Retail point of sale (RPOS) digital rights convergence

Retail point of sale (RPOS) digital rights convergence
US00843 8111B2
(12) United States Patent
(10) Patent No.:
(45) Date of Patent:
May 7, 2013
5,592,511 A
1/1997 Schoen
5,710,886 A
5,864,604 A
1/1998 Christensen
1/1999 Moen
US 8,438,111 B2
5,918,909 A
James Leonard Drlessen, Llndon, UT
5,930,215 A *
7/1999 Fite et a1‘ “““““““““ “ 369/5322
5,953,415 A *
5,995,105 A
( * ) Notice:
9/1999 Nielsen ......................... .. 705/58
11/1999 Reber
Subject‘ to any disclaimer, the term of this
patent 1s extended or adjusted under 35
USC 154(1)) by 439 days_
Appl. NO.Z 12/772,919
(22) Filed?
411066152 A
WO-9819260 Al
May 3, 2010
Prior Publication Data
Goldstein,A., “Computer City Opens Prototype, in Mesquite Texas,”
Dallas Morning News, Nov. 22, 1997.* Microsoft Press Computer
Us 2011/0112917 A1
May 12’ 2011
Related US. Application Data
Continuation of application No. 11/329,526, ?led on
Jan. 11, 2006, noW Pat. No. 7,742,993, Which is a
Dictionary, third edition, Microsoft, 1997, p. 82.
_ h 1
continuation-in-part of application No. 09/630,272,
?led on Aug. 1, 2000, noW Pat. No. 7,003,500.
Prlmary Exammer *Nlc O as D Rosen
Provisional application No. 60/215,673, ?led on Jun.
30, 2000, provisional application No. 61/175,108,
?led on May 4, 2009, provisional application NO_
61/ 187,686, ?led on Jun 17, 2009, provisional
application No, 61/241,477, ?led on Sep_ 117 2009,
The present invention is an apparatus and method for the
money transactions required in the selling of merchandise or
media content on the Internet or other public or private net
Work. It can then track and maintain digital rights to merchan
IIlt- ClG06F 21/24
dise or media. Methods of access to digitally protected con
tent are disclosed. License metadata and credentials from
(52) US. Cl.
multiple types of digital rights management systems may be
USPC ............................................. .. 705/58; 705/ 57
used to grant access through a home based or other end-user
Field of Classi?cation Search .................. .. 705/58,
Custodial digital rights “p1aCe-Chaser”t0 Content protected by
different types of serial copy management systems. Content
security using a non-audible or invisible code signal sequen
ce(s) can provide traceability as Well as absolute anonymity
for the purchaser. This apparatus can be used to conduct
See application ?le for Complete Search history
References Cited
transactions off the Web so that business can be done on the
5,103,392 A
5,530,751 A *
5,570,339 A *
4/1992 Mori
Morris ........................ .. 380/202
Nagano .................... .. 369/2753
18 Claims, 12 Drawing Sheets
Home Box
US 8,438,111 B2
Page 2
6,175,823 B1
6,278,980 B1
1/2001 Van Dusen
8/2001 Wendkos
6,405,175 B1
6,434,535 B1
6/2002 Ng
8/2002 Kupka
6,467,684 B2
10/2002 Fite
6,487,663 B1 *
9/2003 Murphy
6,708,157 B2
3/2004 Ste?k
6,952,685 B1*
7,028,011 B1*
7,065,506 B1 *
7,209,889 B1
7,308,430 B2 *
8,190,709 B2 *
Engineering, Strategic Content Management Newsletter, Jul. 26,
2005 USA.
Jaisimha et al. ............ .. 713/193
6,615,247 B1
Unknown, Coming soon: Download-to-own ?lms, CNN, Technol
ogy Section, Mar. 24, 2006, USA.
Unknown, Schedule of Minimums, Writers Guild ofAmerica, 2008,
Theatrical and Television Basic Agreement, Feb. 13, 2008, USA.
Netpack, Inc., Press Release, New Internet Packaging System,
Allows Consumers . . . , Lexis-Nexis, Financial Times Information,
Hunter et al. ................. .. 705/58
Ha et a1. .... ..
Phillipo et al. ................ .. 705/58
4/2007 Whit?eld
12/2007 Odgers et al. ................. .. 705/57
5/2012 Kanada et al. .............. .. 709/219
5/2001 Resnick
5/2001 Schena
10/2001 Tsiounis
11/2001 Shiloh
3/ 2002 Yokono
6/ 2002 Beach
5/ 2003 Silverbrook
7/ 2003 Goldstein
8/ 2003 Kargman
10/2003 Kwan
A1* 1/2004 Kanada et al.
1/2004 McCarthy
9/ 2005 Hutchison
2/2008 J akubaitis
Unknown, Electronic sell-through is the future ofVOD, Broadcast
Feb. 21, 2001.
Levi Shapiro, Hollywood goes EST, Entrepreneur Connect, Entre
preneur Media, Inc., Apr. 2008 issue.
Stephanie Olsen, CinemaNow debuts Download-to-own movies,
CNET News, Jan. 4, 2004.
Jakubaitis, U.S. Appl. No. 60/140,929.
Superdistribution, In Wikipedia, The Free Encyclopedia. Retreived
10:45, May 29, 2009, from
Tower Records Promotion, Case 2:09-cv-00140-DAK, Document
15-2,15-3 (Jun. 24, 2009). Administrative Of?ce ofthe US. Courts,
PACER CM/ECF, retreived Jul. 23, 2009.
Pete Cashmore, Big Brother, Amazon Remotely Deletes 1984 From
Kindles, retreived Jul. 23, 2009 from
17/ amaZon-kindle- 1 984/ .
.............. .. 709/219
Mambo, Masahiro, editor, “Information Security,” Second Interna
tional Workshop, ISW ’99, Kuala Lumpur, Malaysia, Nov. 1999
Buelva, A.J., “Philippines: Union Bank Launches, ‘Net Banking
Initiative’”, Computer World (Philippines), Dec. 15, 1999.
Driessen v. Sony et (1].; Def. Sony, Best Buy, Target answer and
counter claim, Case 2:09-cv-00140-DAK Doc. 15, 15-1, 15-2 Filed
Jun. 24, 2009.
Driessen v. Sony et (1].; Def. FYE answer and counterclaim, Case
2:09-cv-00140-DAK Document 14 Filed Jun. 23, 2009.
Remus, P.C. et. ai, “Digital Signatures: THe Nest Step in Electronic
Commerce,”New Hampshire Business Review, vol. 19, No. 10,p. 15,
May 1997.
Gentry, C.R., “Chain Cultivates Farming Niche,” Chain Store Age,
vol. 76, No. 3, pp. 67-77, Mar. 2000.
Anon., “Appearing Soon at a Store Near You: An ATM for the ears,”
NewYork Times, vol. CXLIX, No. 51,364, P.D7, Apr. 2, 2000.
Anon., “Mala Powers: Hollywood Star Still Shines on Walk of
Fame,” Business Wire, Sep. 27, 1994.
Dyson, P., “Millicent: Digital Equipment’s Scrip for Selling Content
by the slice,” Sybold Report on Internet Publishing, vol. 2, No. 3, p.
37, Nov. 1997.
Oser, K., “Wells Fargo Launches ATM Advertising,” Direct, vol. 11,
No. 5, p. 22, Apr. 1999.
2:09-cv-00 140-DAKDriessen v. SonyBMGMusic Entertainment et
* cited by examiner
US. Patent
May 7, 2013
Sheet 1 0112
US 8,438,111 B2
FIG. 1
US. Patent
May 7, 2013
Sheet 2 or 12
FIG. 2
US 8,438,111 B2
US. Patent
May 7, 2013
Sheet 3 or 12
US 8,438,111 B2
Fifi. 5
US. Patent
May 7, 2013
Sheet 4 or 12
US 8,438,111 B2
1 311E051:
US. Patent
May 7, 2013
Sheet 5 or 12
2, QiREC? YGUR mmwsm it)
3; C1105: m Cache Bcc'ki?lookie Me if desired
d. sicmtch a?!
Emu W PIN access Code
fa Worm ywr media
US 8,438,111 B2
US. Patent
May 7, 2013
Sheet 6 or 12
US 8,438,111 B2
US. Patent
May 7, 2013
Sheet 7 or 12
US 8,438,111 B2
FIG, '7
.Zuem ef'?ei?cted
Nbrxm! W362i.
P3363 Salem
H 1
US. Patent
May 7, 2013
Sheet 8 or 12
F165. 8'
{2011;213:2113 3T 7
Courier 8811»
US 8,438,111 B2
US. Patent
May 7, 2013
Sheet 9 or 12
US 8,438,111 B2
US. Patent
May 7, 2013
Sheet 10 or 12
US 8,438,111 B2
US. Patent
May 7, 2013
Sheet 12 01 12
@x8o0m5 mmuq
US 8,438,111 B2
US 8,438,111 B2
sales receipt. Other times it can be a ticket such as for attend
ing a theater or other engagement. The voucher in this case
does not represent an account or value of money. The voucher
merely represents that the transaction has been completed and
the merchandise, Whether physical merchandise or simply
entertainment, has been authorized.
Priority is claimed in this application to the Utility patent
application (Child application) Ser. No. 1 1/329,526, Which is
Retail points of sale transactions involve at least one in
a Continuation in Part Application, titled “SCART-CARD
ING)” ?led on Jan. 11,2006 now US. Pat. No. 7,742,993; in
person contact With the buyer. On the Internet, it has alWays
turn claiming priority to the Utility patent application (Parent
With the huge rise in popularity of the Internet, there are
rising concerns from the public about Who should and Who
been assumed that this transaction must be conducted virtu
ally on the Internet; after all, the Internet is a virtual realm.
application) Ser. No. 09/630,272, ?ledAug. 1, 2000 now US.
Pat. No. 7,003,500; then claiming priority through Provi
should not be able to access certain Internet content such as
sional Patent Application No. 60/215,673 ?led on Jun. 30,
2000. This Application also claims priority to Provisional
but not limited to: materials With copyrights such as music,
Patent Application No. 61/175,108, ?led May 4, 2009; Pro
visional Patent Application No. 61/ 187,686, ?led Jun. 17,
2009; and Provisional Patent Application No. 61/241,477,
?led Sep. 11, 2009.
Regulatory authorities and Web masters have made
attempts to control access through the selling of access rights
content that is adult in nature, or other restricted access mate
delivered to consumers after they entered credit card infor
mation. This has become an accepted means of control, par
Each of the above stated priority documents, Ser. Nos.
11/329,526, 09/630,272, 60/215,673, 61/175,108, 61/187,
686, and 61/241,477, are herein incorporated by reference
into this application in their entirety.
ticularly With Adult Veri?cation systems.
transactions through the uses of encryption, trusted vendors,
and trusted banking institutions. PKI methods of Web trans
actions may involve digital signature and money transactions
This invention relates generally to purchasing systems via
a public computer network system (Internet or World-Wide
Web). While the products sold on the Internet are often real
and tangible, the market place exists in a virtual realm. To
conduct the business of selling in the virtual realm of the
Internet, a virtual transaction had to take place; or so it has
been thought. This Invention facilitates non-virtual transac
tions that take place at a retail point of sale for a means of
of the data.
