William G, Stanuhard of LAMbCast Lid, <sa.csZeaigmail.com>
`
`
`
`
`
`EXHIBIT 27C
`
`BG &
`
`
`
`4
`
`We:
`
`
`
`EWS-002749
`
`EWS-002749
`
`
`
`Byun
`Say
`Ras
`
`
`twive
`
` Gatendar Mare +
`
`WiltonG, Stancions Quer cl The STRIEM Tram =
`
`
`veut
`
`
`
`Shay a, AeABS Rating
`NOK
`
`ete
`
`Eosynent. simp
`
`
`
`
`
`EXHIBIT 28C
`
`
`
`
`
`EWS-002750
`
`EWS-002750
`
`
`
` eeCeeeeeeeeeeeeFeppeefe
`prrrrrrnnryiiiai:iiiiiien=iifog|iiiii4Sigii2|iiiiia|73:i|,oz|Pow|iiiaae2ime
`a):FeONEiiiie|:i5iiiiii=:3ii<<feiiiiiiijp2meijeSnneriiiijiii{z
`~$sft#:jiiSh.oe=i8#|&-i#|.gs.f2|ii|3aahi2a|&=isi7§@|£€Ff.|;BeiBe|=iE2=2i&i“sefboeUtUBgsBm|SeiEXeS
`aeii=Litpe|ii|ii|==2a12|:“i==|;SP|MBBrrrerencefiPoorer
`Bsij5—_~iiiiiiijas5aLe|P|# =&
`iiaCo3iiiiiiiae|=eiiaiji{;i;ig=i
`
`
`
` .|3Bdge.=tome|&SBSieS|BBiEtesei=i2oy|&i;=a2|2.ofB®ft&senSsi=|z=fgeUez=,#21=#SBbe|22teS|=|S*:adwe2feims=i;JSiei“Soete3Bi2,8€=(e127 €1'2:°58 £ZBILEBS:zi&-1£s&(2,8eS.FieSF2REe:Bi8ia=‘eei=i2é:”:i=2iE=ive|&mFe|jiS|ibkef;BoPm|BiiweiiZ2ii&|;2iiigaii=.i|;~*~ii=istEpiaa;|iijiweeEOEBBRbei|,|ftiiBeiswefes.|ft|fse|iiiEBe3Seieei$Reti;ii4i“4ig2.iiiiiiiiEBei1Ses:~ijiiiiiBei=i@1sBi|||es212£=iiiiiiiGa
`i{fiiiiiiiiZaieeeS!=i:iiiiiiii=3!=
`lakiERii
`5Hifi;ijiGej
`
`
`,y
`
`Warnings
`
` information:
`
`EWS-002751
`
`
`
`
`
`
`
`
`
`EWS-002751
`
`
`
`
`
`Ualonmation Dischourh Satesen HIS
`Filed {S803
`
`.
`
`ei=)eIBtai
`infaration
`
`
`
`
`
`
`
`
`
`
`Sean
`SpritCOUN,
`
`t
`\
`Cains
`\
`S
`fh
`\‘\
`:
`\
`\
`\
`,
`t
`1
`5
`‘
`‘
`4
`!
`‘
`yrsssesssssasssscasasccsaaccczzcsnnzgcenznccnazeccaznccnazeccananananancanananarancanananarananannanannnaanansaeaeyELAARGAGAREELSREALENEELEARLSERLESAN‘iWEAeAAUESSARGOSRELSARCUSEREEMAEEE‘
`!
`t
`{
`‘
`Ag
`By
`Drawindenthy black andwhitadine drawings
`i
`‘
`i
`‘
`1
`1
`‘
`\
`1
`L
`‘
`(eaepohooseenenenannnnnananannannnaninaananasaanntananasaavasananaaaanasasannasaanaaananasaanasananasanasaanaaannthiaanasasnnaananasaanasavannsnanasasbanassananananasaananananaananasaannasand
`‘
`‘
`Warnings
`;
`:
`Mennnnntnnnnnnnentnnntnnnnnsssntnninnssstinssstninsnsnnn‘
`|
`inhonmation:
`
`
`
`bemnseemenneenseenpeersrannseannteannenaansnesseninnaasaasenanaanasanaseyfinnnanassaneseninnanmaaseannannmnanasoasessnannnyyasaansanannanasaaseananananasaaseananenanassansaeannatesnasnannsaannaaa
`I
`!
`‘
`
` \
`
`\
`'
`
`hss
`Abriact
`
`.
`4
`
`:
`‘
`
`.
`3
`
`‘
`i
`\
`
`’‘'‘
`
`‘‘!
`
`i)
`
`4
`a
`
`Fas WasishoetPTY
`
`:4
`
`
`4‘
`
` ibnnananFana
`
`Warnings:
`Hn
`&.ae=mtweaheeFe
`
`f
`
`Thies Acknowledgement Racaiet evidencesneenint anthe noted date by the USPTO of the indicateddocuments,
`characterized by theapplicant,and inckuling pagecounts where applicable, It savesasauidenceof racaiptslinilaytealal
`Bost Coral,ag deactihied I MPEP 508,
`
` anew;app eaton|5sigladandtheapplicationincludes:thenecessarycomponentsforaflingdate(ace87CER
`
`nh
`TEMDHal and MPEP SCS),a Filling Recaink (87 CAR 1.34) will he lonuad in due conree and the date shown on (his
`Acknowledaement Raceiotwill astablichsthe Ming dateaftheapalicatan,
`
`NattonalStageofaninternatinnalApplicationunder
`35USC37)
`
`ifa Himaly subsulssian feenter the national tageofan international appheation is compliant with the conditions af 3%
`US.C. 377 ud athersaglable romuiemants 3 Form PCTG90indicating audeptence af theanplication as a
`national stage subimission ehder33 U5.C 47 will bet lise in addition to the Piling Raceigt,indue course,
`
`
`Fa newinternedional apntication is helng Med and the intematienal applicationincludesthe nacessary camnponents for
`au lotarnationalfillydate(see PLT Arlee11 and MPEP TANG)a Mutilation af the international Application Runber
`and ofthe international Flbig Bate (Form BCTNO)HOS}will be issuebe de cauans,subjentto presciiptionsconcerning
`ational security, and the date shawn on this AcknowledgementReneiit will astabish the imeiational Hing date af
`the application.
`i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
`
`poOS
`
`EWS-002752
`
`EWS-002752
`
`
`
`EXHIBITS SUBSECTION /C
`
`
`PROOF0 GENE
`
`
`
`
`tomeydiligencecoveringcriticaldatesrete
`Exhibits of this subsection support further evidence of atto
`February 19, 2010 to March 20, 2010, the day before fitin
`¢ of parent case - U.S non-provisional paten
`ed to skilled USPTOartisan are sitedif
`application 12/728,218 ~ Copies of the docurnents suamitt
`this section and was relied in part with instruction manual information resulting from co-active
`engineering diligence found at www.strem.com/instructions - note: screenshots of product manual
`titted to showthe totality of information
`fc
`relied unon to suoport attorneydiligence of reduction to constructive practice om March 24, 2010,
`
`informationdoes evnntaynbutsubr
`
`EWS-002753
`
`EWS-002753
`
`
`
`sored8itersion to USPTGpatent drat Messages Elance
`
`
`
`FIND WORK
`
`
`
`
`
`supeneed
`
`Ties Tao
`
`Provisional conversionto USPTO patent drait
`y
`\
`
`hed a
`
`
`
`
`
`Age Peon
` Work
`
`Ado tachment
`
`
`
`
`
`Senuge
`
`MessagetAllschmants
`
`
`fad login 250 days aio.
`
`Caterine
`Binet Messages
`PRESay
`
`Racant Files
`
`ag
`8
`
`Messages
`
`Pays ents
`
`mings
`
`Work Moye
`
` Status Repos
`Terms & Migsinniag
`
`Proposals
`
`Aeats
`
`
`
`
`
`Mascage Piter
`
`
`
`8 CLI UZIIE Te S3zAo
`
`iitesh S.
` Hig an sncauiaging fenabeackand retaaging
`atyassigha
`
`
`an ure working for whi aid pleaseialug knowin
`
`‘TleANcad Now Fie
`
`Workracn Emi Aleiress (7)
`
`Thanks Rohit rad aceactthis wark as
`
`
`
`
`adfor our fling,
`
`
`Halll Chasetig ioe and release|
`
` Tun.
`
` nts fo this great war,
`
`Aheeh &.
`
`nina,
`
`Thank? for your feadback
`
`
`
`Weshianes erate the Squiss (out eagingers have
`
`Pigagg avew thanane fetus mowdt
`
`
`
`Regards
`
`
`
`
`arianas ner SPTNi,
`
` eds adiusiment ior age
`
`
`
`yeohan/tnantiegttahotphodbidid="9 195091
`
`
`riteswwwelance.con!
`
`EWS-002754
`
`EWS-002754
`
`
`
`isioreet
`
`Brsion to USPTO patent drat Messages Elance
`
`
`
` Mars
`Erba
`
`
`
`
`my!
`ote
`
`iy
`
`wantls Keay a broad
`
`
`
`nrines as
`
`Farige an iis,
`hae
`
`
`glad detal mada"
`
`shoula be just
`
`
`media! i wenging i cams are abstract
` acabon that 06
`
`
`iileave frat pnrage2
`
`Nad ahs WRG
`
`decryption is det
`Taw Tare
`
`
`
`
`
`Hheeh 0.
`
`
`
`eal the fret dhaofine som Mets &
`
`
`
`
`
`Pigase reviewthe camaandavovideyourfeedbackWe wil
`neonate
`
`chonsichaniaas youl vant us to incorporate it
`
`
`tha
`
`
` bet, Mar 32010 VORAa ql
`
` sncae
`
`
`
`
`
`Tharik you forthe undene, Vath lookathe docuang
`rasmond ithars is anynged,
`
`
`
` Ag foralaimng, thing we shaciel work within the Sad we hai 2
`‘floes to ilet
`
`
`
`tiieah &.
`
`
`
` ii case yau have ay
`
`HiyOu Gn Maret 18
`
`Hash G,
`
`
`
`
`He second arat of
`niges ater our
`
`
`we tas 2Scaine ngapendentndconarcantosing
`
`
`alti an 17 decancariteigims are adewe
`
`
`
`
`
`riteswwwelance.con!
`
`Nar
` ay an
`ey
`
`
`
`tSari
`
`EWS-002755
`
`EWS-002755
`
`
`
`isioreet version 10 USPTO patem drat Messages Eiance
`
`Fuutha
`
`comping pal
`
`
`rid,
`Pegarts
`
`=Mach ih 20h
`
`
`
` sta new delheranie date, adiise
`
`
`
`
`i WOT
`Sany, have @ coiracian to
`
`wei
`
`ich wae commentedin ine “rev! seat
`
`
`tranike
`
` bor Da, 71
`
`
`it
`
`
`Unique Wenlfienrev.aoe
`
`
`259 hawthe wean oad this Clef adaitonal ciswlasung in
`
`alos and calms thowing up au Slape cane
`
`
`
`
`
`
`
`
`
`ni Ronit
`
`
`
`
`
`Mitesh o.
`
`Thanks ‘or the feedback
`
`Mar 02 2089
`DB sa
`
`
`
`
`
`ike to tele to yOu& die muss theinves
`Hunter, we woud
`fart nas Soins quefies regaruing &,
`
`
`
`Plea lel us HAW a guia
`orrow! ata contact
`
`
`
`iia
`
`
`
`Whpra
`
`
`sr Gh Ooo
`
`
`
`OP AYEL WOME St TOE,Hanks
`
` any TAM s. aS NEISIO
`
`Horan te addte Sed crawing explanaten fh myariging!
`
`
`disolosure, bul harg 6 4 blot aspiariationof alfinestar your
`&
`
`
` ai
`
`
`comminitativg pais requirad tfuithe age:
`ayn
`fine
`invention. 404 is he Gu oy
`ip anparatis tr
`
`
`hitps:/Avmw.elan
`
`
`
` S601
`
`3a
`
`EWS-002756
`
`EWS-002756
`
`
`
`isioreet Brsion to USPTO patent drat Messages Elance
`
`
`
`
`Token, 302 18 the waaakarl
`adeia ofthe dighal nadia,
`
`388 13 tha nepworking card in whigh the MAGacctaas ig
`qqaavied for optioriai m etadara branaing process
`and
`cai, 008 - represant tie dateoes ademant usad
`
`reactwnile ang store ihe tokens Orproseasas Othe
`inyandtan,
`
`
`08 v9
`ringcions Str is the
`
`
`
`Thess tie AP Hn whieh
`siemvonie Dig
`the
`
`
`
`a nack 0 307 aoperana, 349 «i the datinase
`oonvncladte tha woos
`
`vod marnibershige ce wniehtheuser's
`
`
`ore
`
`ayanteonie 1D ie
`
`
`
`tows a flewchart giving ai averwawol tie procassof
` ragues tinadeuyan anebler and euscequeniiy checks
`communicative pars {c eoss-leferenceinfomation storedin
`tha
`mataats
`3 mace asaoiwhichhas dean pravoushy
`The figure sunbders af
`
`gan ovaniewof the
` nf a thaayshart or Uaefe white
` rend thas Ka]
`La fiehy:
` 0) tO Mhattr
`lycanstructen!key
`
`mene
`1
`Ie
`ape
`
`
`way
`hing conoeinginomstontan the APL
`
`i
`Hat ae ofFig?
`
`
`
`pigosssof
`
`
`
`
`
` Hieah G.
`
`Thanks 40rthe tid
`
`AS Og
`
`Weil ayes
`
`
`vate tha suggests
`
`
`
`
`feature,
`
`chen a frowdrad cicigims a
`
` wy
`
`
`
`ye will
`sanofe hese are onhemahon ¢
`
`
`correspon
`Sens ce
`Pigage roving wou"
` vanes otivaTH cari be
`
`
`
`
`Piaaba ENS KnOWiN CASS Yu NBue any commen
`
`Rayerds
`Pram
`
`
`
`Noge this small deta
`
`
`tha ROWenv faqu
`
`
`
`nian
`
`
`
`us the oract
`ve dacuranty ana fetyouAfowicage
`
`
`
`— william G.
`
`Froduerin which trig ig
`
`2195081
` hitps:/Auww.elance.c
`
`i
`
`o practice
`
`
`Fou ies 2080
`
`EWS-002757
`
`EWS-002757
`
`
`
`t
`wo
`SiOredSMErsion io USPTO patem drat Messages Elance
`
`aevd
`
`at
`
` hom Bnage
`
`Systenn In provisionasin product:
`
`
`
`
`
` anyuselul
`
`
`
`eaa oes
`
` rrainigollabphot
`
`EWS-002758
`
`EWS-002758
`
`
`
`1242
`
`Elance - Files
`
`
`
`HIRE
`
`FANS WORK
`
`MANAGE
`
`RESOUROES
`
`Cadracters
`
`tk
`
`
`
`
`
` 3:45 on a af Storage Used
`
`SE MBG OMB
`te ortINS We arn
`
`
`7
`glbloadtew
`Sot By Gala Added
`Payngnts
`Fas
`CURL)
`POMAS_ooivers
`
`
`
`Work Views
`
`TSURB
`
` Ophens »
`
`Status Repos “HOKE|Optons v
`
`
` figs
`baring
`
`Userbr200 Panty willanig.
`
`
`
`
` CAGody vetlianyg
`
`Team
`More
` eB
`
`JoatinuationAvalcaton
`egan ua
`cadaANG TY
`aeidy Hess 0
`
`
`Uigtal
`is_Mangoanel_
` gr it 2 ett i
`OPM tay thesh ©.
`
`iFigures 2
`a8 NGME AN
`
`
`DHEESLABnon
` oS anigySesh ©,
`
` Celing -08
`Udeatiad War 28, SMO EDthy Mesh ©
`
`Unaquganifer
`
` Ukaver iar
`ERERRCa
`
`“ies 30
`.
`neNEE
`TQ arg
`
`
`
`ChENS_-
`
`
`
`Haren.
`
`ao.
`
`
`”
`.
`STSSEM Norkaung oct
`
`AentadFoo 8, Ss Hsehywillamg,
`
`Sracignal age
`eeerasionalsos
`.
`
`Pet hy te TGamitvel
`iloated
`
`ESB
`
`Option v
`
`
`
`SRB
`
`Oohoas &
`
`HOKE Glow
`
`aS
`
`a3
`
`
`
`
`
`SKE
`
`Options w
`
`ayn
`KE
`
`Tit NrO
`Gators v
`
`ye
`
`ay yn
`cf MD
`
`into ye
`Oolong v
`
`WRue
`ATS RB
`
`Ae
`Oullons s
`
`KKOROUSIONALpd?
`
`Options v
`TB88B
`HAE AMO ON aS aay
`
`
`
`
`
`
`EWS-002759
`
`EWS-002759
`
`
`
`PERSONILIZED DIGITAL MEDIA ACCESS SYSTEM
`
`INVENTOR: WILLIAM GRECTA
`
`Abstract
`
`The invention is an apparatus thatfacilitates access to encrypted
`
`digital media to accept verification and authentication from an
`
`excelsior enabler using at least one token and at least one
`
`electronic identification. The said at least one electronic
`
`identification could be a device serial number, a networking MAC
`
`address, or a membershio ID reference from a web service,
`
`Access to the productis also managed with a plurality of
`
`secondary enablers using the said at least one electronic
`
`identification reference. In one embodiment, the invention is a
`
`process that in accordance with said apparatus is used to handle
`
`writable metadata of encrypted digital media to identify and
`
`manage requests from a plurality of said enablers. In a second
`
`embodiment, the invention may include a plurality of support
`
`tokens to satisfy authenticity requests which may include an
`
`alternative version of the said at least one verification token. In
`
`yet another embodiment, said apparatus can require additional
`
`status requirements from said plurality of said enablers
`
`relationship with said web service before allowing decryoted
`
`access. In a third embodiment, the said at least one verification
`
`token and said plurality of support tokens can host using a HTTP
`
`PUT calculation scheme to pay royalties to the apparatus
`
`EWS-002760
`
`EWS-002760
`
`
`
`provider.
`
`BACKGROUND OF THE INVENTION
`
`1, Field of the Invention
`
`The invention presented in this documentrelates to thefield of
`
`cigital rights management schemes used by creators of electronic
`
`products to protect commercialintellectual property copyrights
`
`privy to illegal copying using computerized devices. The invention
`
`contained here teaches a more personal system of digital rights
`
`management in which the electronic ID as part of a web service
`
`membership can be used to manage access rights across a
`
`plurality of devices. The invention is particularly useful for giving
`
`users the freedom to use products outside of the device in which
`
`the product was acquired and extend unlimited interoperability
`
`with other compatible devices.
`
`2. Description of Related Art
`
`Digital rights management (DRM) is a generic term for access
`
`control technologies that can be used by hardware
`
`manufacturers, publishers, copyright holders and individuals to
`
`imposelimitations on the usage of digital content and devices.
`
`The term is used to describe any technology thatinhibits uses
`
`(legitimate or otherwise)of digital content that were not desired
`
`or foreseen by the content provider. The term generally doesn't
`
`EWS-002761
`
`EWS-002761
`
`
`
`refer to other forms of copy protection that can be circumvented
`
`without modifying thefile or device, such as serial numbers or
`
`key files. It can also refer to restrictions associated with specific
`
`instances of digital works or devices.
`
`Consumer entertainment industries are in the transition of
`
`delivering products on physical media such as CD and DVD to
`
`Internet delivered systems. The Compact Disc, introduced to the
`
`public in 1982, wasinitially cesigned as a proprietary system
`
`cifering strict media to player compatibility. As the popularity of
`
`home computers and CD-ROM drives rose, so did the availability
`
`of CD ripping applications to make local copies of music to be
`
`enjoyed without the use of the disc. After a while, users found
`
`ways to share digital versions of music in the form of MP3files
`
`that could be easily shared with family and friends over the
`
`Internet. The DVD formatintroduced in 1997 included a new
`
`apparatus for optical discs technology with embedded copy
`
`protection schemes also recognized as an early form of DRM,
`
`With internet delivered music and videofiles, DRM schemes has
`
`been developed to lock acquired media to specific machines and
`
`most timeslimiting playback rights to a single machine or among
`
`a limited number of multiple machines regardless if the model
`
`numberis the same or not. Writing the machine device ID to the
`
`metadata of the media file, then cross referencing with a trusted
`
`clearinghouse according to pre-set rules doesthis.
`
`DRM systems employed by DVD and CD technologies consisted of
`
`EWS-002762
`
`EWS-002762
`
`
`
`scrambling (also known as encryption) disc sectors in a pattern
`
`to which hardware developed to unscrambie (also known as
`
`decryption) said disc sectors are required for playback, DRM
`
`systems duilt into operating systems such as Microsoft Windows
`
`Vista block viewing of media when an unsigned software
`
`application is running to prevent unauthorized copying of a media
`
`asset during playback. DRM used in computer games such as
`
`SecuROM and Steam are used to limit the amount of times a user
`
`can install a game on a machine, DRM schemesfor e-books
`
`include embedding credit card information and other personal
`
`information inside the metadata area of a delivered file format
`
`afd restricting the compatibility of the file with a limited number
`
`of reader devices and comouter applications.
`
`Ina typical DRM system, a productis encrypted using Symmetric
`
`block ciphers such as DES and AESto provide high levels of
`
`security. Ciphers known as asymmetric or public key/private key
`
`systems are used to manage access to encrypted products. In
`
`asymmetric systems the key used to encryot a product is not the
`
`same as that used to decrypt if, Ifa product has been encrypted
`
`using one key of a pair it cannot be decrypted even by someone
`
`else who has that key. Only the matching key of the pair can be
`
`used for decryption. After receiving an authorization token from a
`
`first-use action are usually triggers to decrypt block ciphers in
`
`most DRMsystems. Use rights and restrictions are established
`
`Curing this first-use action with the corresponding hosting device
`
`of a DRM protected product.
`
`EWS-002763
`
`EWS-002763
`
`
`
`Examples of such prior DRM art include Hurtado (U.S. Pat. No.
`
`6,611,812) who described a digital rights management system,
`
`where upon request to access digital content, encryption and
`
`ecryption keys are exchanged and managed with use of an
`
`authenticity clearing house. Other examples include Alve (U.S.
`
`Pat. No. 7,568,111) who teaches a DRM and Tuoriniemi (U.S. Pat.
`
`No. 20090164776) who described a management scheme to
`
`control access to electronic content by recording use across a
`
`plurality of trustworthy devices that has been granted permission
`
`to work within the scheme.
`
`DRMschemes have proven unpopular with consumers and rights
`
`organizations that oppose the complications with compatibility
`
`across machines manufactured by different companies. Reasons
`
`given to DRM opposition range from limited device playback
`
`rasirictions to the loss of fair-use which defines the freedom to
`
`share media products will family members.
`
`Prior art DRM methods rely on content providers to maintain
`
`computer servers to receive and send session authorization keys
`
`to client computers with an Internet connection, Usually rights
`
`are given from the serverfor an amountof time or amountof
`
`access actions before a requirement to reconnect with the server
`
`is required for reauthorization. At times, content providers will
`
`ciscontinue servers or even go out of business some years after
`
`DRM encrypted content was sold to consumers causing the ability
`
`EWS-002764
`
`EWS-002764
`
`
`
`to accessfiles to terminate,
`
`A solution is needed to give consumers the unlimited
`
`interoperability between devices and "fair use” sharing partners
`
`for an infinite time frame while protecting commercial digital
`
`media from unlicensed distribution to sustain long-term return of
`
`investments,
`
`BRIEF SUMMARY OF THE INVENTION
`
`The current state of DRM measures are not satisfactory because
`
`unavoidable issues can arise such as hardware failure or property
`
`theft that could lead to a paying customer locsing the right to
`
`recover purchased products. The current metadata writable DRM
`
`measures do notoffer a way to provide unlimited interoperability
`
`between unlimited machines because this theory goes against
`
`the very reason why traditional DRM exist.
`
`The invention describes an improvement on prior art DRM
`
`methods in which allows unlimited interoperability of digital
`
`media between unlimited machines with management of end-
`
`user access to said digital media.
`
`Tn one embodiment, the invention is a process of an apparatus
`
`which in accordance with an embodiment, another apparatus,
`
`tangible computer medium, or associated methods (herein
`
`referred to as The App) is used to: handle at least one branding
`
`EWS-002765
`
`EWS-002765
`
`
`
`action which could include post read and write requests of at
`
`least one writable metadata as part of at least one digital media
`
`asset to identify and manage requests from at least one excelsior
`
`enabler, and can further identify and manage requests from a
`
`plurality of connected second enablers; with at least one token
`
`and at least one electronic identification reference received from
`
`said at least one excelsior enabler utilizing at least one
`membership, Here, controlled by the said at least one excelsior
`
`enabier, The App will proceed to receive the said at least one
`
`token to verify the authenticityof said branding action and
`
`further requests: then establish at least one connection with at
`
`least one programmable communications console of the said at
`
`least one membership to request and receive the said at least
`
`one electronic identification reference; and could request and
`
`receive other data information from said at least one
`
`membership, The method then involves sending and receiving
`
`variable data information from The App to the said at least one
`
`membership to verify a preexisting said at least one branding
`
`action of said at least one writable metadata as part of said at
`
`least one digital media asset; or to establish permission or denial
`
`to execute said at least one branding action or said post read and
`
`write requests of said at least one writable metadata. To dothis,
`
`controlled by the said at least one excelsior enabler. The App
`
`may establish at least one connection, which is usually through
`
`the internet, with a programmable communications console,
`
`which is usually a combination of an API protocol and graphic
`
`user interface (GUI) as part of a web service, In addition, the
`
`EWS-002766
`
`EWS-002766
`
`
`
`said at least one excelsior enabler provides reestablished
`
`credentials to the programmable communications console as part
`
`of the said at least one membership, in which The App is
`
`facilitating and monitoring, to authenticate the data
`
`communications session used to send and receive data requests
`
`between the said at least one membership and The App.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 shows a flow chart giving an overviewof the process of
`
`Cigital media personalization by way of an enabler using an
`
`apparatus or otherwise known as an application in which
`
`facilitates digital media files. Here the apparatus interacts with all
`
`communicative parts required to fulfill the actions of the
`
`invention.
`
`FIG, 2 showsa flow chart giving an overview of the process of an
`
`access request made by an enabler and subsequently checks
`
`communicative parts to cross-reference information stored in the
`
`metadata of the digital media asset which has been previously
`
`handled by the process of FIG. 1.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`Traditional digital rights management (DRM) schemesare
`
`defined as authentication components added to digital files that
`
`have been encrypted from public access. Encryption schemesare
`
`EWS-002767
`
`EWS-002767
`
`
`
`not DRM methods but DRM systems are implemented to use an
`
`additional layer of authentication in which permission is granted
`
`for access to the cipher key required to decryntfiles for access. A
`
`computer serveris established to host decryption keys and to
`
`accent authentication keys from Internet connected client
`
`computers running client software in which handles the
`
`encrypted files. The server can administer different authorization
`
`keys back to the client computer that can grant different sets of
`
`rules and a time frame granted before theclient is required to
`
`connect with the server to reauthorize access permissions.In
`
`some cases content can terminate accessalter a set amount of
`
`time, or the process can break if the provider of the DRM server
`
`ever cease to offer services,
`
`Encrypted digital fles as referred to in this document can
`
`comprise: videofiles, audio files, container formats, documents,
`
`metadata as part of video game software and other computer
`
`based apparatus in which processed data is facilitated.
`
`The novelty of the invention is in the interest of providing infinite
`
`access rights of legally acquired at least one encrypted digital
`
`media asset to the content acquirer, explained in this document
`
`as the excelsior enabler, and optionally to their recognizedfriends
`
`and family, explained in this document as a plurality of secondary
`
`enablers. To explain further, the excelsior and secondary enablers
`
`Gefined could be human beings or
`
`computerized mechanisms programmed to process steps of the
`
`EWS-002768
`
`EWS-002768
`
`
`
`invention as would normally be done manually by a human
`being. in addition to said enablers, an apparatus used alone orin
`
`accordance with an embodiment, another apparatus, tangible
`
`computer medium, or associated methods with a connection are
`
`needed (herein referred to as The Apo}. To deliver the
`
`requirements of the invention, communicative and connected
`
`elements comprise: verification, authentication, electronic ID
`
`metadata branding, additional technical branding, and cross-
`
`referencing. The connection handling the communicative actions
`
`of the invention will usually be the Internet and can also be an
`
`internal apparatus cooperative. The App can further be defined
`
`as a Windows 05, Apple OS, Linux 05, and other operating
`
`systems hosting software running on a machine or device with a
`
`capable CPU, memory, and data storage. The App can be even
`
`further defined as a system on a chip (SOC), embedded silicon,
`
`flash memory, programmable circuits, cloud computing and
`
`runtimes, and other systems of automated processes.
`
`The digital media assets used in this system are encrypted
`
`usually with an AES cipher and decryption keys are usually
`
`stored encoded, no encoded, encrypted, or no encrypted as part
`
`of the apparatus or as part of a connection usually an Internet
`
`server. As explained earlier, the system we will discuss will work
`
`as a front-end to encrypted files as an authorization agent for
`
`cecrypted access.
`
`The verification element of this invention is facilitated by at least
`
`EWS-002769
`
`EWS-002769
`
`
`
`one token handled by at least one excelsior enabler. A token can
`
`be a structured or random password, e-mail address associated
`
`with a e-commerce payment system (such as PayPal, Amazon
`
`Payments, and other credit card services} used to make an
`
`authorization payment, or other redeemable instruments of trade
`
`for access rights of digital media. Usually, an identifier for said
`
`digital media is stored in a database with another database of a
`
`list of associated tokensfor cross-reference identification to use
`
`with the said verification element. The said database of a list of
`
`associated tokens can be comprised of Instant Payment
`
`Notification (IPN) received frorn successful financial e-commerce
`
`transactions that includes the identifier for said digital media;
`
`import of CSV password lists, and manually created reference
`
`ohrases, For this discussion, the said structured or random
`
`password example will be used as reverence, Said structured or
`
`random passwords can be devised in encoded schemesto flag
`
`the apparatus of permission type such as: 1) Purchases can start
`
`a password sequence with "P" following a random number, so
`
`further example would be "PSJD42349MPIDF", 2) Rentals can
`
`start or end a password sequence with "R” plus (+) the number
`
`of days a rental is allowed, for example "R7"includedin
`
`"R/SIDHFG58473"flagging a seven day rental. 3} Memberships
`
`can start or end @ password sequence with "M" plus (+)
`
`optionally the length of months valid for example
`
`"MLLDFIGHS4KF" would flag an eleven-month membership
`
`period. The tokens of this invention could be stored in a relational
`
`catabase such as MySQL or Oracle but will teach a more robust
`
`EWS-002770
`
`EWS-002770
`
`
`
`afd long-term method. Cloud storage systems such as Amazon's
`
`web Services Simple Storage Solution, or also known as $3,
`
`crovides a highly available worldwide replicated infrastructure. In
`
`addition to $3, monetization offerings such as DevPay offer
`
`cevelopers the oppertunity to make money from applications
`
`ceveloped to use the services. The verification element defined in
`
`this disclosure will reference te said $3 and DevPay services for
`
`example purposes only as many options such as FTP, SimpleDB,
`
`solid state storage and others can be used to host the token
`
`hosting needed for the verification elementof this invention. The
`
`term "verification element” used in explanation of the at least
`
`one token required for this invention is because the token
`
`represents permission from the content provider to grant access
`
`rights to the excelsior enabler and thereafter the plurality of
`
`secondary enablers. To set up the verification element the
`
`content provider can manually or automatically generate a single
`
`or a plurality of structured or random password in which will
`
`represent the token, By using public or private access of $3 as
`
`part of an apparatus, the content provider can create empty text
`
`files giving each the name of the passwords Generated. Because
`
`53is associated with a highly available woridwideinfrastructure,
`
`to check this password token can be done mysimply constructing
`
`a HTTP request from the apparatus and triggering follow up
`
`actions based on either a 200 HTTP response, which means OK at
`
`which point the next action can happen, or a 400 HTTPresponse
`
`which means ERROR at which point the verification process is
`
`voided. An additional token can be used {0 provice a flag to the
`
`EWS-002771
`
`EWS-002771
`
`
`
`apparatus that the verification element has been fulfilled fora
`
`initia! verification token. Creating an alternate version of the first
`
`token by appending a reference to the end, for example, does
`
`this: "MUIDFIGH34KF_user@sir3em.com_O1_01_11". In this
`
`example,it is defined that the eleven month authorized
`
`membership token was verified by a user@str3em.comon
`
`January 1, 2011. By providing a second token, thefirst token
`
`becomes locked te ewnership by the excelsior enabler preventing
`
`unauthorized users from reusing thefirst token without providing
`
`the authentication associated with the alternative referenced
`
`second token. In the interest of providers of the apparatus
`
`celivering this invention, this document will teach a method of a
`
`HTTP PUT calculation scheme for automatic royalty billing and
`
`administration for the token element used in the invention,
`
`Amazon's DevPayallow developers to attach monetary charges
`to data services of S3 offered as an embedded componentofsaid
`
`apparatus. By using the "PUT" requests parameter, tokens
`
`generated by the apparatus are monitored, calculated, and
`
`charged to clients of said apparatus provider. For example: the
`
`default charge measure for DevPayis $0.05 for every 1000 PUT
`
`request, By changing the amount to $1.00 for every 1000 PUT
`
`requests, the apparatus provider is paid a $0.10 royaltyfor each
`
`token created. Content providers using a corinected apparatuslike
`
`DevPay to deliver and manage digital media distribution do not
`
`need to have restrictions on the tokens created as with prior art
`
`DRM key providers as DevPay is charged on a pay-as-you
`
`need model on a monthly basis, As a novelty to the apparatus
`
`EWS-002772
`
`EWS-002772
`
`
`
`provider, if a content providerfails to pay royalties due, the
`
`DeyPay hosting will automatically deny token access to ail related
`
`media productsin distripution and restore this verification element
`
`when royalties are paid in full. This relieves the need of physical
`
`reprimand as with prior art DRM in which delinquent accounts are
`
`subject to human auditing processes.
`
`The authentication element of this invention is at least handied
`
`first by the said at least one excelsior enabler with a connection
`
`to a membership. In this disclosure, the connection is equal te
`
`the Internet and the membership is equal to a web service.
`
`Further, the web service must be available for two way data
`
`exchange to complete the authentication process of this
`
`invention. Data exchange with a web service is usually facilitated
`
`with a programmable communications console, at mosttimes,
`
`will be an Applications Programmable Interface (API). An API is a
`
`set of routines, data structures, object classes, and/or protocols
`
`provided by libraries anc/or operating system services in orderto
`
`support the building of applications. An API maybe language-
`
`cependent: that is, available only in a particular programming
`
`language, using the particular syntax and elements of the
`
`programming language to make the API convenient to use in this
`
`particular context. Alternatively an API may be language-
`
`independent: that is, written in a way that meansit can be called
`
`from several programming lan