U.S. patent application number 15/056603 was filed with the patent office on 2016-09-01 for methods and apparatus for sharing, transferring and removing previously owned digital media.
The applicant listed for this patent is ReDigi, Inc.. Invention is credited to Micha Moffie, John M. Ossenmacher, Lawrence S. Rogel, Amihai Viks.
Application Number | 20160253482 15/056603 |
Document ID | / |
Family ID | 44189161 |
Filed Date | 2016-09-01 |
United States Patent
Application |
20160253482 |
Kind Code |
A1 |
Rogel; Lawrence S. ; et
al. |
September 1, 2016 |
METHODS AND APPARATUS FOR SHARING, TRANSFERRING AND REMOVING
PREVIOUSLY OWNED DIGITAL MEDIA
Abstract
The invention provide systems and methods for management of
digital media objects, comprising first and second client digital
data processors (e.g., personal (or private) computers, laptops,
dedicated music devices, electronic book readers, and so forth)
that are in communications coupling with one or more stores (e.g,
dedicated disk drives, flash drives, cloud storage, etc.). At least
one digital media object (DMO) or copy thereof is stored in one or
more of those stores and is accessible by at least one of the first
and second client digital data processors.
Inventors: |
Rogel; Lawrence S.;
(Brookline, MA) ; Ossenmacher; John M.; (Balboa
Island, CA) ; Moffie; Micha; (Somerville, MA)
; Viks; Amihai; (Ramat Gan, IL) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
ReDigi, Inc. |
Boston |
MA |
US |
|
|
Family ID: |
44189161 |
Appl. No.: |
15/056603 |
Filed: |
February 29, 2016 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
13852757 |
Mar 28, 2013 |
|
|
|
15056603 |
|
|
|
|
12983257 |
Dec 31, 2010 |
8627500 |
|
|
13852757 |
|
|
|
|
61291498 |
Dec 31, 2009 |
|
|
|
Current U.S.
Class: |
726/30 |
Current CPC
Class: |
H04N 21/4627 20130101;
H04L 63/123 20130101; G06F 21/10 20130101; G06F 21/604 20130101;
H04L 2463/101 20130101 |
International
Class: |
G06F 21/10 20060101
G06F021/10; G06F 21/60 20060101 G06F021/60 |
Claims
1-30. (canceled)
31. A system for management of digital media objects, comprising:
A. first client digital data processor and one or more second
client digital data processors, B. the first and second client
digital data processors being in communications coupling with one
or more stores, C. a set comprising one or more digital media
objects and/or copies thereof stored in one or more of the stores
and accessible by at least one of the first and second client
digital data processors, D. during a first period of time, the
first client digital data processor being substantially free of
discouragement from accessing the set of digital media objects
and/or copies thereof by management logic at least one of executing
on and in communications coupling with the first client digital
data processor, E. said management logic selectively discouraging
the first client digital data processor from accessing at least a
subset of the set of digital media objects and/or copies thereof,
the management logic performing such selective discouragement
during a second period of time that is mutually exclusive of the
first period of time, wherein the management logic being in
communications coupling with at least the first client digital data
processor during at least a second period of time, F. during the
second period of time, one or more of the second client digital
data processors being substantially free of discouragement from
accessing at least the subset of digital media objects and/or
copies thereof by said management logic.
32. The system of claim 31, wherein a size of the subset is
determined in accord with a size of a central store ("box")
allocated to the first client digital data processor.
33. The system of claim 31, wherein a user of the first digital
data processor specifies the digital media objects and/or copies
thereof making up the set.
34. The system of claim 32, wherein the management logic comprises
one or more subsystems that creates one or more of said subsets
from the set.
35. The system of claim 34, wherein the one or more subsystems
create said one or more subsets as a function of a popularity of
content represented by the digital media objects and/or copies
thereof making up the set.
36. A system for management of digital media objects, comprising:
A. first and second client digital data processors, B. the first
and second client digital data processors being in communications
coupling with one or more stores, C. a set comprising one or more
digital media objects and/or copies thereof stored in one or more
of the stores and accessible by at least one of the first and
second client digital data processors, D. during a first period of
time, the first client digital data processor being substantially
free of discouragement from accessing the set of digital media
objects and/or copies thereof by management logic at least one of
executing on and in communications coupling with the first client
digital data processor, E. said management logic selectively
discouraging the first client digital data processor from accessing
at least a subset of the set of digital media objects and/or copies
thereof, the management logic performing such selective
discouragement during a second period of time that is mutually
exclusive of the first period of time, wherein the management logic
being in communications coupling with at least the first client
digital data processor during at least a second period of time, F.
during the second period of time, the second client digital data
processor being substantially free of discouragement from accessing
at least the subset of digital media objects and/or copies thereof
by said management logic, G. wherein the subset is determined in
accord with a purchase request by second digital data processor
and/or an operator thereof.
37. The system of claim 35, the management logic includes a
subsystem that responds to the purchase request by requesting the
first digital data processor and/or an operator thereof if it
wishes to sell.
38. A method for management of digital media objects, comprising:
A. during a first period of time, freeing a first client digital
data processor of discouragement by management logic from accessing
a set of digital media objects and/or copies thereof, B. during a
second period of time that is mutually exclusive of the first
period of time, using the management logic to selectively
discouraging the first client digital data processor from accessing
at least a subset of the set of digital media objects and/or copies
thereof, F. during the second period of time, freeing one or more
second client digital data processors of discouragement from
accessing at least the subset of digital media objects and/or
copies thereof.
39. The method of claim 38, wherein a size of the subset is
determined in accord with the remaining capacity of a central store
("box") allocated to the first client digital data processor.
40. The method of claim 38, accepting specification by a user of
the first digital data processor of the digital media objects
and/or copies thereof making up the set.
41. The method of claim 39, creating one or more of said subsets
from the set as a function of a popularity of content represented
by the digital media objects and/or copies thereof making up the
set.
Description
[0001] This application is a continuation application based on U.S.
application Ser. No. 13/852,757, filed Mar. 28, 2013, entitled
"Methods and Apparatus for Sharing, Transferring and Removing
Previously Owned Digital Media," which is a continuation
application of U.S. application Ser. No. 12/983,257, filed Dec. 31,
2010, now issued as U.S. Pat. No. 8,627,500, entitled "Methods and
Apparatus for Sharing, Transferring and Removing Previously Owned
Digital Media," which claims the benefit of filing of U.S. Patent
Application Ser. No. 61/291,498, entitled "Methods and Apparatus
for Sharing, Transferring and Removing Previously Owned Digital
Media," filed Dec. 31, 2009, the teachings of which are each
incorporated herein by reference.
BACKGROUND OF THE INVENTION
[0002] The invention pertains to digital media and, more
particularly, by way of non-limiting example, to the management of
music, e-books and other forms of digital media. The invention has
application, by way of non-limiting example, in identifying,
sharing, transferring, redistributing and removing previously owned
digital media.
[0003] Digital computer music is very popular but so is the
practice of making and distributing copyright-infringing copies.
The music industry has tried many ways to prevent unauthorized
copying and distributing digital music. The problem is not limited
to digital music, however, digital movies, e-books, and many other
digital media objects are also subject to such copying.
[0004] Some methods of playing digital music and videos, such as
DVD players and Microsoft's Windows Media Player, will only play
objects that can be verified as original and legal. Other devices
go even further and remove content deemed illegal. For example, the
producers of special purpose devices for playing music, running
software games, and displaying e-books have retained the right to
remove content even after it is purchased and installed on a user's
device. For example, digital media objects purchased through
Apple's "app" store can be remotely removed from an iPhone or
iTouch without the owner's knowledge. Similarly for Amazon's Kindle
e-book reader. This can be done in a vertical market in which the
producer of the device is also the sole content distributor.
[0005] In a non-vertical market, when there is a personal computer
in the chain of producer to consumer, it is often challenging to
determine if a file contains a particular digital media object.
Small changes to the file undetectable by the viewer or listener
make it hard to determine the exact contents of a file.
[0006] Other technology, however, can identify the contents of a
digital media object. For example, in the case of digital music,
there are several ways to perform acoustic fingerprinting or
content-based audio identification, e.g. see U.S. Pat. No.
7,277,766 and U.S. Pat. No. 5,918,223. These and other methods
identify content from excerpts of only a few seconds long and deal
with shifting (not knowing exactly where in the content is the
excerpt). Some can also handle other sources of degradation such as
pitching (playing it faster or slower), equalization, and
background noise. They are relatively computationally
efficient.
[0007] There are two fundamental processes for identifying the
content of a digital media object (not just audio): fingerprint
extraction and matching algorithm. The first processes the contents
of a digital media object producing a set of features that are
particular to the specific object. The second uses these to
identify the object by querying a database of known objects and
their features.
[0008] Note that the second process is not need when the digital
media object is known. For example, consider the case when one
wants to find all files that the Beatles song "Yesterday." Given a
fingerprint of "Yesterday" one just compares this with the
fingerprints of all files.
[0009] Fingerprinting should not be confused with digital
watermarking which relies on inserting identifying features into
the content itself, and therefore changing the nature of the
content. Watermarks must be inserted at the source in order to
identify content and may be changed or removed at a later time by
anyone.
[0010] Like audio, video fingerprinting is also a well-known
technology. For audio and video, there are many fingerprinting
services, such as: [0011] Advestigo (audio, video and image
fingerprinting) [0012] Attributor (image and video fingerprinting)
[0013] Auditude Connect technology (audio and video fingerprinting)
[0014] Audible Magic (audio video image fingerprinting) [0015]
AudioFingerprint at MusicBrainz's wiki [0016] INA (video
fingerprinting) [0017] iPharro Media (video fingerprinting) [0018]
Philips Content Identification (audio and video fingerprinting)
[0019] MetatOGGer freeware using the MusicDNS service for
identifying audio files [0020] New Media Lab broadcast monitoring
service using audio fingerprinting technology. [0021] Civolution
(audio and video fingerprinting) [0022] Thomson (video
fingerprinting) [0023] Vercury (audio, image and video
fingerprinting) [0024] Vidyatel Video conform, TV (frame accurate
video fingerprinting) [0025] tracking and Management [0026] Vobile
Content Identification (audio and video fingerprinting) [0027] and
Management [0028] YUVsoft (video fingerprinting and search) [0029]
Zeitera (video fingerprinting)
[0030] Electronic books can be read on a computer, laptop, smart
phone, PDA, or specialized e-book reader. Many e-book readers use
e-ink as a display device because they require less power, and are
easy to read in bright sun light, and are less expensive. E-ink
currently cannot render animations with sufficient speed to look
seamless. Consequently, e-book readers tend to be of limited
computational value, and are usually dedicated to the single
function of displaying the pages of an electronic book. The Illiad
IRex, Amazon Kindle, Sony Reader, and the Barns-n-Noble Nook are
some dedicated e-book readers.
[0031] To date, the publishers have a tighter control on the
distribution of e-books. There are some digitizing and scanning
services, such as the Gutenberg Project and Google's book scanning
effort, that place digital versions of many books in the public
domain. It is much easier to fingerprint books, since the words
have a much more standard format.
[0032] Depending on the type of ebook software, the ebook file is
either encrypted to a specific computer or device (meaning it can
only be read on that computer or device) or it is encrypted to a
specific user's account (meaning it can be read on any device or
computer which contains that user's secret account
information).
[0033] If an ebook has been protected for only one person to read,
then consumers (or "users") download the file to their computer and
must read the ebook on that computer (or on other devices
containing their secret account information). Copies of the ebook
can only be read on authorized computers or by authorized
users.
[0034] If a publisher/author has decided not to copy-protect their
ebook, then consumers (or "users") download the file to their
computer and can then copy it to any other computer/device they
choose. The ebook may be read on any supported computer and by any
user.
[0035] Other digital media objects work in a similar fashion.
[0036] In view of the foregoing, an object of the invention is to
provide improved systems and methods for digital data processing
and, more particularly, for the management of music, e-books and
other forms of digital media.
SUMMARY OF THE INVENTION
[0037] The foregoing are among the objects attained by the
invention which provides, in some aspects, systems and methods for
managing digital media objects (e.g., digital music files) so that
actions taken with respect to them verifiably mimics at least some
of the consequences those actions would have on the physical
counterparts of those objects, e.g., record albums or CDs.
[0038] Thus, for example, in related aspects, the invention
provides such systems and methods that support "ownership" (or
acquisition) of digital objects such that, for example, when a user
buys such an object, the user acquires an actual (or virtual) copy
of it, along with the right to use it--subject, for example, to the
copyright or other applicable laws or agreements. In further
related aspects, the invention provides such systems and methods
that support transfers of ownership such that, for example, when a
user sells such an object, all copies of it are removed from the
user's computer and other synchronized devices (e.g., MP3
players).
[0039] Further aspects of the invention provide such systems and
methods that compensate for and/or take advantage of the digital
nature of the object. According to these aspects of the invention,
for example, if the owner's computer breaks, the digital object
becomes corrupted, or the owner buys a new computer, the owner can
still get the object.
[0040] In another aspect, the invention provides systems and
methods, e.g., as described above, for transferring previously
purchased digital media from the current legal owner to a new owner
in compliance with the first sale doctrine, the Digital Millennium
Copyright Act and so forth.
[0041] In another aspect, the invention provides systems and
methods, e.g., as described above, for identifying, fingerprinting,
compressing, deleting and transferring digital objects between
parties.
[0042] In another aspect, the invention provides systems and
methods, e.g., as described above, that support the right to
transfer and facilitate the transfer of previously purchased
digital media to another and provides permission for any parts of
the file that contain personal or purchase data to be modified or
removed.
[0043] In another aspect, the invention provides systems and
methods, e.g., as described above, for removing all identified
files from all devices that are or become connected to the
application source device.
[0044] In another aspect, the invention provides systems and
methods, e.g., as described above, for removing and or modifying
the Personal ID (PID) associated with a specific file or files and
adding a new PID to the file from which the previous PID has been
removed and or modified.
[0045] In another aspect, the invention provides methods, e.g., as
described above, for sharing digital data in a similar way to
physical hard goods, e.g., within a software application, such that
the owner can loan their media, for a predetermined period of time,
to another person or entity whereby the lender will not have full
access to the media within their application and the lendee will
have full use with the exception of the ability to copy an exact
duplicate of the media loaned.
[0046] In another aspect, the invention provides systems and
methods for inventory control that algorithmically determine the
likely inventory required on a period basis and allows users to
transfer desired media to application and receive credit for said
transfer if inventory is required by the algorithm, if inventory is
not currently required users inventory will be pegged and
transferred as needed in order of priority, the application will
keep record of available to transfer media stored on user
applications.
[0047] In another aspect, the invention provides systems and
methods for annotation template that allows the digital media to be
annotated with notes, pictures, graphs, ideas, any annotation that
is separate from the digital media but overlays in the proper place
when used in conjunction with the media source or can be used
standalone as a summary of annotations for a specific media file.
For example, the invention can include a copyright generator that
continually updates and assigns copyright of all template
annotations.
[0048] In another aspect, the invention provides systems and
methods for media revenue allocation that algorithmically allocate
a portion of applicable sales to the appropriate parties.
[0049] Further aspects of the invention are evident in Appendix A,
in which exemplary systems and methods according to the invention
are referred to as ReDigi.TM..
[0050] Further aspects of the invention provide a system for
management of digital media objects, comprising first and second
client digital data processors (e.g., personal (or private)
computers, laptops, dedicated music devices, electronic book
readers, and so forth) that are in communications coupling with one
or more stores (e.g, dedicated disk drives, flash drives, cloud
storage, etc.). At least one digital media object (DMO) or copy
thereof is stored in one or more of those stores and is accessible
by at least one of the first and second client digital data
processors.
[0051] During a first period of time, the first client digital data
processor is substantially free of discouragement from accessing
the DMO or copy thereof by management logic (e.g., management
software) that executes on that first client or is in
communications coupling therewith.
[0052] During a second (e.g., later) period of time that is
mutually exclusive of the first period, the management logic
selectively discourages the first client digital data processor
from accessing the DMO or any copies thereof. Such discouragement
can be, by way of example, the sending of warning messages, the
blocking of access to one or more accounts or services, the
blocking of file system access to such DMO or copies, and so forth.
During that same second period, the second client digital data
processor is substantially free of discouragement from accessing
the DMO or its copies copy thereof by said management logic.
[0053] According to aspects of the invention, the first period
corresponds to a time when the first client digital data processor
(e.g., or operator thereof) "owns" the DMO. The second period
corresponds to a time after which the first client (or operator)
has relinquished ownership. In related aspects of the invention,
that second period also corresponds to a time when the second
client digital data processor (or operator) has assumed ownership
of the DMO.
[0054] Further aspects of the invention provide systems, e.g., as
described above, in which the DMO is any of a digital song, a
video, a movie, an electronic book, a digital story, a digital
article, a digital document, a digital still image, a digital game,
or a portion thereof. In related aspects of the invention, the DMO
is a file representing any of the foregoing.
[0055] Still further related aspects of the invention provide
systems, e.g., as described above, wherein the management logic
computes and/or assigns a common, unique fingerprint to the DMO and
any copies thereof. In related aspects of the invention, that logic
discourages the first client from accessing any file or other DMO
having that common, unique fingerprint.
[0056] Still other aspects of the invention provide systems, e.g.,
as described above, in which the management logic effects such
selective discouragement in response to a transfer-ownership event,
e.g., a request by the first client to sell the DMO and/or by the
second client to buy the DMO. In related aspects of the invention,
the management logic can respond to a request by the first client
to sell the DMO by confirming that digital data processor indeed
owns it.
[0057] Yet still other aspects of the invention provide systems,
e.g., as described above, wherein the management logic effects the
selective discouragement in response to a transfer-ownership event.
In related aspects, that event is signaled or otherwise effected by
a server digital data processor that is in communications coupling
with the first and second client digital data processors. In still
further related aspects, the server thus effects an atomic transfer
of ownership of the DMO from the first client to the second
client.
[0058] As used herein, the terms "client digital data processor,"
"client," and the like refer to a respective one of the client
digital data processors, e.g., under the control of and/or at the
behest of its human owner and/or operator. As will be evident in
the discuss that follows, these terms may refer to the action of
human owner (or operator) him or herself.
[0059] Further aspects of the invention provides systems, e.g., as
described above, wherein a collection of multiple digital data
processors (e.g., personal computers, laptops, dedicated music
devices, etc., owned by the same person or family) stand in the
stead of one of the client digital data processors described
above.
[0060] Still further aspects of the invention provide methods of
method for management of digital media objects paralleling the
operations described above.
[0061] These and other aspects of the invention are evident in the
drawings and in the text that follows.
BRIEF DESCRIPTION OF THE DRAWINGS
[0062] A more complete understanding of the invention may be
attained by reference to the drawings, in which:
[0063] FIGS. 1A, 1B, 1C, and 1D depict options to encrypt different
parts of the file containing a digital media object in a system
according to the invention;
[0064] FIG. 2 depicts a system according to the invention;
[0065] FIG. 3 depicts processing of a music file in a system
according to the invention; and
[0066] FIG. 4 depicts tables used by a system according to the
invention in order to know what actions need to be taken when a
file is created, deleted, or modified.
DETAILED DESCRIPTION OF THE ILLUSTRATED EMBODIMENT
Introduction
[0067] Digital media objects, such as digital songs, movies,
electronic books, mimic many features and aspects of their
corresponding physical objects, although, to date there are
significant ways in which they still differ. In particular, there
is no common way to resell a digital media object. To do so, a
system is needed that can verify that someone owns a object before
selling it, and that after selling it, they no longer have it. This
document describes a way to do just that.
TERMINOLOGY
[0068] First it is helpful to define some terminology.
[0069] The term DMO or dmo as used herein denotes a "Digital Media
Object." A DMO is usually a file, but it could also be part of a
file or it can be replicated in multiple files, that contains a
creative work subject to protection by methods and systems
according to the invention. These can be, by way of non-limiting
example, digital songs, videos, movies, electronic books, stories,
articles documents, still images, video games, software
applications and so forth--just to name a few.
[0070] We use the term play to cover the broad category of what a
device does to a digital media object for the use by the user or
owner. In the case of a digital music or video object, play is the
correct term. For a digital picture, render is the term used to
display the picture, but for uniformity, we will say that a
computer or digital picture frame will play the picture. Similarly
for a digital book. We say that an e-book reader device will play
the electronic or digital book object.
[0071] The term User generally refers to the user of methods and
systems according to the present invention and or their respective
digital data processors. The person will, for example, buy and sell
DMO's with that digital data processor.
[0072] A file system or filesystem is a method of organizing
computer files to make it easy to find and access them. File
systems may use a data storage device, such as a hard disk, CD-ROM,
flash storage device, and can involve maintaining the physical
location of the files. File systems may be local or remote. File
systems may also be maintained in a single location or distributed
among multiple locations.
[0073] The term volume or disk volume is a technical computer term
referring to a single accessible storage area within a single file
system, typically resident on a single partition of a hard disk. As
above, a volume may be local or remote and/or maintained in a
single location or distributed among multiple locations.
[0074] A fingerprint of a computer file or of a digital media
object is a bit string (typically, a short bit string) that
uniquely identifies the original data, of a much larger size, for
all practical purposes just as human fingerprints uniquely identify
people for practical purposes. Fingerprints are typically used to
avoid the comparison and transmission of bulky data. Fingerprint
functions are related to (and sometimes confused with) checksums,
hash functions, cryptographic hash functions, and digital
signatures.
[0075] Digital Media Objects
[0076] Our era of computers has seen the "digitalization" of many
different media. Digital cameras have transformed the world of
photography. Film is no longer used to capture a picture, rather a
picture is captured with a digital camera and the image is recorded
as a series of pixels, or numbers/bits. A digital picture is a
collection of bits that encode the image in a certain may and
packaged together as a computer file. The pixels of the image are
arranged in a rectangle with a certain number of columns and rows.
Thus somewhere in the beginning of the file, are these two numbers.
There is much more information that can be specified about the
picture. This information is often stored in the header of the file
before the actual bits of the image. The information in the header
is sometimes referred to as "meta-data" since it describes things
about the image but not the image itself.
[0077] Meta-data in the header may specify information such as the
camera, the shutter speed, time and date, the place or GPS
coordinate as to where the picture was taken, and other things
about the image. In addition, other information can be stored in
this header, such as the photographer, the owner of the image, or a
unique id representing a particular purchase of the image. The
header might be sealed using encryption techniques to prevent
others from changing this information. The image may be compressed
using one of the standard techniques such as jpeg, tiff,
postscript, bitmap, and many others. The image may or may not be
encrypted.
[0078] FIGS. 1A, 1B, 1C, and 1D depict various options for
encrypting different parts of the file containing a digital media
object in a system according to the invention. Thus, as shown in
FIG. 1A, a digital media object 10 contains a header 12, along with
a "body" 14 containing bits representing the digital song, video,
or other file content. As shown in FIG. 1B, one option for
encrypting the file includes encrypting the body 14 using a private
key of the hardware device or software application that will be
used by the user to render (or, more generally, "play") the object
10. As shown in FIG. 1C, another option is to additionally encrypt
the header 12, albeit using a private key associated with the
distributor, producer or owner of the digital media object.
Further, as shown in FIG. 1D, a further option is to encrypt both
the header 12 and body 14--both encrypted in accord with FIG.
1C--with the private key of the copyright owner.
[0079] Music has seen a similar transformation. Music is no longer
recorded on a paper-roll, record or tape. It too has been digitized
and a recording placed in a file with a header similar to that of
digital pictures. The music encoding, number of bits per second of
playback, pitch, volume, Dolby encoding, and the dynamic range.
Other information may also be placed in the header, again, such as
the owner, producer, song title, and a whole lot more.
[0080] Pictures, music, and other digital media often contain more
precision than can be observed, heard, or sensed by people or by
the rendering technology. Consequently, variations in the bits
specifying the object may not be noticeable. Two images may appear
identical even though their bit representations differ slightly.
One the one hand, this provides a challenge when trying to identify
an image from its file representation. On the other-hand, it
permits embedding information directly into the image or music that
is not noticeable but can be used to watermark the object.
[0081] Of course, movies, which essentially are a combination of
images and sound have been digitized and wrapped in a file or
multiple files with detailed meta-data. There are many different
formats for movies as well. Since movies require a large number of
bits, they are often stored in multiple files but usually within
one main directory representing the entire movie.
[0082] Computers have been used as "word processing" devices or
desktop publishing for many years. More recently, there has been an
increase in electronic books, or e-books. Again, the contents of a
book are recorded digitally usually in a file or multiple files
within a directory. Once again, there is metadata associated with
the e-book, that may contain the title, author, number of pages,
and much more information.
[0083] Many other types of media are similarly treated. Computer
games, 3-D or holographic movies, karaoke, rock-band, maps, slide
shows, maps, and more. We shall refer to all of these as "digital
media objects."
[0084] Since digital media objects are just a file of binary data
they can be easily copied. Unlike the physical counterparts, the
copies are usually identical in that their binary specification are
exactly the same. The meta-data may be the same or may differ
depending on how the copy was made.
[0085] Typical Organization
[0086] FIG. 2 depicts a system for the management of digital media
objects according to one practice of the invention. It will be
appreciated that this is shown and described by way of example, and
that other systems incorporating changes to that shown (and
described) may fall are within the scope of the invention, as well.
As shown in the drawing,
[0087] There are many ways to install, maintain, distribute, sell,
and other operations involving DMO's and their use. In a typical
use case (see FIG. 2) of a system according to the invention, there
is a server digital data processor ("server") 20 that is accessed
by and in communications coupling with a client digital data
processor, e.g., private computer 22 of a user 24 via the internet
26. The server 20, which is typically remotely disposed from the
client digital data processor (or "client") and which is therefore
referred to occasionally herein without loss of generality as the
"remote server," stores original versions of the DMO's 28 for this
user 24 (as well as for other users). The user (a term which is
typically used herein to refer to an act of the client digital data
processor, e.g., under the control of and/or at the behest of its
human owner and/or operator) may upload or download his or her
DMO's between his or her private computer and his or her storage
area on the remote server. Every non-new DMO stored in the remote
server 20, is owned by some user's account. The user's account has
a pointer to the DMO stored on the disks associated with the remote
server.
[0088] For a DMO to be offered for sale, it is first copied to the
remote server and stored on the disk. The user's account points to
the place on the disk where the DMO is stored. All copies of the
DMO must be purged from the user's private computer. When this is
confirmed, the DMO can be offered for sale.
[0089] To buy a DMO 28a, a user places an order. When a matching
DMO is offered for sale a transaction occurs, that involves an
exchange of money and the pointer to the object is moved from the
previous owner to the new owner. The new owner's private computer
22 will download the object 28a from the remote server 20 and store
it on the local hard drive 30 of the private computer 22. Later,
the DMO player 32 is connected to the private computer 22 and the
DMO 28a is copied to that device 32.
[0090] Referring to FIG. 2, digital music can be played on a
computer 22, a dedicated music device 32, etc. Electronic books can
be read on computers 22, dedicated e-book readers 34. (The computer
22 and devices 32, 34 are collectively referred to herein as
"client digital data processors"). The digital media objects may be
downloaded from a server 20 via the internet 26. They may first be
stored on a computer 22 and then transferred to a dedicated media
device, e.g., 32 or the dedicated media device, e.g., 34 can
directly connect to the remote server 20 via the internet 26 for
such download.
[0091] When the dedicated device, e.g., 34, directly communicates
with a remote server 20, that server 20 can usually control the
objects on the device, e.g., 34, including remotely deleting them.
When the digital media objects are played on a computer 22 or when
dedicated devices, e.g., 32, connects or communicates with a
private computer 22, then DMO management software which is resident
on the private computer 22 (and which can exchange status
information with the server regarding DMOs owned, sold, awaiting
sale, etc., by the user of that computer) manages the content on
the device, e.g., 32. That management software is referred to
alternatively herein the "Manager Application," the "management
system," the "management software," and the like.
[0092] Ownership Concerns
[0093] Physical objects can be lent to friends, used, and then
returned or resold. Ownership of an object often means physical
possession. Owning an object often implies that one can sell that
object. In the prior art, ownership of digital objects do not have
this feature. It is easy to make an unlimited number of copies,
sell these away and still have the original. Systems according to
the invention overcome this by ensuring that, when a user sells a
DMO, he/she is divested of all current and future copies--until
he/she buys another. Thus, systems according to the invention
allows one to buy, sell, return, and transfer digital objects in
very much the same way as physical ones.
[0094] Functional Description
[0095] The following is a functional description of the invention
as it pertains to an exemplary system for music management,
sometimes referred to herein as ReDigi.TM.. In alternate
embodiments, similar systems can manage other types of digital
media, such as, by way of non-limiting example, digital songs,
videos, movies, electronic books, stories, articles documents,
still images, and so forth--just to name a few.
[0096] In one exemplary embodiment, illustrated in FIG. 3, a system
according to the invention processes a music file in order to
manage a single song. As shown in the drawing, a song can be
legally purchased and downloaded by an owner. See step 40. It can
be played by the owner until the owner wishes to sell the song. See
steps 42-44. If the song passes all validity checks (including
examination of metadata and fingerprint extraction) applied by the
Manager Application (step 54) and by the server (step 57) after the
song is uploaded (step 56), the song can be sold (see steps 46-60).
Otherwise, sale is rejected (step 62). In the case the sale is
permitted to proceed, the song is offered for sale by the server
(step 64), is logged as sold (step 66) and if new copies of the
song appear, e.g., as detected by waiting for external disk
attachment or file creation (step 70) and examining for match with
the sold song metadata and fingerprints of newly added files (steps
72-74), those are also deleted from the owner's system (step 68)
until and unless the sale is rescinded by the owner (step 76).
Until the song is actually sold, the sale can be rescinded (step
76) and the song can be downloaded (step 78) and its offer for sale
forgotten. Note that if the song is repurchased, it will have
different metadata, watermarkings, and fingerprints, so it will not
match the identify of a sold song (step 74 will fail).
[0097] A Recycled Digital Media Store
[0098] A registered member of a recycled digital media "store" that
operates according to the invention has numerous benefits. Members
can access a catalogue of recycled, licensed, digital media. Music,
movie, book and game fans will enjoy their favorite artists, actors
and authors showcased in a high-quality application that is easy
and fun to use. The net result is a low cost unparalleled user
experience and a compelling legal alternative to piracy.
[0099] Members can transfer unwanted digital media to the store in
exchange for purchase credit. This media is re-inventoried in the
store. A member can buy any media listed there with these credits.
Such a system can provide the ability to get music, books, movies,
and games with no cash out of pocket. In some embodiments, if the
account does not have sufficient credits to cover a purchase, the
purchase can be completed in the traditional way, e.g., by credit
card, etc.
[0100] Individual artist, author and producer areas allow members
to build a direct relationship with fans, old and new, across the
world. This service facilitates the development of revenue streams
through the sale of downloads, merchandising, concert tickets and
more, as well as, earning a share of the revenues created through
advertising and premium businesses. Powerful, real-time, in-depth
reporting is standard to participating labels and artists, authors,
etc. [0101] The Market for Digital Media has grown rapidly in the
digital music space and is growing even faster with the
introduction of digital movie downloads and digital books.
Historically, all forms of media have moved to the "used" or
"re-sale" marketplace. [0102] Why re-sale? Typically the markets
for resale are driven by VALUE, those purchasing in that category
are most often driven by the ability to save money while getting
the exact product they want, not an imitation, rendition or low
quality copy. [0103] Digital fingerprinting technology is used to
identify and tag uploaded media, thereby securely removing all
synced copies of the same file(s).
Embodiment
[0104] In some embodiments, management software (e.g., the
aforementioned Manager Application) can run on a personal computer
or laptop 22 that has connections to the internet 26. For example,
there can be one or more remote servers 20 providing the service of
purchasing, selling, inventory, and re-inventory of new and used
digital media objects 28. There can also be remote servers that
provide digital fingerprinting and identification services.
[0105] In some embodiments, a personal computer 22 can be used by a
user to buy, sell, and/or manage his or her DMOs 28. Dedicated
music players 32, movie viewers, e-book readers 34, and the like,
can connect to the personal computer 22 for DMO uploading and
downloading. When each of these devices, e.g., 32-34, are attached
to the personal computer 22, they can appear as a removable file
system to the computer.
[0106] In some embodiments, the systems and methods of the present
invention, e.g., the management software embodying the features
disclosed herein, can run on portable digital devices, such as
smart phones, or PDA's, or can execute on remote servers that
control the content of dedicated devices. The modifications
necessary to achieve these modifications are within the scope of
this invention. An exemplary embodiment of which is described
below.
[0107] For example, digital media objects can reside on "read-only"
physical media, such as a CD, DVD, ROM, photographic paper, or
physical book. They can also reside on more volatile devices such
as RAM, disks, SSD, or flash memories. The digital data or bits of
such volatile memory devices can be easily written or re-written
many times. A digital media object can reside on any or all of
these forms of data storage. Such data storage, especially flash
memory can be found in all sorts of consumer devices. A single
digital media object, say a digital song, can reside in a computers
hard disk in one or more files, but can also reside in the flash
memory of a portable music player, as well as on a backup disk
drive or external flash memory.
[0108] In preparation to offer a digital media object for sale, the
goal is to delete, expunge, remove, or disable all of the copies of
this digital media object that are owned by seller so that there is
only a single copy of the DMO whose ownership will be transferred
during the sale. While it may be impossible to delete the copy of a
digital media object that is stored on a disconnected, powered off
disk drive, the management system software makes a best effort to
remove all copies. To this end, the management system software
preferably remembers the sale of this digital media object so that
any time in the future, when a disconnected device is reconnected,
the system will retry to remove it as well. A fingerprint of the
DMO is used so that even if the metadata of a file containing the
DMO is modified, it will still be recognized as a copy of the
object sold or offered for sale. Similarly for portable digital
music players; whenever they are connected to the computer, the
manager will attempt to remove copies as well.
[0109] The working of an exemplary management system is described
in two parts. The first part is the typical execution and assumes
everything has been setup and initialized. The second part is the
initial setup and handling other cases. The management system
software runs on the private computer, smartphone, or other
personal computing device. It communicates over the internet with
the servers. The working of an exemplary server-side system is
described as well.
[0110] Typical Operation
[0111] In one exemplary embodiment, the manager system uses the
contents of several tables in order to know what actions need to be
taken when a file is created, deleted, or modified. These tables
are maintained on the local personal computer and can be mirrored
on a remote server. When not in use, the tables are encrypted to
prevent easy manipulation by rogue processes. Although not
absolutely necessary, the private keys should be backed up on a
remote server. In addition, the servers maintain a list of DMO's
that have been bought or sold by the user. These lists are
periodically sent to the management system software on the private
computer to ensure they are up-to-date.
[0112] FIG. 4 specifies some exemplary fields for each entry in the
table. Since files may be contained on external storage or storage
contained within external devices or players (referred to as a
volume), a complete specification of the file is needed. The
ReDigi.TM. Universal ID is a globally unique ID and used to connect
the file with entries in the other tables. The public key in the
owned, bought, and sold tables refers to a way to decrypt the DMO.
The entries in these three tables may contain a list of files that
contain this DMO.
[0113] Each entry of the tables can contain the globally unique
identity of the DMO. This is known to the remote server, which has
a more detailed set of features and identifying markers for the
object. Some objects can also have a decryption key. The entry for
a DMO can also contain a fingerprint of the file, e.g. the MD5 sum
as well as a list of files that represent or "contain" this DMO. It
may also contain other identifying features that depend on the
actual media type.
[0114] Some of the tables are as follows (see FIG. 4) for the
fields of each entry in the tables): [0115] file_id: This specifies
a file. The file can be on the local machine or on a file system
that is only temporarily attached. This other file system might be
a dedicated device or an external drive, e.g. a flash drive. [0116]
dmo-owned: This is the set of DMO's that are owned by this user.
Each could be contained in many different files on many different
devices. [0117] demo-sold: The set of DMO's that were sold by this
user. [0118] dmo-bought: The set of DMO's that were purchased by
this user. [0119] dmo-multiple-transactions: The set of DMO's that
have been bought and sold multiple times. These entries represent
files that should be watched. [0120] dmo-suspicious: DMO's that
have been sold but reappeared on the system
[0121] In some embodiments, whenever a file is created, deleted, or
modified, a maintenance function of the management software is
invoked. This invocation works in the same way as virus protection
software. Under the Microsoft Windows operating system, it is
possible to register a routine to be invoked on all these
operations. Under the Macintosh Operating System, a similar
mechanism exists for the file indexing service, "spotlight" If
other operating systems do not provide this ability, then a
periodic scan over all the files in the system can be performed in
the background to detect the status off all the files.
[0122] In the Microsoft Windows operating systems, care is needed
to avoid excessive invocation of this routine. When making a copy
of a file, the routine will be called numerous times, as the new
file is continually updated. Even worse is what happens when an
entire directory, containing many files, is copied. To avoid
numerous calls, a delay in inserted. It is not necessary for the
management software to immediately check each new file creation or
modification. All that is necessary is for each file to eventually
be checked.
[0123] On each invocation the following actions occur. Note that
the first action is to fingerprint the file using MD5 (message
digest 5)--hash value of the entire file (very fragile). Thus, if
the owner makes a copy of a file, we will be able to notice that
the files are the same.
TABLE-US-00001 DMO- DMO- DMO- Owned Bought Sold None Creation add
to increase delete add to owned count file or scanned issue warning
Accessed delete file or issue warning Deletion remove from decrease
rescind add to owned count any scanned outstanding warning
Modification treat as if delete delete add to then create file or
scanned issue warning Purchase add to bought Sell/gift add to
sold
[0124] Actions in response to a File Creation notification
[0125] In some embodiments, since a user can make multiple copies
of any DMO's that he or she owns, each copy should be recorded in
the DMO-Owned or DMO-Bought table and checked against the DMO-sold.
Although it is not necessary to record this information for DMO's
that are owned, it makes the task of offering a DMO for sale much
faster. If a DMO has been sold, the newly created file must be
removed from the system either under management control or by
issuing a notification warning the user that the DMO has been sold
and the file must be deleted. The exception is when the user has
access to a DMO but does not have sufficient computer privileges to
delete the file. For example, there are two users who share the
same personal computer. Each user may be able to access files in
the other's account but does not have permission to delete those
files. Every modern, advanced operating system has a set of read,
write, and deletion permissions associated with every file and
every user account. Anyone skilled in the art of computer
programming knows how to check these permissions.
[0126] It is possible that the file creation is the result of a
copy from a removable device containing that file, in such a case,
both the new and the old DMO files must be deleted. A DMO file
found on device that has just been attached is considered to be a
file creation, and will be either recorded or deleted depending on
it being identified as owned or sold. If Non-DMO files or DMO files
that cannot be validated as resulting from an on-line download
purchase are ignored since they cannot be sold in the future and
are assumed not to be part of the system of objects being tracked.
A methodology for carrying out these steps is illustrated, by way
of non-limiting example, in the code that follows,
TABLE-US-00002 def on_file_creation(file_id): (file_name,
file_meta_data) = file_id if (dmo_id =
contained_in_table(DMO_owned, file_id )): add_to_owned( dmo_id,
file_id) elif (dmo_id = contained_in_table(DMO_sold, file_id )):
popup_query_to_user("The contents of the object in file",
file_name, has already been sold\n Will remove file.\n", If this is
in error, please contact re-digi.com") remove_file(file_id) else:
add_to_files_scanned(file_scanned, file_id)
[0127] Actions in Response to a File Deletion Notification
[0128] In one embodiment, the response to a file deletion, does not
depend on the number of copies of a DMO; the record of the deleted
file associated with a DMO is removed and the count is decreased.
When the count goes to 0, however, the DMO record remains in the
table. If a DMO is owned it should continue to be tracked since it
can be created again. For example, the file could have been deleted
in order to save storage space. It could still be sold in the
future. If the DMO was sold, then this deletion is just the right
action to be taken. If the file was neither bought nor sold, it is
not part of those that are tracked. A methodology for carrying out
these steps is illustrated, by way of non-limiting example, in the
code that follows,
TABLE-US-00003 def on_file_deletion(file_id): (file_name,
file_meta_data) = file_id if (dmo_id = contained_in_table(
DMO_owned , file_id )): removed_from_owned( dmo_id, file_id) elif
(dmo_id = contained_in_table( DMO_sold , file_id )):
decrease_file_count(dmo_id)
[0129] Actions in Response to a File Modification Notification
[0130] In one embodiment, a file that is modified can be treated as
a deletion followed by a creation. There are optimizations but they
make the code harder to understand and maintain. It is assumed that
once a file has been modified, it is still possible to recreate the
old, non-modified file. Actually, all that is needed is the
fingerprints of the original file. This is already in the tables. A
methodology for carrying out these steps is illustrated, by way of
non-limiting example, in the code that follows,
TABLE-US-00004 def on_file_modification(file_id): old_file_id =
temp_create_file_from_backup(file_id) on_file_deletion(old_file_id)
on_file_creation(file_id) delete_file(old_file_id)
[0131] Actions Performed by the User Through the Management
System
[0132] Using an embodiment of the management system discussed in
more detail above, there are at least two things a user can do. He
or she can purchase a new digital music object. In this case, there
will be a download of the DMO just purchased. The user can create
many copies of the object. He or she can get rid of such an object,
either by selling it or by passing it on to someone else. In this
case, all copies of the object must be removed or delete. Actually,
it should be passed on (the bits passed) to the new copyright
owner.
[0133] When an object is purchased, a file is usually downloaded to
the computer or device. It is the job of the manager to verify both
the identify of the digital media object and ownership. The most
straightforward way is when the digital media object seller will
verify the transaction.
[0134] Before a DMO is sold, it must be checked for validity. It
must be in the owned table. Then it all depends on the object type
and its protection, drm, etc. A methodology for carrying out these
steps is illustrated, by way of non-limiting example, in the code
that follows,
TABLE-US-00005 # assume dmo_id is an entry owned. # account is id
of user (from whence it was bought) def confirm_ownership(dmo_id):
for file_id in file_list_in_owned(dmo_id): account =
get_account_field_from_bought(dmo_id) # find at least one file with
this dmo with valid ownership if (redigi_uid =
get_redigi_uid_from_file_id(file_id)): if
redigi_server_confirm_ownership( redigi_nid , account ); return
TRUE # remote server confirms ownership else: return FALSE # server
indicates different ownership elif known_standard_encrypted_file(
file_id ): key = get_key_field_from_bought(dmo_id) (header,body) =
decrypt_file( key, file_id ) if account in header: return TRUE #
header contains correct account id return FALSE # could not confirm
ownership
[0135] The confirm ownership routine is used when offering a DMO
for sale. A methodology for carrying out these steps is
illustrated, by way of non-limiting example, in the code that
follows,
TABLE-US-00006 # dmo_id is a record that contains most of the
fields in the fields in the # dmo_owned table entry def
on_purchase(dmo_id): add_to_owned( dmo_id , null ) add_to_bought(
dmo_id , null ) # assume this is called only once dmo_id is
confirmed # to be in owned table. def on_sell(dmo_id) if
confirm_ownership(dmo_id) == FALSE: return FALSE
add_to_sold(dmo_id) for file_id in file_list_in_owned(dmo_id):
remove_file(file_id) removed_from_owned( dmo_id, file_id) return
TRUE
[0136] Preventing or Discouraging Access to DMO that has been
Sold
[0137] In one embodiment using the detection scheme described
above, there are several actions that are taken to prevent or
discourage access or use by a user of a DMO that the user has sold.
For customers in good standing a warning message is flashed on the
screen and a notification message issued is enough of a
discouragement. The user may have simply not known that he or she
still had access to a DMO copy that he or she has sold. Repeated
access and playing of a song that the user has sold requires
stronger action on the part of the management system. Since the
identification might be in error, the file may be moved to a
special quarantine directory making access difficult. Upon further
infractions, the user is prevented from any further offers for sale
of DMO's. An even further discouragement is possible by freezing
the user's account.
[0138] Initialization
[0139] In some embodiments, the initialization phase goes through
all the files owned by the user and classifies their content and
places these results in a set of tables. For example, this is
similar in function to virus detection software. It first does a
full scan of all the files. Later, it is only concerned with new
and modified files.
[0140] In one exemplary embodiment, when a new file system or file
volume is attached to the computer, the initialization routine
scans though all the files on it. Thus, the initialization phase
may be invoked many times (as devices attach and reattach).
[0141] Exactly which DMO's found in files are classified as "owned"
is a policy decision. A liberal policy is to assume every DMO was
legally acquired. A highly restrictive policy assumes that only
DMO's with DRM that restrict playing to this device are legally
owned and all others are not and may not be resold.
[0142] A methodology for carrying out these steps is illustrated,
by way of non-limiting example, in the code that follows,
TABLE-US-00007 # This examines a file def scan_file(file_id):
(file_name, file_meta_data) = file_id if is_redigi_file(file_name):
dmo_id = extract_dmo_id(file_name) add_to_owned( dmo_id, file_id ,
`redigi` ) elif is_ordinary_media_file(file_name, media_type):
header_info = extract_header(file_name) dmo_id =
looup_object_from_header_info( header_info) add_to_owned( dmo_id,
file_id, `ordinary` ) elif guess_media_type( file_name ) ==
media_type: dmo_it = guess_dmo_id( file_name) add_to_owned( dmo_id,
file_id, `guessed` ) else: add_to_ignored( file_id) add_to_scanned(
file_id)
[0143] The Server Side
[0144] The management system software communicates with the server
software. A web browser can also be used to communicate and
interact with the server software.
[0145] The server controls and maintains a set of databases that
are used to support various functions such as: user accounts, DMO
maintenance, deep verification, bookkeeping of credits and
financials, uploading and downloading of DMOs, and matching offers
to sell with requests to buy particular DMOs.
[0146] Maintaining user accounts is required for the system to work
but the particulars, such as account creation, verification, login,
session-ids, cookies, etc., are well known. What is relevant to one
embodiment is the additional information kept with the account,
outlined below, in a way of a non-limiting example.
TABLE-US-00008 Field Description Preferences The length of time a
DMO that has been offered for sale will remain for sale or an offer
to buy will remain in place. When the purchase of a DMO succeeds,
the DMO can be automatically downloaded to one or more of the
user's private computer or devices. Box Size, The box is a
collection of the DMO's owned by the Box capacity, account and
currently residing on the server dedicated Box location to the
exclusive use by this account. There is a capacity both in the
number of DMO's and in their total size. DMO identities This field
is used to detect fraud. DMO's purchased used on-line often have an
identify, email, username, or some other customer identification
stored in the meta-data. A user who has an excessive number of such
identifies is a warning signal of potentially trying to sell DMO's
that he or she does not own. Similarly identities that are also
found in other user accounts raise similar warnings. IP addresses
of Each machine with a working cop of the management machines with
system software can download a copy of a purchased management DMO.
Consequently, the server limits the number of system machines on
which the management system software software installed. Also
monitored is the number of times the management software is
installed and uninstalled. Number of An infraction is a violation
of the legal use of the system, Infractions such as non-deletion of
DMO's offered for sale, multiple attempts to offer non-verifiable
DMO's for sale, or exceeding the limits of identities or machines
as recorded in the above two fields.
[0147] The BOX
[0148] In one embodiment, DMO's can be uploaded to or downloaded
from the server. A table containing pointers to the DMO's is
referred to as a box. Each DMO is owned by used one user and at any
time, there is only one box that points to a DMO. There are several
operations that can be performed on a box, including those in the
following list:
TABLE-US-00009 statusOfBox( ) This returns the objects, their type,
size, and status - for sale, recently purchased, exclusive copy
(e.g. there are no known copies on any of the user's devices or
machines). putFileIntoBox The management system software uses this
interface (file, nickname) to upload a copy of a DMO to the server.
getFileFromBox The management system software uses this interface
(nickname) to download a copy of a DMO. The server then records the
fact that this DMO is no longer exclusive on the server. This is
also used when a DMO is purchased from another user.
insertFileIntoBox This is part of the process of transferring
ownership (nickname) from one user to another. In one atomic
transaction, a pointer to an instance of a DMO is deleted from one
box and inserted into another box. deleteFileFromBox This is part
of the process of transferring ownership (nickname) from one user
to another. It can also be invoked from the management system
software.
[0149] DMO Verification
[0150] In one embodiment, verification of a DMO offered for sale is
necessary in order to ensure that the meta-data that identifies the
contents of the DMO is correct. There are two aspects to the
verification process. One is to verify that the DMO was purchased
by the user. The second is that the digital object is what it
claims to be. For example, a devious user may try to sell a song
that appears to be the Beatles' song "Yesterday" but when played,
the music is an advertisement for some product.
[0151] In one embodiment, verification of ownership is based on a
set of criteria and characteristics of the DMO, each of which
either increases or decrease the level of confidence in ownership.
Some, but not all characteristics are:
TABLE-US-00010 User Many sites store one or more versions that
identify the identification user account that did an on-line
purchase of the DMO. If this user identification matches those of
other DMO's owned by this user, then increase confidence of
ownership. If the user identification is similar to the user
account name on this seller, then also increase confidence. For
example, if the user name for an iTunes purchased song matches the
user name of the reseller's account name for this service, give
extra bonus in confidence. Exclusive There are no other users in
the system that have ever use of had a DMO with this user
identification. identification. No obvious Many programs allow one
to edit the metadata of a DMO signs of Some of these programs add
fields to the metadata that metadata state the program used to edit
the metadata. editing Valid Many online DMO retailers insert
special hidden fields to proprietary show that they sold the file.
Examining a large number of fields inserted DMO's can be used to
identify their special hidden by the fields. distributor
[0152] Upon transfer of ownership of used DMO's that are sold
through the service are first stripped of all identifying marks and
fields in the metadata. The new owner will not be able to tell who
was the previous owner. Then, identifying marks of the new owner is
inserted into the DMO metadata. Finally, special watermarks
identifying this transaction and this service provider are inserted
into the DMO itself. For example, in the case of a digital song, a
digital watermark is inserted by modifying the music in an
inconspicuous manner.
[0153] A DMO that was purchased as a used DMO through this service
will thus contain a recognizable watermark, perhaps acoustic in the
case of songs and movies or graphical in the case of e-books or
pictures. Any DMO containing such watermarks can be easily verified
as to the true owner of the DMO making verification of such DMOs
very easy and straightforward.
[0154] The second type of verification, that of ensuring the
metadata correctly identifies the content of the DMO, can be
accomplished, in one embodiment, by the use of a master fingerprint
table. Each instance of a DMO contains a copy of the same contents
as the master copy. For example, the music of any instance of the
same digital song should sound the same. We assume that different
encodings of the same DMO contents sound, look, or render in a
similar way. A fingerprint of the content is stored on the server.
Every work offered for sale is verified as follows. A fingerprint
of the content is generated. This fingerprint is compared to the
fingerprint on file in the server of the work that corresponds to
the work's identification as specified in the metadata. For
example, if the metadata of a song claims it is the Beatles' song
"Yesterday" then a acoustic fingerprint is generated of the music
in the DMO. This fingerprint is compared to the fingerprint that
was generated from a known valid DMO of the same song. The
fingerprint need not match exactly, but should be close enough.
Note that this task is significantly simpler than the task of
identifying a DMO without knowing what it is. For example there are
many services that can identify a song from just a few seconds of
its playing. That requires comparing the fingerprint of a few
seconds of music with an entire collection of millions of songs.
There are many ways to generate fingerprints. A common approach is
to apply a Fourier Transform to the signal mapping it from the time
domain to the frequency domain. Characteristics of the resulting
frequencies, such as max, min, average values, signal entropy can
be used along with other more typical music features such as
timbre, The verification task using fingerprints is much easier
than identification since it need only ensure that the fingerprint
match the fingerprint of what the DMO claims to be.
[0155] The Matching
[0156] In some embodiments, the matching between DMO's offers for
sale and request for purchase consists of the following actions
making by the servers and making use of its internal tables. A DMO
can be offered for sale before, during, or after there is a
corresponding request for purchase. Consider each case separately.
Before delving into the details, it is necessary to describe how a
DMO can be identified.
[0157] In the case of digital songs, each song requires a unique
representation. A song is often identified by a quadruple of Title,
Artist, Album, and Year released. Unfortunately, not all songs fit
this identification model. Some songs are released as singles and
are not associated with an album. Some songs may have multiple
release dates. Yet other songs may have slightly different ways of
writing the title, depending on the language of the consumer, e.g.
A French as well as an English title, or a title that is
transliterated using a different alphabet. In addition, classical
music may be specified by both the orchestra and the conductor.
[0158] In some embodiments, a standard database is used that
provides a unique number or identifier for each unique musical
composition. The database can be searched using a partial
specification of the object and can also assign the same identifier
to the same musical composition even when there are multiple
titles, release dates, etc. Given a DMO, the metadata must specify
these fields in sufficient detail to uniquely identify the object.
These fields are used as search terms for the database. Any DMO
offered for sale, will first have these fields extracted from the
metadata, a search performed on the database, and its unique
identifier then used as an internal DMO identifier.
[0159] When a DMO is offered for sale before there is a request for
a purchase, the server updates the available inventory for this
particular object based on its identifier as described above.
[0160] A buyer will specify some or all of the search terms. This
produces a list of identifiers that match the search terms. For
each of these identifiers, a list is presented to a potential buyer
with a notation of which objects have non-zero inventory. When the
potential purchaser indicates a willingness to buy the used DMO,
the inventory is searched and an atom database transaction will
exchange coupons, credits, cash, as well as exchanging
ownership.
[0161] There may be items on the list that have no inventory but
that a user wishes to purchase. This is a case of a buy request
occurring before an offer to sell has been made. The inventory
table entry for this object indicates this fact. As soon as there
is an offer to sell this object, the server checks the inventory
and will see the request to buy. A match occurs and an atomic
database transaction will exchange coupons, credits, cash, as well
as exchanging ownership.
[0162] The third possibility is that there are no requests to buy
nor offers to sell for a particular object but at roughly the same
time, a request and an offer are made by two different users. A
naive implementation could result in a situation in which the offer
to sell fails to see that there is a request to buy and the request
to buy fails to see the offer to sell and both get placed in a wait
queue and no match occurring until some future request or offer is
occurs. Note that the buyer has already seen an empty inventory and
so is expecting to wait for an offer to sell. So, whenever a
request to buy is placed in the wait queue, a timer is set so that
the request to buy will check the sell queue again in the near
future. This ensures that a match will always occur no matter what
the timing.
[0163] Gifting
[0164] In one embodiment, an exchange of ownership and
corresponding monetary instruments can take place between three
users, when there the transaction supports gifting. The match
process described above involves a database atomic transaction that
atomically performs several database updates. The pointer to the
DMO is switched from one user's box to another user's box. The
price of the DMO is subtracted from one user's account and added
partially to another user's account and the remaining to the media
store's account. To support the ability to gift a DMO, the atomic
database transaction involve the database accounts of three user's
in a manner that will be evident to those skilled in the art in
view of the teachings hereof.
[0165] Increasing the Chance of Matching
[0166] In some embodiments, provisions are made to give a seller a
better chance to have his or her DMO's bought. One way is to help
the seller to offer the DMO's in the right time. There are three
subsystems.
[0167] One subsystem uploads DMO's to the box, purges them from the
private computer, and then offers them for sale. This process can
be under direct control of the seller. But if the seller wishes to
offer many DMO's for sale and there is insufficient room in the box
for all of them, some of this process can be automated.
[0168] The user specifies all the DMO's that are offered for sale
using a second subsystem. This subsystem sends the list to the
server. Any DMO's for which there are buyers waiting, are
automatically uploaded to the box, purged, offered for sale by
making use of subsystem one, however under the control of subsystem
two. If there is still room in the box, DMO's that have been
recently been involved in transactions and then offered for sale,
again sing subsystem one. The server knows current and past demand
and can accurately priority order the DMO's so that the most likely
ones to be bought are the first to be offered for sale.
[0169] Based on the set of DMO's offered for sale (accumulated via
subsystems one and/or two), it is possible to infer what other
DMO's a user may have on his or her private computer. Correlating
these with known demand of requests to buy, a third subsystem can
send a list of DMO's to the management system software on the
personal computer to see if there are any DMO's there. If so, the
user is asked if he or she would like to offer them for sale. This
works in much the same way as a recommendation system, however, it
is based on what a user wishes to sell rather what the user wishes
to buy.
[0170] Optimizations
[0171] Optimizations of the foregoing are discussed below. These
may be employed individually and/or in combination with one or more
of the teachings above.
[0172] The file size can be an easy filter to quickly eliminate
files from consideration. Movies are at least dozens of megabytes
in size. Songs are smaller. E-books are not dozens of kilobytes in
size. Pictures usually larger.
[0173] The file extensions can be an excellent first level
indicator but should never be trusted. It identifies the first
thing to try.
[0174] The tables are best organized as hash tables to quickly find
records. When more than half the entries are occupied, the table
size can be doubled and the entries re-mapped.
[0175] Rather than uploading a DMO that is sold, in some
situations, it may be sufficient to simply notify the remote server
by sending the ID of the object. This can be considered a highly
compressed version of sending the whole object.
[0176] When several users upload the same DMO to the server, it may
be possible for the server to store only a single copy of the DMO
and have each user's box point to this single copy. It is a legal
decision whether or not the server must maintain distinct instances
of each DMO.
[0177] To identify the DMO contained in a file, there are three
cases to consider: The file is encrypted in its original form. The
file is unencrypted and unmodified. The file is unrecognized and
requires more elaborate fingerprinting.
[0178] The match is much easier since the database size is smaller
than the usual complete contents. The match is against only those
DMO's that have been sold. Two steps: when sold and when any file
is created for first seen, e.g. device is connected.
[0179] When scanning all files. For each file, do deep search
(fingerprint) to have table of owned objects and the files in which
they reside. (can do this lazily) Whenever a new drive or device is
connected, do a deep scan
[0180] Maintain fingerprint (features) in the owner table (or even
unclassified table). When an object is offered for sale, we
download the features and match it against all the objects in the
table. It is easier to match a particular song rather than to
identify the song.
[0181] Described above are systems and methods meeting the objects
set forth herein. It will be appreciated that the embodiments
illustrated and described herein are merely examples of the
invention and that other embodiments incorporating changes thereto
fall within the scope of the invention.
[0182] In view of the foregoing, what we claim is set forth
beginning on the pages entitled "Claims," following Appendix A.
APPENDIX A
Executive Summary
ReDigi.TM.--The Worlds First Recycled Digital Media Store.TM.
[0183] ReDigi.TM. users access the world's only catalogue of
re-cycled, licensed, digital media. Music, movie, book and game
fans will enjoy their favorite artists, actors and authors
showcased in a high-quality application that is easy and fun to
use. The net result is a low cost unparalleled user experience and
a compelling legal alternative to piracy. Members can transfer no
longer used digital media to the ReDigi.TM. store in exchange for
purchase credit. ReDigi.TM. members can earn ReDigiBucks.TM. by
inventorying their unused music on ReDigi.TM., by searching from
ReDigi.TM., by Shopping on ReDigi.TM.--then buy any media listed on
ReDigi.TM. with credit from their ReDigi.TM. Bank account--all very
cool, get music, books, movies, games with no cash out of pocket,
or if the ReDigi.TM. account is a little low, its ok to purchase
the traditional way. Promoting media on ReDigi.TM. is free,
individual artist, author and producer areas allow members to build
a direct relationship with fans, old and new, across the world.
ReDigi.TM. facilitates the development of revenue streams through
the sale of downloads, merchandising, concert tickets and more, as
well as, earning a share of revenues ReDigi.TM. creates through our
advertising and premium businesses. Powerful, real-time, in-depth
reporting is standard to participating labels and artists, authors,
etc.
What is ReDigi.TM.
[0184] ReDigi.TM. is short for Recycled Digital Media. [0185] The
Market for Digital Media has grown rapidly in the digital music
space and is growing even faster with the introduction of digital
movie downloads and digital books. Historically, all forms of media
have moved to the "used" or "re-sale" marketplace. This is the
primary market which ReDigi.TM. has targeted. [0186] Why re-sale?
Typically the markets for resale are driven by VALUE, those
purchasing in that category are most often driven by the ability to
save money while getting the exact product they want, not an
imitation, rendition or low quality copy. [0187] ReDigi.TM. uses
proprietary digital fingerprinting technology (ReDigiPrint.TM.) to
identify and tag uploaded media, thereby securely removing all
synced copies of the same ReDigiPrinted.TM. file(s). [0188]
ReDigi.TM. uses a proprietary ReDigiPrint.TM., DPP, tag that allows
legal transfer and sharing of media files.
Cool ReDigi.TM. Features
Accessibility & Purchasing Options:
Mobile Access
Online Access
Recycled
New
Cool User Features
[0189] Great credit for used digital media Save money on digital
media purchases (Discounted New/Used Prices) Fun and easy to use
Integration with FanAction.TM. Tickets, find events that match
ReDigi.TM. music purchases in the users area and provides easy
digital ticket purchase.
ReDigi.TM. Benefits
[0190] Significant Increased Income per unit sold--New &
Recycled media Purchase Brand Leader in the "used/recycled"
marketplace Increased user marketing data/opportunities Added
Features not seen with ANY other digital media site Reduces illegal
media downloading Partnership provides total scalability instantly
Latest generation database technology
ReDigi.TM. Solution
Dynamic Digital Rights Tracking (DDRT) Technology
Dynamic Inventory Management (DIM)
[0191] Supplemental Profit Allocation--and instant view back office
Total Media life cycle control and information tracking [0192]
Typical length of ownership, genre, quantity, etc. [0193] Automated
Music preferences algorithm provides suggested items to member
ReDigi.TM. Features:
[0193] [0194] Trade-in, Earn & Purchase Digital Media [0195]
Swap-Me.TM. Trade-in media that has been legally
purchased/downloaded with an attached DRM or L Code [0196]
Algorithm provides instant credit allocation to member based on
Billboard top 100, Amazon top 50 Video Games, NY times bestsellers.
[0197] Identifier scans all Swap-Me.TM. files for ReDigi.TM. tags,
(Media previously purchased new from ReDigi.TM. gets additional
Swap-Me.TM. credit). [0198] Digi Bucks.TM. Home Page Designed with
Digi Bucks Search Bar--SEARCH to earn credits toward purchases.
[0199] ReDigi.TM. refer friends and when they sign up and make
first purchase, win credits. [0200] Its-Hot see what your
ReDigi.TM. friends are buying when looking for media, purchase
(preferences allow member to block friends view). [0201]
Gotta-Have-It.TM. tag(s) recycled media that you want but currently
not in inventory, member is notified via email/Text as soon as
ReDigi.TM. has inventory. [0202] If member connects to the link and
inventory has been sold a Gotta Have It.TM. discount is provided on
a new copy, as long as, member purchases within 20 minutes of
logging in. Available for 2 hours after text/email delivery. [0203]
Turn-Me-On.TM. sends your friends a quick clip of media you love,
(includes an easy purchase link) [0204] Guess-What-I-Got.TM. Single
touch notifier tells "friends" what you just purchased and provides
an instant purchase link.
Additional Cool Features
[0205] Gift Media.TM. Allows members to select from listed
charities and donate all or a portion of their proceeds to charity
MediaAllocator.TM. automatically allocates all sales to the
appropriate parties including ReDigi.TM., Label, Artist, etc.
(provides real time back office view) ReDigi Bot.TM.--cleans all
donated digital media files using ReDigiPrint.TM. technology from
all of the members synced and or connected devices, stringent
privacy agreement.
Automated Owner Authenticity.
[0206] Media Direct.TM. provides Instant Links with major social
network sites including Myspace, FaceBook, Twitter, Artist etc. for
ease of purchasing awareness.
Data Collection/Marketing
[0207] Members
* * * * *