Most secure Web transactions require cookies and Web
delivered applets (such as JAVA). A cookie is information that
a Web site puts on an end-users hard disk so that it can use the
information at a later time.
Using the Web’s Hypertext Transfer Protocol (HTTP),
each request for a Web page is often independent of all other
requests. For this reason, the Web page servers typically have
no memory of What pages it has sent to a user previously or
anything about previous visits. A cookie is a mechanism that
lished a store Where customers could visit, look at merchan
dise and make purchases. The customer had to visit the store
in order to purchase the products. Other forms of retailing
have existed like local street vendors, door-to-door salesmen,
over the Internet. They typically require a customer, a bank, a
merchant, a public archive such as an Internet Web site, Cer
ti?cate Authorization servers, and encryption and decryption
virtual merchandising.
2. Related Prior Art
Retail industries can exist anyWhere. The historical version
of retail Was the actual retail point of sale. A retailer estab
Public Key infrastructure (PKI) is one method that has
evolved into a secure and anonymous means of handling Web
1. Field of the Invention
over the Internet itself. These services are often called sub
scription based ID. or age veri?cation services. User names
and passWords or other means of secure access have been
alloWs the server to store its oWn information about a user on
the user’s oWn computer. For example, the Internet Explorer
broWser stores cookies in a WindoWs subdirectory. Netscape
shop-by-telephone, mail order catalogs, infomercial shop-by
stores cookies as a single text ?le.
As more and more people in World populations use com
telephone, and most recently, the Internet.
One of the differences betWeen retail point of sale and other
puters, there becomes an increased need for security to con
trol What data can be accessed, Where and When people can
methods of sale is the time variable involved With merchan
dising transactions. One should not make the mistake of
data. Copyrighted materials are of a particular area of interest
as the media material objects such as records, tapes, and disks
are noW being replaced by digital media content. There have
been numerous attempts at Ways to prevent illegal copies.
assuming that time is the essential element that distinguishes
betWeen direct purchases and those on account. The basic
formula for establishing a credit account is Where the pur
chase price (P) of a product can be paid at a later time (T), an
interest rate (R) can be assessed, and the amount paid:
access it, and Which people are alloWed any access to secure
There have been primarily tWo different categories in Which
these content protection systems fall: 1) ?le server protection
that alloWs authorized access While at the same time protect
ing illegal access by hackers attempting to steal the copy
A person may gain extra time to pay for a purchase by using
credit, but it is the agreement betWeen parties that one Will
Both of these types of systems have focused primarily on
extend credit to the other that creates a credit account. Time
has no meaning in the direct purchase formula (A):P. For that
matter, there is alWays some lag betWeen the time payment is
tendered and possession takes place even if for just split
seconds. Sometimes a lag betWeen payment and possession
righted materials Without paying for them; and 2) preventing
end-users from illegally sharing unauthorized copies With
the ?le server side in controlling Who, When, Where, and What
can doWnload the media. More recent efforts have looked into
using multiple Digital Rights Management “DRM” systems
requires a voucher so that the purchaser has some proof that
through a “Keychest” or “Digital Entertainment Content Eco
payment has been made. The voucher is usually just a simple
system” Which does not focus on the one ?le server, but
US 8,438,111 B2
considers a digital rights storage locker solution as a third
This invention is not a mobile Internet media content deliv
party digital rights clearing house. Yet, third party digital
ery device in Which the device itself carries the content. See
US. Pat. No. 6,018,720.
rights storage locker systems have also remained true to the
above typology, delivering multiple instance or types of secu
rity from multiple ?le servers through one centralized secu
This invention is not a means to previeW merchandise and
set up an account to purchaseias in US. Pat. No. 5,918,213,
Where the merchandise merely previeWed at the point of sale,
rity service.
but then the transaction is conducted as an off the shelf pur
chase, through typical Internet methods, or phone-in-sale
Rights Convergence is a return to the simplistic approach of
pre-Intemet Ways of doing business, but it is not an obvious
approach. As malicious attackers of Internet communications
net Merchandising is a neW means for conducting the actual
transaction that could be added to such a system.
This invention is not a device for delivering media content
automated means. The retail point of sale apparatus for Inter
through on-line programmable smart card authorization such
become increasingly sophisticated. The RPOS takes aWay
as used in satellite television programming, or Web TV
devices, Where a home user of the system can call in on the
some of the sophistication and uses much simpler yet effec
telephone to order Pay-per-vieW programming. In these sys
tive technology in its place. The prede?ned transaction autho
tems the smart card both receives and supplies data to the
system over a private netWork. RPOS does not require pro
become more common, the Internet security measures
rizes access to Web content from a place off the Web, origi
nates at a real place of business, and is a concept that a trained
Internet professional may not be able to grasp immediately;
they have been conditioned toWards more complicated means
of accomplishing the tasks directly on the Internet.
A return to a retail establishment for conducting Web busi
ness may hold great promise for Internet security in the
future. A search of past practices and inventions reveals a
great deal of effort spent on avoiding over-the-counter trans
actions for Internet e-commerce rather than embracing it as
gramming after the initial over-the-counter transaction.
This invention is much like an event ticket to a movie
does the RPOS technology.
This invention is essentially retail point of sale for the
for payment that employs non-virtual (Retail point of sale) to
complete the transaction?
tion and distinguish it from prior art, several descriptive
to buy the speci?c online item?
The ?eld of Internet e-commerce has numerous existing
patents. A complete search for prior history Was not done
prior to this ?ling but a feW similar patents Were found
through a most basic search of the on-line USPTO patent
databases. They are reference beloW to help set the stage for
need not exist in all circumstances. RPOS can use a disk,
paper ticket, memory stick, or any other means of supplying
an access key and/or utility program.
Descriptive Names
differences betWeen RPOS and previous methods.
This invention is not a Prepaid Internet Access Card, such
1 . Internet Content Voucher Systemian end to end virtual
Service Providers (ISP) system, see US. Pat. Nos. 5,749,975;
5,987,612; 5,749,075, 5,987,430.
controlled distribution system
2. Cookie Free Cache Back System Card4can be used
With or Without broWser cookies or other broWser ?le
This invention is not merely a method for recording infor
mation on a card, computer disk, or other means of recording,
see example US. Pat. No. 6,076,733. The method ofrecord
names of the invention are listed beloW. This is not intended to
be an exhaustive list but merely illustrates some of the Ways
such an invention can be used. After this list, for the remainder
of this document, the Invention Will be referred to as the
RPOS. Although it involves a voucher system, the voucher
one skilled in the art of Internet commerce to understand the
as used to supply the purchaser of minutes on an Internet
tion. While RPOS may facilitate some of the same types of
functions mentioned above, it uses a completely neW method.
Internet. In order to best set the stage for a reader of this patent
application to best understand the background of this inven
Is there an establishment that acts on behalf of the customer
Does the customer have to physically go to the establishment
theater or music concert except that the RPOS is speci?cally
used for access (entrance) to Internet merchandising.
While RPOS can facilitate Secure Web Transactions, it is
not a method of the transaction, merely a method of divining
the existence of a predetermined Web transaction. It does not
require a trusted vendor, trusted bank, or buyer authentica
There are three questions that may be asked When attempt
ing to differentiate the technology:
Do they take cash?
Although the user of the RPOS may be knoWn, it can also
be used completely anonymously.
3. Prepaid Card for Internet Content Mediaiit is prepaid,
but need not be a stored value card.
ing and/or storage might be bar code, magnetic tape, smart
4. Web Content Ticketithe speci?c purchase may be
card, Written inscription, or any means of recording informa
tion. This invention is not used to locate a speci?c URL, but is
access rights to digital content
5. Over the counter Internet Saleithe purchase of netWork
used to divine the predetermined transaction that provided
merchandise can be made at retail over the counter.
access to a particular URL location.
This invention is not an organizational Internet access
7. Face to Face Veri?cation System for Divining of Antici
access to Web content of their oWn employees or to others on
a closed netWork or to generate personalized content pages
This invention is not an Internet cash token system used as
an anonymous means to get money to spend on the Internet.
Pat. No. 6,058,381.
pated Internet Transactionithe in-person transaction in
certain embodiments alloWs veri?cation of the purchase
and oWnership realization of the merchandise desired by
the customer
8. Non Virtual Point of Sale for the Intemet4employing
See US. Pat. Nos. 6,076,078; 6,072,870; 6,061,660; 6,042,
This invention is not electronic-voucher system, Which
places a third party URL as the guarantor of funds. See US.
in-person transaction can eliminate the need for submit
ting identifying information electronically.
security system Whereby business organizations control
for speci?c business purposes, see US. Pat. No. 6,076,166
6. Simple Anonymity for Internet Content Deliveryithe
real corporeal space Within cyber-space.
9. Retail Point of Sale Card for Internet Contentiselling
netWork content and merchandise through a retail point
of sale location.
US 8,438,111 B2
facilitate the RPOS processes, it is not required. While the
10. Internet Authentication CardiDigital certi?cate cre
dentialing through real space transactions.
CARD holds some intrinsic value it does not hold any dollar
amount information, account information, or other means of
1 1 . Internet Adult Veri?cation Cardiface to face age veri
payment; the transaction is completed in person at the check
12. Internet Allocation CardiAllocating customer oWn
FIG. 3 uses a How chart to illustrate an alternate use of the
ership to speci?c online assets.
RPOS. The process again begins With Web Content Dealers.
A Vending Machine Dealer purchases CARDs through nor
mal product distribution channels. Customer purchases the
CARD from the vending machine acquiring the ability to
The following draWings provide examples of different
applications and construct speci?cations for the RPOS tech
nology. They are not meant to be inclusive of all uses, they are
access the desired Web content. This type of system is not
capable of age veri?cation as With over the counter sales.
merely examples.
Again, the purpose of the CARD in this transaction is only to
ensure that the user is in possession of it. The actual transac
FIG. 1 uses a How chart to illustrate one embodiment of the
RPOS. The process begins With Web content dealers Who
have content posted to a public computer netWork (Internet)
tion takes place through a vending machine.
and have chosen to use RPOS for distribution. The Web con
tent dealers may manufacture the card themselves or use a
system (Adult Check). The process begins With dealers of
adult materials on the Internet. A retail establishment (such as
third party. The type of security system used for placing the
video rental store, convenience store, bookstore, adult mer
access key on the card is only important as to the particular
level of security that is desired. The Web content dealer then
FIG. 4 illustrates hoW CARD is used as an age veri?cation
chandiser, or other type of store) obtains CARDs through
typical distribution channels. Customers purchase the CARD
distributes the CARD, directly or through distribution chan
over the counter provided they can prove they are of legal age
nels, to a retail establishment. The retail establishment sells
the CARD over the counter to the customer. The dealer,
to do so. A customer may physically transport the CARD to a
location Where customer has access to a computer that is
distributor, and retail establishment may use Whatever pro?t
margins or price mark ups as they choose or is agreed upon.
The CARD is delivered to the customer like any other retail
product. Continuing along the How chart in FIG. 1 to the
customer, the CARD is used to access only the Web content
that is prede?ned by the CARD. The purpose of the CARD in
cache back application.
this transaction is only to ensure that the user is in possession
of it. The transaction takes place through an over the counter
FIG. 6 is an example of Font Fingerprinting Where a font
subset ?le must be delivered to the user.
FIG. 7 is an example of Hidden PixeliZation for Content
FIG. 2 uses a How chart to illustrate an alternate embodi
ment of the RPOS. The process again begins With Web Con
tent Dealers. In this application the Web Content Dealers may
or may not subscribe to the RPOS system (i.e. make their oWn
CARDs). To facilitate the creation of a CARD for the WEB
Content Dealers, a retail establishment supplies a computer or
terminal as a customer access point, Which provides Internet
access, and issues a CARD to a customer upon entering the
retail establishment. The customer broWses the Web and looks
for content to purchase. Whenever a Web Content Dealer
requires some sort of payment and the customer agrees, the
customer authoriZes payment from the retail establishment
and by default the retail establishment agrees to the purchase.
FIG. 8 illustrates the similarities betWeen the NeW Courier
font and the Courier 10 BT font.
FIG. 9 illustrates the Scanner/ CARD combination system.
The barcode scanner portion of the Scanner/CARD device is
made up of components Well knoWn in the art such as a metal
shielded Wand With a ?ber optic bundle, light source and light
detector. The programmable ?ash memory module, 7 is
onboard to store data received by the scanning apparatus, and
The customer is not required to enter his or her oWn name,
able as shoWn or in other varying shapes and siZes. In this
it. The actual transaction can take place through scanning
items and then checking out at a cashier, self serve check out,
or other sales register Where transfer of oWnership rights is
an over the counter sale.
FIG. 10 is a graphical ?oW chart of the content ?ngerprint
ing process Whereby the formula, Copy+SCMS+Impairment
Validation:Legally Transferable Backup, may be accom
plished in one or more embodiment of the invention. (SCMS
recording of speci?c media content locations (URLs); they
means Serial Copy Management System)
FIG. 11 is a How chart diagram of a convergent mesh block
control architecture that can create layer-2 and/or tunneling
can be simply Written doWn, picked out from a Written menu
after having seen the Web dealers previeW pages, or retrieved
as a menu item from the local computer at the check out.
Internet access is also not required during the recording of the
speci?c access information, or during the retail transaction.
While Internet Access during these processes may be used to
embodiment, the CARD portion of the Scanner/CARD
device is again only to ensure that the user is in possession of
in possession of it. The actual transaction takes place through
The processes shoWn in FIG. 2 illustrate a subtle difference
from prior art used in Internet commerce, in that Internet
access can be used to help the customer to choose Which
media content to purchase and to later retrieve on Whatever
computer the customer chooses, but internet access is not
needed. Internet access may not be not required during the
the USB interface, 6, in this embodiment alloWs for connec
tion to most typical PC computer systems. The light emitter 8
and the CCD type imaging/light sensor unit for this embodi
ment shoW Where the barcode data is received by the unit. The
unit shoWn in the FIG. 9 is already fully commercially avail
credit card payment information, address, or any other infor
mation that they do not choose. Upon leaving the establish
ment, the customer pays the retail establishment the amount
required for content received or to be received. The purpose of
the CARD in this transaction is only to ensure that the user is
capable of receiving Web content. The customer uses the
CARD to obtain access to those speci?c materials the seller of
the CARD intended.
FIG. 5 shoWs some examples of recording devices that are
used or could be modi?ed for use as the media delivery
method, access CARD, or to deliver the small cookie free
connectivity for secure digital rights control through local
head-end digital agents Working along-side or even directly
With other netWork assets to accomplish the digital rights
time-space-place shifting through the “Home Box” appli
US 8,438,111 B2
FIG. 12 shows the Home Box “place chaser.” It can be
grammable ?rm-Ware can trigger a disagreement betWeen the
utilized as customer premises equipment (“CPE”) depicting
in-home (or business setting) or end-user custody placement,
Web authentication services and the home-box Which can in
turn trigger alerts and/or disable the Home Box and any
subsequent content unlocking or keys G, Which can upset the
Mother system, E.
Whether stationary or nomadic on the netWork. Smaller ver
sions of the CPE could also be used nomadically and travel
With an end-user. Like most other set-top boxes as used in
cable TV and satellite industries, the Home Box ?rmware is
typically not end-user programmable and in certain embodi
ments may serve as a home media player When connected to
an audio-visual playback and/or display device Within the
home. Since it can also be netWork enabled, in its preferred
The RPOS may be utiliZed as an “actual point of sale”
device for Internet content. Previous Waves of invention
attempting to satisfy the needs of secure Web content on the
embodiment, the Home Box serves as the intermediary
betWeen the certi?cate authorization “Web” system services
Internet have delivered many “virtual point of sale” tech
niques and emphasis has been on the transaction itself and
and remotely connected end-user play-back equipment. A
hoW to exchange money over the Internet.
The RPOS invention is unique in the Way it does not folloW
the trend to do everything on the Internet and uses “actual
single-use or multiple use license for playback can be
checked-out to a remote end-user playback device, depending
on What license may have been purchased. If another request
instance occurs While the single-use license is checked out,
point of sale” as the place Where a prede?ned Internet sales
transaction takes place. The information provided by Web
the proprietary play-back key from the Home Box “place
chaser” can be programmed to not release another key unless
and until the play-back key gets checked back into the Home
Box by the end-user playback device that had it checked out.
Thus, the content media can be played on any device, but only
to the computer by the user. Additionally, some Web servers
require information from the purchasing computer to be
stored on the Web-server. Some or all of those messages can
in a one to one relationship With one device at a time.
The license, A, is a form of digital rights given by the
delivered cookies or applets is not required by RPOS because
the information is already included; it may be hand delivered
copyright oWner to a digitiZed Work of authorship indicating
a certain portion of the “bundle of sticks” is being transferred
for rights oWnership to an entity or individual. HoWever, the
initial transfer is merely to place such rights in a controlled
also be ful?lled by the RPOS.
A security access key may be provided in the form of a
prepaid card sold as a retail item. The access key has a one
time or multiple Internet session use as provided by the seller
of the card. Through obtaining the CARD, the purchaser may
gain access to the Website or speci?c Web page(s) intended by
manner into the virtual realm through a Web server or services 30 the seller for either a de?ned duration of time or inde?nite
system, B, Which in today’s technologically driven World
typically refers to the World-Wide-Web, or internet, but the
duration of time. Any time the end user (customer) of the
CARD is on the Internet, a very simple utility program may be
netWork may be public or privateiopen or closed, and the
deployed to ensure that there are no changes to the cache
content of the customer’s computer and no cookies are
intended embodiments for the RPOS invention may come in
many netWork con?gurations.
For this embodiment, and elseWhere in this application, the
as in “mother” earth or in this case “Mother,” may also be used 40
to describe these virtual realms Which may include one or
accepted or transmitted during the delivery of the media con
tent. The utility of the invention is that it provides a method of
controlling Web access that requires at least one transaction
be completed in person. No connection to a banking system
for credit referencing is required, no vast system of computer
netWorks is needed to verify anonymity and account status.
The actual transaction takes place over the counter. The deliv
many computers. “Mother” system merely means that the
World-Wide-Web or other large scale public or private com
ery takes place on a computer of the users choice.
The CARD can be embodied as a voucher system that may
World-Wide-Web, Which has an “Earth” connotation, has
often been depicted in graphic as a globe or similar picture of
the earth. For purposes of this application, the female gender,
puter netWork systems may be programmed to accomplish
one function or system. A “Mother” system thereby is a good
be used only to authenticate that the user of the card is in fact
the one in possession of it. The user of the CARD uses the
term to use When referring to a World-Wide system in terms of
card to access the content or merchandise from the computer
motherhood, fertility, creation or the bountiful embodiment.
In this case, the intemet system (World-Wide-Web) When used
Within the RPOS physical or natural Home Box system, the
of their choice. As the time required for the user holding the
card to receive the desired content is decreased, the need for
the CARD itself may become unnecessary. The content itself
may be recorded to disk compact disk, cassette, VHS tape, or
other recording media: the media may be recorded at the point
of sale location.
virtual spaces of the intemet may sometimes be referred to as
the “Mother” system.
It is also contemplated that each content license, A, may be
treated as a single use license, but multiple licenses of the
same content may be assigned if multiple licenses have been
purchased by the end-user or otherWise supplied. For
example, the same feature length ?lm may be alloWed to be
vieWed on more than one playback device at the same time,
but only if more than one single-use license has been assigned
to the Home Box (“place-chaser”), C, by the Web authentica
tion services.
A continuous and/ or periodic handshake routine, D
exchanging certi?cates and/ or keys in either direction,
betWeen the Web authentication services and the Home Box
purchaser speci?es the shipping address of such merchan
number of unlock codes or credentials have been exchanged
With remote devices, F. Tampering With the non-user pro
dise. The CARD in this situation may simply be a receipt of
sale or other proof of payment.
Unlike any previous method of payment for Internet com
merce in the past, there is no need for an account, credit, or
other means of electronic payment required for the buyer in
can ensure that only the proper number of licenses have been
assigned to the Home Box “place-chaser” and only the proper
The content that is recorded may be Internet content media
or the content may be the purchase agreement for merchan
dise, also called an Internet shopping cart. When the content
is a purchase agreement for merchandise, the payment can be
made for the merchandise by the RPOS. The RPOS assumes
responsibility for payment to the Internet vendor and the
the transaction. The proof can be Within the content itself. The
content can become the veri?cation of a sale. Internet mer
chandisers such as but not limited to AmaZon, Barnes and
US 8,438,1ll B2
Nobel,, Outpost, and others provide a veri?cation
page for each sale, Which they intend to be printed by the user.
record of the content travels With the document. It can be
These types of veri?cation pages are excellent examples of
speci?c URL shopping cart information that can be deter
mined ahead of time and sold Whether it is for merchandise or
content media. The purchase of content media may include
?le itself is tagged and encrypted and cannot be read unless
the proper keys are used to decrypt the message. For ?nger
much different from digital signature for example Where the
print marking of the document, the mark stays With the docu
ment even after it is properly received and possibly changed.
A base font is modi?ed only slightly so as to not be imme
the media itself and/or may include a license or access to the
media, as may be provided by a key.
When the purchase is for non prepackaged merchandise
diately noticeable to the human eye, yet enough for machine
recognition. The base font becomes the “0” of the binary and
such as content media, the media may be individually
the modi?ed font is the “1”. Any text string can be modi?ed to
licensed With a unique serial number for protection against
counterfeiting. Content ?ngerprinting is one of the methods
used. Traditional forms of digitally protected media may also
accomplished using a scanner With a character recognition
imprint a binary coded binary (BCB). The decoding is later
system capable of distinguishing the font differences.
Font ?ngerprinting may be particularly designed to be
most readily used for printed media, but the ?ngerprinting
be used.
The ?ngerprint can be ?le tag data knoWn as content “meta
data,” Which has been employed as a ?le “header” and con
tains ?le information to be used for protecting the digital
could also folloW a soft copied document provided the ?le
format remains Rich Text Format (.RTF) or better, giving
access to the font aberrations. The font set used for printing
the “?ngerprinted” document must also be available to the
content. The ?le “header” metadata can be serialized and can
be embedded into a number of popular ?le formats, Without
breaking their readability. Embedding metadata in the ?le
computer that receives the document. Future developments
could include a highly compressed ?le format capable of self
decompression that Would mask the fact that the Distributed
font set is traveling With the document.
softcopy document, not requiring a font subset ?le, mixes tWo
itself avoids many problems that occur When metadata is
stored separately. Metadata is extensively used With protected
digital content to deliver information about the ?le on the ?le,
but has usually been separate from the actual content of the
?le. In some embodiments a computer receiving a metadata
Another method of sending a font generated BCB With a
“tagged” ?le can read the metadata, but cannot read the ?le
content Without proper keys to unlock the ?le. The Adobe
Extensible Metadata Platform @(MP) is one such standard,
available fonts that are a close match such as Courier NeW
With 1 1 point font and Courier 10 BT With a 10 point font (see
FIG. 9).
created by Adobe Systems Inc. Information Interchange
Model (IIM) is another that has been for the most part
replaced by the neWer XMP standard. Content ?ngerprinting
(analog placement of codes) on the content instead of or in
While the above mentioned combination is readily visible
knoW What you’re looking for. It Was just an attempt at ?nding
a good match, but there may be other good system fonts that
are a close enough match.
addition to ?le header metadata, can add an additional level of
security Which is not lost When content is displayed or copied
because it is found on the actual content rather than just on the
header of the ?le.
net has been the jpeg, formally the ISO standard 10918, Which
of this type are made up of tiny pixels. For hidden pixeliZa
tion, a jpeg image may be converted to a similar image of a
all of the same color. For example a 320x240:76,800 pixel
distribution. One ansWer to the problem is a mechanism or
shades Within the 4 pixels only slightly leaving the neutral
documents delivered over the Internet that contain these
images are thereby permanently marked.
the original pixel. The original color is the “0” code and the
slightly changed shade is the “l” of the binary. One of the Way
of making this system seem less detectable may be to disguise
the encoding by causing the encoded jpeg ?le to still report to
This re pixeliZation creates four available binary codes in
sages are input, the user clicks on a button for encoding Which
This document suggests just some basic methods of ?n
gerprinting internet content With embedded codes or hash
codes: Font Fingerprinting, hidden pixeliZation, concealed
ASCII and non visible/inaudible codi?cation. This sample of
methods is meant as introductory schemata only and is in no
Way exhaustive of the endless modes and embodiments Which
the user that it is still a 320x240 image, for example, When in
fact it has been changed to a 640x480 image and then report
back to the vieWing system the proper resolution. If the user
resaves the image into a different format such as GIF, the code
may or may not be transferred, but as long as images in
documents are untouched, the document remains ?nger
printed, for example, even if it is printed.
content ?ngerprinting may be applied.
Font Fingerprinting
Bar codes are typically comprised of black and White
stripes, yet all that a bar code really represents is a binary
code. For Font Fingerprinting of Internet content, hidden
binary codes are placed into documents so that a speci?c
Several of the pixels from these neW higher resolution
images can then be encoded With a BCB by varying the
color of the original larger pixel essentially unchanged. Any
makes all the necessary adjustments to encode the hidden
information into the visible message and saves to one ?le.
higher resolution (more pixels). In other Words any single
pixel in the original image may be recreated as multiple pixels
image becomes a 640x480:307,200 pixel image, or roughly
four pixels per one pixel of the original image.
post the materials or otherWise “leak” the materials for Wide
Way to “mark” individual copies of recorded material for
licensing so the publishers can feel con?dent that appropriate
royalties are being paid. The “mar ” should be something not
easily detected or removed.
The Graphical User Interface (GUI) of a marking program
may use tWo side by side text WindoWs, One WindoW may be
used for the visible message and the other WindoW may be
used for the shorter encoded information, Once the tWo mes
Hidden PixeliZation
The format of choice for delivery of images over the Inter
keeps the ?le siZe for delivery fairly small. All digital images
Content Fingerprinting
In the industry of internet publishing, one of the problems
has been unauthorized copying, posting or otherWise reveal
ing of sensitive materials for Wide distribution. Millions of
dollars in uncollected royalties are lost each year. Publishers
have no Way of detecting the responsible parties Who Willfully
to the naked eye, the text is not noticeably different unless you
Concealed ASCII
ASCII stands forAmerican Standard Code for Information
Interchange. ASCII Was developed a long time ago and the
characters are not alWays used in the same Way on different
computer systems. ASCII Was originally designed for tele
US 8,438,1ll B2
types and the ?rst 31 characters in today’s applications are no
the ?ngerprinting does not have to be on the ?le container
itself but on the content of the ?le When interpreted.
Fingerprinting documents is a useful and neW idea. The
longer used as originally intended. Concealed ASCII ?nger
printing takes advantage of the fact that several of them act the
usefulness of the speci?c methods shoWn here may be greatly
diminished When patented and the PTO discloses to the pub
lic. The actual methods of ?ngerprinting really should be kept
same as the ASCII character “032” in many applications.
ASCII 32 is the code for a blank space.
ASCII characters 0, l0, and 13 do not display anything on
most WindoWs applications. Character 9 Will move to a tab,
as “Trade Secrets”. The above methods are not fool proof or
making a long blank space. 16 25 and 27 31 produce a black
even sophisticated enough to hold up against even the least
sophisticated of hackers. They are merely offered here as
examples of hoW to individually license Internet materials. As
industry looks to the Internet for delivery of every kind of
area on the screen in some applications and a blank area in
others. So do 19, ll, l2, l4, and 15 on some WindoWs appli
cations; hoWever, they often cause error messages in the com
piler for many applications.
copyrighted material, there Will be other speci?c methods of
?ngerprinting. Since, nobody is publicly open about their
methods for Working on this type of copyright protection: the
Concealed ASCII can create a BCB by using the standard
ASCII 32 in spaces as the “0” character of the binary and an
alternate ASCII 0, 10, or 13 With ASCII 32 as the “1” char
concept itself might be of strategic advantage. Fingerprinting
acter of the binary.
Example: The quick gray fox jumps over the lazy broWn
There are nine spaces to use for the BCB in the preceding
phrase. The code in the example above reads 0100001 1 l . The
internet delivered media may involve documents, images,
videos, sound tracks, or any other type of media that can be
code for the 2nd, 7th, 8th, and 9th spaces in the phrase is
ASCII 10 folloWed by ASCII 32. The remaining spaces sim
ply use ASCII 32. While the concealed ASCII ?ngerprinting
is not printable, it can be used to travel With text of a printable
Concealed ASCII can easily be lost When transmitted as
plain text over the Internet and other systems, but many docu
ments are transmitted over the Internet in speci?c ?le formats
that Would maintain speci?c ASCII sequences not visible to
tifying mark through content ?ngerprinting.
ated the text.
Which can later identify the origin of the recording. The sights
Identical songs or videos by the same artist can become
individual versions that are licensed to individuals. Using
available from a number of manufacturers the sights and
sounds outside the range of human discernment can later be
detected to verify if the recording is in fact licensed and Who
outlines the speci?c and exclusive rights of copyright oWners.
Original artists for copyrighted materials have the exclusive
right to prevent others from copying, using, or destroying
copyrighted Works. Particularly 17 USC 107 §l06 and § 106
(a) Without other exceptions Would disalloW anyone from
modifying or destroying a copyrighted Work. HoWever, § 107,
alloW end-users of copyrighted products to sell or destroy
the make “backup” copies for personal use, Which become
useable licensed copies, in the event that the original licensed
copy becomes damaged or destroyed.
To better understand the bene?ts of the present invention,
their licensed product Without the artists permission as Well as
The human sound range is betWeen 20 and 20,000 hertz for
a young person and much less for an old person. The human
visual range for light ?ts Within a range around 400-800 THz.
Visual analog signals can also be dubbed into digital video
The CARD can also create many advantages over the prior
art in the area of tracking of ?rst sales in copyrighted mate
rials, returns of such sales, as Well as retransfer of oWnership
in copyrighted materials or other merchandise. It is Well
knoWn in the art that Title 17 of the United States Code
§l09, and other case speci?c copyright licensing legalities
is the oWner of the license. The analog signals essentially
encode any individual identi?cation to a song, video, or other
media that contains audio or video tracks.
net media content Would be useful for content ?ngerprinting
Return Merchandise and Retransfer of Ownership
or sounds created may use a frequency, signal generator, or
other means of creating analog signals. The analog signals,
sensitive digital softWare and computer sound editing tools
serial number, coded license number, or other identifying
mark; and the machine only visible, audible or otherWise
noticeable label could be a coded message capable of singu
larly distinguishing the content from other content of the
same or similar type. Any means of recording, Writing, or
otherWise placing a machine visible or audible code on Inter
Non-visible or Inaudible Codi?cation
Analog signals of non discernable frequencies for human
Which cannot be heard by humans on the recording, can be
used for distribution of copyright materials such as mp3
music or dubbed into the soundtrack of a video that may be
distributed on the World Wide Web (intemet).
It can use ?rst a visible, audible, or otherWise humanly
detectable label version of serial number, coded license num
ber, or other identifying mark; a second label that is only
machine visible, audible, or otherWise detectable version of
the reader Without looking to the particular codes that gener
ears or eyes can be individually dubbed into audio recordings,
produced for the Internet.
The method of providing a level of security in transfer of
oWnership for prepaid media content over a public computer
netWork (Internet) using a computer can be accomplished
using individually coded license, serial number, or other iden
recordings. A feature of non visible or inaudible codi?cation
one should have a fair understanding of the both US. copy
is that signals may be dubbed into the content and not just
metadata connected to the ?le container itself. In non-visible
right laW in relation to What may be considered patentable
or inaudible codi?cation, the metadata can be embedded in
may be especially helpful as to the understanding of the
business methods herein disclosed. While the Federal Circuit
has not yet de?ned What speci?cally characterizes a business
method claim and separates it from other process claims, the
analog, but With digital consequences.
Content Fingerprinting Usefulness
subject matter. Particularly, knoWledge of US. copyright laW
Content ?ngerprinting could be used for printing secure
documents, discouraging unauthorized use, sending secret
Court has stated that claims draWn to a method of doing
business should not be categorized as a ‘business method’
encoded messages, authentication of modi?cation of docu
ments, counterfeit detection, or other application requiring
claim, instead they should be treated like any other process
secure distribution of Internet materials. Content ?ngerprint
claim. Love, John J. and Coggins, Wynn W., Successfully
ing differs from digital signature or digital Watermark in that
Preparing and Prosecuting a Business Method Patent Appli
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF