throbber
EWS-001146
`
`Early Warning Services 1001
`IPR of U.S. Pat. No. 8,887,308
`
`

`

`U.S. Patent
`
`N
`
`41021,1
`
`teehS
`
`7f
`
`2B8039788,8SU
`
`W225E
`
`cosowccoo
`
`EBSEEE
`
`2:82
`
`3609
`
`228E
`
`EE
`
`M225EHmwscwm
`
`
`
`350m:vcooww
`
`228E
`
`
`
`w_:vo_>_mcficmhm
`
`TOE
`
`EWS—OO1 147
`
`EWS-001147
`
`

`

`U.S. Patent
`
`1,1V.0N
`
`7f02teehS
`
`8,8SU
`
`2B803,
`
`4228E228E228EmcouabocmwmmnfimocosmuEBmso
`
`
`cosoflwm
`
`228E
`
`2026me
`
`228E
`
`7IsN0E
`
`EWS—OO1 148
`
`EWS-001148
`
`

`

`US. Patent
`
`Nov. 11,2014
`
`Sheet 3 of7
`
`US 8,887,308 B2
`
`APiWEBSiTE .CGM GU!
`LOG [N TO CONTINUE.
`
`i1
`
`KODEKEY GU!
`
`"U ‘—
`EASE ENTER YOUR (300E
`AND PRESS THE REDEEM
`BUTTON.
`
`,
`
`1i i
`
`i
`i
`
`PWERJZSRJTKZS
`REDEEM
`
`DATABASE
`
`
`302
`
`BAYABASE
`
`
`
`PRODUCT METADATA
`
`FIG. 3
`
`EWS—OO1 149
`
`EWS-001149
`
`

`

`US. Patent
`
`Nov. 11,2014
`
`Sheet 4 of7
`
`US 8,887,308 B2
`
`491
`
`4G?
`mmmmmmmCWWW
`
`APIWEBSWE ‘COM GU!
`LOG [N TO CONTINUE.
`
`|
`|
`:
`: LOGIN ii):
`USEREMNLWEMBER'CW
`|
`|
`|
`|
`
`|
`|
`:
`=
`|
`|
`|
`|
`
`| |
`
`ACTiON '.
`ENABLER ACCESS REQUEST.
`
`
`
`
`409
`
`*
`
`BAYABASE
`
`
`402
`
`DATABASE
`
`‘ 405
`
`PRODUCT METADATA
`
`FIG. 4
`
`EWS—OO1 150
`
`EWS-001150
`
`

`

`US. Patent
`
`Nov. 11,2014
`
`Sheet 5 of7
`
`US 8,887,308 B2
`
`ST‘R3EM MACHINE
`8113
`
`,
`
`,
`,
`PLEASE CONNECT QR LOADA
`KEY FILE TO AUTHORiZE THIS
`DEVICE.
`
`,
`
`503
`
`|
`|
`
`APIWEBSITE .COM GUI
`LOG EN TO CONTINUE.
`
`|
`|
`
`l
`l
`I
`j
`I
`:
`} LOGIN 33:
`I USEREMAiLmEMBERCOM ,
`|
`|
`|
`|
`|
`|
`
`502
`
`1
`
`| |
`
`503
`
`
`
`
`CONNECT
`
`L
`
`BAYABASE DATABASE
`
`
`MACE-{WE MEMORY
`
`
`
`50?
`
`FIG. 5
`
`EWS—OO1 151
`
`EWS-001151
`
`

`

`US. Patent
`
`Nov. 11,2014
`
`Sheet 6 of7
`
`US 8,887,308 B2
`
`Receive a branding request from at least
`one communications console of the
`
`
`
`plurality of data processing devices
`
`Authenticate the membership verification
`token
`
`
`
`Establish connection with the at least
`
`one communications console
`
`_
`Request at least one electronic
`identification reference from the at least
`
`one communications console
`
`_
`_
`Receive the at least one electronic
`
`identification reference from the at least
`
`one communications console
`
`602
`
`604
`
`606
`
`608
`
`610
`
`612
`
`Brand metadata of the encrypted digital
`
`media
`
`End
`
`FIG.6
`
`EWS—OO1 152
`
`EWS-001152
`
`

`

`U.S. Patent
`
`Nov. 11, 2014
`
`Sheet 7 of 7
`
`US 8,887,308 B2
`
`Select one or media items to form the
`
`
`
`encrypted digital media
`
`Enter a master password which provides
`access to the encrypted digital media for
`editing
`
`create the encrypted digital media
`
`Customize user access panel of the
`encrypted digital media
`
`Connect the encrypted digital media to a
`database of membership verification
`tokens
`
`Encrypt the one or more media items to
`
`702
`
`704
`
`706
`
`708
`
`710
`
`End
`
`FIG.7
`
`EWS—001 153
`
`EWS-001153
`
`

`

`US 8,887,308 B2
`
`1
`DIGITAL CLOUD ACCESS (PDMAS PART III)
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a continuation of and claims the priority
`benefit of US. patent application Ser. No. 13/740,086 filed
`Jan. 11, 2013 which is a continuation of and claims the pri-
`ority benefit of Ser. No. 13/397,517 filed Feb. 15, 2012 now
`issued as US. Pat. No. 8,402,555 on Mar. 19, 2013 which is
`a continuation of and claimed the priority benefit of Ser. No.
`12/985,351 filed Jan. 6, 2011 which was a continuation ofand
`claimed the priority benefit ofUS. patent application Ser. No.
`12/728,218 filed Mar. 21, 2010, which are incorporated
`herein by reference in their entirety.
`
`10
`
`15
`
`BACKGROUND OF THE INVENTION
`
`2
`
`protection schemes also recognized as an early form of DRM.
`With internet delivered music and video files, DRM schemes
`has been developed to lock acquired media to specific
`machines and most times limiting playback rights to a single
`machine or among a limited number of multiple machines
`regardless ofthe model number. This was achieved by writing
`the machine device ID to the metadata of the media file, then
`cross referencing with a trusted clearinghouse according to
`pre-set rules. DRM systems employed by DVD and CD tech-
`nologies consisted of scrambling (also known as encryption)
`disc sectors in a pattern to which hardware developed to
`unscramble (also known as decryption) the disc sectors are
`required for playback. DRM systems built into operating
`systems such as Microsoft Windows Vista block viewing of
`media when an unsigned software application is running to
`prevent unauthorized copying of a media asset during play-
`back. DRM used in computer games such as SecuROM and
`Steam are used to limit the amount of times a user can install
`
`1. Field of the Invention
`
`The present invention relates to the field of digital rights
`management schemes used by creators of electronic products
`to protect commercial intellectual property copyrights privy
`to illegal copying using computerized devices. More specifi-
`cally, the present invention teaches a more personal system of
`digital rights management which employs electronic ID, as
`part of a web service membership, to manage access rights
`across a plurality of devices.
`2. Description of the Prior Art
`Digital rights management (DRM) is a generic term for
`access control technologies used by hardware manufacturers,
`publishers, copyright holders and individuals to impose limi-
`tations on the usage of digital content across devices. DRM
`refers to any technology that inhibits undesirable or illegal
`uses ofthe digital content. The term generally doesn’t refer to
`forms of copy protection that can be circumvented without
`modifying the file or device, such as serial numbers or key
`files. It can also refer to restrictions associated with specific
`instances of digital works or devices.
`Traditional DRM schemes are defined as authentication
`
`components added to digital files that have been encrypted
`from public access. Encryption schemes are not DRM meth-
`ods but DRM systems are implemented to use an additional
`layer of authentication in which permission is granted for
`access to the cipher key required to decrypt files for access. A
`computer server is established to host decryption keys and to
`accept authentication keys from Internet connected client
`computers running client software in which handles the
`encrypted files. The server can administer different authori-
`zation keys back to the client computer that can grant different
`sets of rules and a time frame granted before the client is
`required to connect with the server to reauthorize access
`permissions. In some cases content can terminate access after
`a set amount of time, or the process can break if the provider
`of the DRM server ever ceases to offer services.
`
`In the present scenario, consumer entertainment industries
`are in the transition of delivering products on physical media
`such as CD and DVD to Internet delivered systems. The
`Compact Disc, introduced to the public in 1982, was initially
`designed as a proprietary system offering strict media to
`player compatibility. As the popularity of home computers
`and CD-ROM drives rose, so did the availability of CD rip-
`ping applications to make local copies ofmusic to be enjoyed
`without the use of the disc. After a while, users found ways to
`share digital versions of music in the form of MP3 files that
`could be easily shared with family and friends over the Inter-
`net. The DVD format introduced in 1997 included a new
`
`apparatus for optical discs technology with embedded copy
`
`20
`
`a game on a machine. DRM schemes for e-books include
`embedding credit card information and other personal infor-
`mation inside the metadata area of a delivered file format and
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`restricting the compatibility of the file with a limited number
`of reader devices and computer applications.
`In a typical DRM system, a product is encrypted using
`Symmetric block ciphers such as DES and AES to provide
`high levels of security. Ciphers known as asymmetric or pub-
`lic key/private key systems are used to manage access to
`encrypted products. In asymmetric systems the key used to
`encrypt a product is not the same as that used to decrypt it. If
`a product has been encrypted using one key of a pair it cannot
`be decrypted even by someone else who has that key. Only the
`matching key of the pair can be used for decryption. After
`receiving an authorization token from a first-use action are
`usually triggers to decrypt block ciphers in most DRM sys-
`tems. User rights and restrictions are established during this
`first-use action with the corresponding hosting device of a
`DRM protected product.
`Examples of such prior DRM art include Hurtado (US.
`Pat. No. 6,611,812) who described a digital rights manage-
`ment system, where upon request to access digital content,
`encryption and decryption keys are exchanged and managed
`via an authenticity clearing house. Other examples include
`Alve (US. Pat. No. 7,568,111) who teaches a DRM and
`Tuoriniemi (US. Pat. No. 20090164776) who described a
`management scheme to control access to electronic content
`by recording use across a plurality oftrustworthy devices that
`has been granted permission to work within the scheme.
`Recently, DRM schemes have proven unpopular with con-
`sumers and rights organizations that oppose the complica-
`tions with compatibility across machines manufactured by
`different companies. Reasons given to DRM opposition
`range from limited device playback restrictions to the loss of
`fair-use which defines the freedom to share media products
`will family members.
`Prior art DRM methods rely on content providers to main-
`tain computer servers to receive and send session authoriza-
`tion keys to client computers with an Internet connection.
`Usually rights are given from the server for an amount oftime
`or amount of access actions before a requirement to reconnect
`with the server is required for reauthorization. At times, con-
`tent providers will discontinue servers or even go out of
`business some years after DRM encrypted content was sold to
`consumers causing the ability to access files to terminate.
`In the light ofthe foregoing discussion, the current states of
`DRM measures are not satisfactory because unavoidable
`issues can arise such as hardware failure or property theft that
`could lead to a paying customer loosing the right to recover
`
`EWS-OO1 154
`
`EWS-001154
`
`

`

`US 8,887,308 B2
`
`3
`purchased products. The current metadata writable DRM
`measures do not offer a way to provide unlimited interoper-
`ability between different machines. Therefore, a solution is
`needed to give consumers the unlimited interoperability
`between devices and “fair use” sharing partners for an infinite
`time frame while protecting commercial digital media from
`unlicensed distribution to sustain long-term return of invest-
`ments.
`
`SUMMARY OF THE INVENTION
`
`An object of the present invention is to provide unlimited
`interoperability of digital media between unlimited machines
`with management of end-user access to the digital media.
`In accordance with an embodiment of the present inven-
`tion, the invention is a process of an apparatus which in
`accordance with an embodiment, another apparatus, tangible
`computer medium, or associated methods (herein referred to
`as The App) is used to: handle at least one branding action
`which could include post read and write requests of at least
`one writable metadata as part of at least one digital media
`asset to identify and manage requests from at least one excel-
`sior enabler, and can further identify and manage requests
`from a plurality of connected second enablers; with at least
`one token and at least one electronic identification reference
`
`received from the at least one excelsior enabler utilizing at
`least one membership. Here, controlled by the at least one
`excelsior enabler, The App will proceed to receive the at least
`one token to verify the authenticity ofthe branding action and
`further requests; then establish at least one connection with at
`least one programmable communications console of the at
`least one membership to request and receive the at least one
`electronic identification reference; and could request and
`receive other data information from the at least one member-
`
`ship. The method then involves sending and receiving vari-
`able data information from The App to the at least one mem-
`bership to verify a preexisting the at least one branding action
`of the at least one writable metadata as part of the at least one
`digital media asset; or to establish permission or denial to
`execute the at least one branding action or the post read and
`write requests ofthe at least one writable metadata. To do this,
`controlled by the at least one excelsior enabler. The App may
`establish at least one connection, which is usually through the
`Internet, with a programmable communications console,
`which is usually a combination of an API protocol and
`graphic user interface (GUI) as part of a web service. In
`addition, the at least one excelsior enabler provides reestab-
`lished credentials to the programmable communications con-
`sole as part of the at least one membership, in which The App
`is facilitating and monitoring, to authenticate the data com-
`munications session used to send and receive data requests
`between the at least one membership and The App.
`In accordance with another embodiment of the present
`invention, the present invention teaches a method for moni-
`toring access to an encrypted digital media and facilitating
`unlimited interoperability between a plurality of data pro-
`cessing devices. The method comprises receiving a branding
`request from at least one communications console of the
`plurality of data processing devices, the branding request
`being a read and write request of metadata of the encrypted
`digital media, the request comprising a membership verifica-
`tion token corresponding to the encrypted digital media. Sub-
`sequently, the membership verification token is authenti-
`cated, the authentication being performed in connection with
`a token database. Thereafter, connection with the at least one
`communications console is established. Afterwards, at least
`one electronic identification reference is requested from the at
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`least one communications console. Further, the at least one
`electronic identification reference is received from the at least
`
`one communications console. Finally, branding metadata of
`the encrypted digital media is performed by writing the mem-
`bership verification token and the electronic identification
`reference into the metadata.
`
`The present invention is particularly useful for giving users
`the freedom to use products outside ofthe device in which the
`product was acquired and extend unlimited interoperability
`with other compatible devices.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`For a more complete understanding of the present inven-
`tion, the needs satisfied thereby, and the objects, features, and
`advantages thereof, reference now is made to the following
`description taken in connection with the accompanying draw-
`ings.
`FIG. 1 shows a system for monitoring access to an
`encrypted digital media according to an embodiment of the
`present invention.
`FIG. 2 shows a system for authoring an encrypted digital
`media according to an embodiment of the present invention.
`FIG. 3 shows a flow chart giving an overview ofthe process
`of digital media personalization according to an embodiment
`of the present invention.
`FIG. 4 shows a flow chart giving an overview ofthe process
`of an access request made by an enabler according to an
`embodiment of the present invention.
`FIG. 5 shows personalized digital rights management com-
`ponent as part of a compatible machine with writable static
`memory.
`FIG. 6 shows a flowchart for monitoring access to an
`encrypted digital media according to an embodiment of the
`present invention
`FIG. 7 shows a flowchart showing authoring an encrypted
`digital media according to an embodiment of the present
`invention.
`
`Skilled artisans will appreciate that elements in the figures
`are illustrated for simplicity and clarity and have not neces-
`sarily been drawn to scale. For example, the dimensions of
`some of the elements in the figures may be exaggerated rela-
`tive to other elements to help to improve understanding of
`embodiments of the present invention
`
`DETAILED DESCRIPTION OF THE DRAWINGS
`
`the particular system and
`Before describing in detail
`method for personalised digital media access system in accor-
`dance with an embodiment of the present invention, it should
`be observed that the present invention resides primarily in
`combinations of system components related to the device of
`the present invention.
`Accordingly, the system components have been repre-
`sented where appropriate by conventional symbols in the
`drawings, showing only those specific details that are perti-
`nent to understanding the present invention so as not to
`obscure the disclosure with details that will be readily appar-
`ent to those of ordinary skill in the art having the benefit ofthe
`description herein.
`In this document, relational terms such as ‘first’ and ‘sec-
`ond’, and the like may be used solely to distinguish one entity
`or action from another entity or action without necessarily
`requiring or implying any actual such relationship or order
`between such entities or actions. The terms ‘comprises’,
`‘comprising’, or any other variation thereof, are intended to
`cover a non-exclusive inclusion, such that a process, method,
`
`EWS-OO1 155
`
`EWS-001155
`
`

`

`US 8,887,308 B2
`
`5
`article, or apparatus that comprises a list of elements does not
`include only those elements but may include other elements
`not expressly listed or inherent to such process, method,
`article, or apparatus. An element proceeded by ‘comprises .
`.
`. a’ does not, without more constraints, preclude the existence
`of additional
`identical elements in the process, method,
`article, or apparatus that comprises the element.
`The present invention is directed at providing infinite access
`rights of legally acquired at least one encrypted digital media
`asset to the content acquirer, explained in this document as the
`excelsior enabler, and optionally to their recognized friends
`and family, explained in this document as a plurality of sec-
`ondary enablers. To explain further, the excelsior enabler and
`secondary enablers defined comprises human beings or com-
`puterized mechanisms programmed to process steps of the
`invention as would normally be done manually by a human
`being. Additionally, an apparatus used alone or in accordance
`with an embodiment, another apparatus, tangible computer
`medium, or associated methods with a connection are needed
`(herein referred to as The App). To deliver the requirements of
`the invention, communicative and connected elements com-
`prise: verification, authentication, electronic ID metadata
`branding, additional technical branding, and cross-referenc-
`ing. The connection handling the communicative actions of
`the invention will usually be the Internet and can also be an
`internal apparatus cooperative. The App can further be
`defined as a Windows OS, Apple OS, Linux OS, and other
`operating systems hosting software running on a machine or
`device with a capable CPU, memory, and data storage. The
`App can be even further defined as a system on a chip (SOC),
`embedded silicon, flash memory, programmable circuits,
`cloud computing and runtimes, and other systems of auto-
`mated processes.
`The digital media assets used in this system are encrypted
`usually with an AES cipher and decryption keys are usually
`stored encoded, no encoded, encrypted, or no encrypted as
`part of the apparatus or as part of a connection usually an
`Internet server. As explained earlier, the system we will dis-
`cuss will work as a front-end to encrypted files as an autho-
`rization agent for decrypted access.
`FIG. 1 shows a system 100 for monitoring access to an
`encrypted digital media according to an embodiment of the
`present invention. The system 100 includes a first recipient
`module 102, an authentication module 104, a connection
`module 106, a request module 108, a second receipt module
`110 and a branding module 112. The first receipt module 102
`receives a branding request from at least one communications
`console ofthe plurality of data processing devices. The brand-
`ing request is a read and write request of metadata of the
`encrypted digital media and includes a membership verifica-
`tion token corresponding to the encrypted digital media.
`Examples ofthe encrypted digital media includes, and are not
`limited to, one or more of a video file, audio file, container
`format, document, metadata as part of video game software
`and other computer based apparatus in which processed data
`is facilitated.
`
`Subsequently, the authentication module 104 authenticates
`the membership verification token. The authentication is per-
`formed in connection with a token database. Further, the
`connection module 106 establishes communication with the
`at least one communication console.
`
`According to an embodiment of the present invention, the
`connection is established through one of internet, intranet,
`Bluetooth, VPN, Infrared and LAN.
`According to another embodiment ofthe present invention,
`the communication console is a combination of an Applica-
`tion Programmable interface (API) protocol and graphic user
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`interface (GUI) as a part of web service. The API is a set of
`routines, data structures, object classes, and/or protocols pro-
`vided by libraries and/or operating system services. The API
`is either one of language dependent or language independent.
`The request module 108 requests at least one electronic
`identification reference from the at least one communication
`
`console. The second receipt module 110 receives the at least
`one electronic identification reference from the least one
`
`communication console. The branding module 112 brands
`metadata of the encrypted digital media by writing the mem-
`bership verification token and the electronic identification
`into the metadata.
`
`FIG. 2 shows a system 200 for authoring an encrypted
`digital media according to an embodiment of the present
`invention. The figure includes a selection module 202, a pass-
`word module 204, a customization module 206, a database
`module 208 and an encryption module 210. The selection
`module 202 facilitates selection ofone or more media items to
`
`form the encrypted digital media. Examples of the one or
`media items include, and are not limited to, one or more of a
`video, an audio and a game.
`According to an embodiment of the present invention, the
`one or more media items are one or more ofremote URL links
`and local media files.
`
`The password module 204 prompts the user to enter a
`master pas sword which provides access to the encrypted digi-
`tal media. Subsequently,
`the customization module 206
`allows the user to customize the user access panel of the
`encrypted digital media.
`According to an embodiment of the present invention, the
`customization module 206 facilitates adding one or more of a
`banner, a logo, an image, an advertisement, a tag line, a header
`message and textual information to the user access panel of
`the encrypted digital media.
`Further, the database module 208 connects the encrypted
`digital media to a database of membership verification token
`required for decrypting the encrypted digital media.
`According to an embodiment of the present invention, the
`membership verification token is a kodekey. The kodekey is a
`unique serial number assigned to the encrypted digital media.
`The encryption module 210 encrypts the one or more
`media items to create the encrypted digital media.
`According to an embodiment of the present invention, the
`system 200 further includes a watermark module. The water-
`mark module watermarks information on the encrypted digi-
`tal media, wherein the watermark is displayed during play-
`back of the encrypted digital media.
`According to another embodiment ofthe present invention,
`the system 200 further includes an access module. The access
`module allows the user to define access rights. Examples of
`the access rights include, but are not limited to, purchasing
`rights, rental rights and membership access rights.
`According to yet another embodiment ofthe present inven-
`tion, the system 200 further includes a name module. The
`name module allows the user to name the encrypted digital
`media.
`
`FIG. 3 shows a flow chart giving an overview ofthe process
`of digital media personalization according to an embodiment
`ofthe present invention. The process is achieved by way of an
`enabler using an apparatus or otherwise known as an appli-
`cation in which facilitates digital media files. The apparatus
`interacts with all communicative parts required to fulfill the
`actions ofthe invention. The figure shows a Kodekey Graphi-
`cal User Interface (GUI) 301, a product metadata 302, a
`networking card 303, internet 304, 306 and 308, database 305
`and 309 and an APIwebsite.com GUI 307. A user posts a
`branding request via the Kodekey GUI interface 301. The
`
`EWS-OO1 156
`
`EWS-001156
`
`

`

`US 8,887,308 B2
`
`8
`tions can be saVed for access of the digital media. The API-
`website.com GUI 509 is connected to the STR3EM machine
`
`GUI through the intemet 508. Further, APIwebsite.com GUI
`509 is connected to the database 511 through the internet 510.
`The APIwebsite.com GUI 509 prompts the user to enter the
`login id and a password to authorize the access to digital
`media. The database 511 is the database connected to the web
`
`serVice membership in which the user’s electronic ID is que-
`ried from.
`
`FIG. 6 shows a flowchart for monitoring access to an
`encrypted digital media according to an embodiment of the
`present inVention. At step 602, a branding request is made by
`a user from at least at least one communications console ofthe
`
`7
`Kodekey GUI interface 301 is the GUI for entering token. The
`Kodekey GUI interface 301 prompts the user to enter the
`token and press the redeem button present on the Kodekey
`GUI interface 301. The product metadata 302 is read/writable
`metadata associated with the digital media to be acquired.
`The networking card 303 facilitates querying of optional
`metadata branding process and referenced. The Kodekey GUI
`interface is connected to the database 305 Via the intemet 304
`
`through the networking card 303. The database 305 is the
`database used to read/write and store the tokens, also referred
`to as token database. The user is redirected to the APIweb-
`
`10
`
`site.com GUI 307 through the intemet 306. The APIwebsite-
`.com is the GUI to the membership API in which the elec-
`tronic ID is collected and sent back to the Kodekey GUI
`interface 3 01. The APIwebsite.com GUI 307 prompts the user
`to enter a login id and a password to access the digital media
`which is acquired from the database 309 through the internet
`308. The database 309 is the database connected to the web
`
`serVice membership in which the user’s electronic ID is que-
`ried from.
`
`20
`
`Examples ofthe encrypted digital files include, and are not
`limited to, a Video file, an audio file, container formats, docu-
`ments, metadata as part of Video game software and other
`computer based apparatus in which processed data is facili-
`tated.
`
`25
`
`15
`
`plurality of data processing deVices. The branding request is
`a read and write request of metadata of the encrypted digital
`media.
`
`According to an embodiment of the present inVention, the
`request
`includes a membership Verification token corre-
`sponding to the encrypted digital media.
`Subsequently,
`the membership Verification token is
`authenticated at step 604. The authentication is performed in
`connection with a token database. Further, connection with
`the at least communication console is established at step 606.
`Afterwards, at least one electronic identification reference is
`requested from the at least one communications console at the
`step 608. At step 610, at least one electronic identification
`reference in receiVed from the at least one communication
`
`console. Finally, metadata of the encrypted digital media is
`branded by writing the membership Verification token and the
`electronic identification reference into the metadata at the
`
`30
`
`step 612.
`FIG. 7 shows a flowchart showing authoring an encrypted
`digital media according to an embodiment of the present
`inVention. At step 702, one or more media items are selected
`by the user to form the encrypted digital media. Subsequently,
`a master password is entered for pr0Viding access to the
`encrypted digital media for editing at step 704. Afterwards,
`the user customizes the user panel of the encrypted digital
`media at step 706. Further, the encrypted digital media is
`connected to a database of membership Verification tokens
`required for decrypting the encrypted digital media at the step
`708. Finally, the one or more media items are encrypted to
`create the encrypted digital media at the step 710.
`According to Various embodiments of the present inVen-
`tion,
`the Verification is facilitated by at
`least one token
`handled by at least one excelsior enabler. Examples of the
`token include, and are not limited to, a structured or random
`password, e-mail address associated with an e-commerce
`payment system used to make an authorization payment, or
`other redeemable instruments of trade for access rights of
`digital media. Examples of e-commerce systems are PayPal,
`Amazon Payments, and other credit card serVices.
`According to an embodiment of the present inVention, an
`identifier for the digital media is stored in a database with
`another database of a list of associated tokens for cross-
`reference identification for Verification.
`
`According to an embodiment of the present inVention, the
`database of a list of associated tokens includes Instant Pay-
`ment Notification (IPN) receiVed from successful financial
`e-commerce transactions that includes the identifier for the
`
`digital media; import of CSV password lists, and manually
`created reference phrases.
`For this discussion, the structured or random password
`example will be used as reference. The structured or random
`passwords can be deVised in encoded schemes to flag the
`apparatus of permission type such as: l) Purchases can start a
`password sequence with “P” following a random number, so
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`EWS-OO1 157
`
`FIG. 4 shows a flow chart giVing an 0VerView ofthe process
`of an access request made by an enabler according to an
`embodiment ofthe present inVention. Subsequently, the com-
`municatiVe parts to cross-reference information stored in the
`metadata of the digital media asset are checked which has
`been preViously handled by the process of FIG. 1. The figure
`shows an enabler access request 401, a product metadata 402,
`a networking card 403, an internet 404, 406 and 408, a data-
`base 405 and 409 and an APIwebsite.com GUI 407, The
`enabler access request 401 facilitates the user to make a
`request for the digital media. The product metadata 402 is
`read/writable metadata associated with the digital media to be
`acquired. The networking card 403 facilitates querying of
`optional metadata branding process and referenced. The data-
`base 405 is the database used to read/write and store the
`tokens. The APIwebsite.com GUI 407 is the GUI in which the
`
`electronic ID is collected and sent back to the Kodekey GUI
`interface 3 01. The APIwebsite.com GUI 407 prompts the user
`to enter a login id and a password to access the digital media
`from the database 409 through the internet 408. The database
`409 is the database connected to the web serVice membership
`in which the user’s electronic ID is queried from.
`FIG. 5 shows personalized digital rights management com-
`ponent as part of a compatible machine with writable static
`memory. The figure represents an authorization sequence
`action in which a machine is authorized to accept a person-
`alized digital media file. The figure includes STR3EM
`Machine GUI 501 including the connect icon 502, a load key
`file icon 503, a networking card 504, an intemet 505, 508 and
`510, a database 506 and 511, a machine memory 507 and a
`APIwebsite.com GUI 509. The STR3EM Machine GUI 501
`
`prompts the user to connect or load a key file to authorize the
`deVice through the connect icon 502 and the load key file icon
`503. The STR3EM Machine GUI 501 is connected to the
`
`networking card 504. The networking card 504 facilitates
`querying of optional metadata branding process and refer-
`enced. Further, the STR3EM machine GUI 501 is connected
`to the database 506 Via the intemet 505. The database 506 is
`the database used to read/write and store the tokens. More-
`0Ver, STR3EM Machine GUI 501 is connected to the
`machine memory 507. The machine memory 507 represents
`the internal memory of the machine or deVice so authoriza-
`
`EWS-001157
`
`

`

`US 8,887,308 B2
`
`9
`further example would be “PSJD42349MFJDF”. 2) Rentals
`can start or end a password sequence with “R” plus (+) the
`number of days a rental
`is allowed, for example “R7”
`included in “R7SJDHFG5 8473” flagging a seven day rental.
`3) Memberships can

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket