Patent application number | Description | Published |
20080250238 | METHOD AND SYSTEM FOR CONTROLLED MEDIA SHARING IN A NETWORK - A method for controlling media sharing among a plurality of nodes in a network. The present method is comprised of availing to the network an instance of media content for sharing among the plurality of nodes by a source node communicatively coupled to the network. The present method further includes decrypting the instance of media content from an encryption local to the source node. The present method further includes encrypting the instance of media content into an intermediate encryption. The present method further includes transferring the instance of media content to a node while the instance of media content is in the intermediate encryption. The node is associated with the network. The decrypting and the encrypting and the transferring are in response to receiving a request for the instance of media content from the node. | 10-09-2008 |
20080250239 | METHOD AND SYSTEM FOR CONTROLLED MEDIA SHARING IN A NETWORK - A method for controlling media sharing among a plurality of nodes in a network. The present method is comprised of availing to the network an instance of media content for sharing among the plurality of nodes by a source node communicatively coupled to the network. The present method further includes decrypting the instance of media content from an encryption local to the source node. The present method further includes encrypting the instance of media content into an intermediate encryption. The present method further includes transferring the instance of media content to a node while the instance of media content is in the intermediate encryption. The node is associated with the network. The decrypting and the encrypting and the transferring are in response to receiving a request for the instance of media content from the node. | 10-09-2008 |
20080282083 | METHOD AND SYSTEM FOR CONTROLLED MEDIA SHARING IN A NETWORK - A method for controlling media sharing among a plurality of nodes in a network. The present method is comprised of availing to the network an instance of media content for sharing among the plurality of nodes by a source node communicatively coupled to the network. The present method further includes decrypting the instance of media content from an encryption local to the source node. The present method further includes encrypting the instance of media content into an intermediate encryption. The present method further includes transferring the instance of media content to a node while the instance of media content is in the intermediate encryption. The node is associated with the network. The decrypting and the encrypting and the transferring are in response to receiving a request for the instance of media content from the node. | 11-13-2008 |
20090265549 | PREVENTING UNAUTHORIZED DISTRIBUTION OF MEDIA CONTENT WITHIN A GLOBAL NETWORK - One embodiment of the invention is a method for providing media content while preventing its unauthorized distribution. The method includes transmitting from a client to an administrative node a request for delivery of an instance of media content (IMC); determining which content source (CS) of a plurality of CSs to provide delivery of the IMC, provided the client is authorized to receive the IMC; transmitting to the client an access key and a location of the IMC; transmitting from the client to the CS a second request and the access key; in response to receiving the second request and the access key, transferring the IMC from the CS to the client; transmitting from the client to the administrative node an indicator indicating a successful transfer of the IMC; and generating a transaction applicable to the client and associated with the transfer of the IMC to the client. | 10-22-2009 |
20090265557 | PREVENTING UNAUTHORIZED DISTRIBUTION OF MEDIA CONTENT WITHIN A GLOBAL NETWORK - One embodiment of the invention is a method for providing media content while preventing its unauthorized distribution. The method includes transmitting from a client to an administrative node a request for delivery of an instance of media content (IMC); determining which content source (CS) of a plurality of CSs to provide delivery of the IMC, provided the client is authorized to receive the IMC; transmitting to the client an access key and a location of the IMC; transmitting from the client to the CS a second request and the access key; in response to receiving the second request and the access key, transferring the IMC from the CS to the client; transmitting from the client to the administrative node an indicator indicating a successful transfer of the IMC; and generating a transaction applicable to the client and associated with the transfer of the IMC to the client. | 10-22-2009 |
20090265789 | PREVENTING UNAUTHORIZED DISTRIBUTION OF MEDIA CONTENT WITHIN A GLOBAL NETWORK - One embodiment of the invention is a method for providing media content while preventing its unauthorized distribution. The method includes transmitting from a client to an administrative node a request for delivery of an instance of media content (IMC); determining which content source (CS) of a plurality of CSs to provide delivery of the IMC, provided the client is authorized to receive the IMC; transmitting to the client an access key and a location of the IMC; transmitting from the client to the CS a second request and the access key; in response to receiving the second request and the access key, transferring the IMC from the CS to the client; transmitting from the client to the administrative node an indicator indicating a successful transfer of the IMC; and generating a transaction applicable to the client and associated with the transfer of the IMC to the client. | 10-22-2009 |
20090265793 | PREVENTING UNAUTHORIZED DISTRIBUTION OF MEDIA CONTENT WITHIN A GLOBAL NETWORK - One embodiment of the invention is a method for providing media content while preventing its unauthorized distribution. The method includes transmitting from a client to an administrative node a request for delivery of an instance of media content (IMC); determining which content source (CS) of a plurality of CSs to provide delivery of the IMC, provided the client is authorized to receive the IMC; transmitting to the client an access key and a location of the IMC; transmitting from the client to the CS a second request and the access key; in response to receiving the second request and the access key, transferring the IMC from the CS to the client; transmitting from the client to the administrative node an indicator indicating a successful transfer of the IMC; and generating a transaction applicable to the client and associated with the transfer of the IMC to the client. | 10-22-2009 |
20100131417 | ENHANCING COPYRIGHT REVENUE GENERATION - A method and system for enhancing copyright revenue generation is disclosed. The method includes receiving a copyrighted media recording, creating an independent work of authorship by generating a simulation of the copyrighted media recording, such that the independent work of authorship is entitled to a copyright and utilizing the simulation in place of the copyrighted media recording, such that use of the independent work of authorship may be entitled to copyright royalties thereon as opposed to requiring copyright royalties for use of the copyrighted media recording. | 05-27-2010 |
20100275272 | METHOD AND SYSTEM FOR PROVIDING LOCATION-OBSCURED MEDIA DELIVERY - One embodiment of the present invention enables delivery of “on-demand” high fidelity media content to computers via the Internet while restricting unauthorized users from directly retrieving media content from its source database. Once the computer receives the media, it is stored using hidden directories so that it may not be easily shared with others. Within the present embodiment, there are different functionality that are implemented in order to protect and monitor the media content source. For example, the actual address location of the media database is hidden from content recipients while its address directory is periodically change making past addresses obsolete. Additionally, an access key procedure and rate control restrictor may also be implemented to monitor and restrict suspicious media content requests. By implementing these and other functionality, the present embodiment restricts redistribution of delivered media content and provides a means for compensating owners of copyrighted media content. | 10-28-2010 |
20100281544 | METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED RECORDING OF MEDIA CONTENT ON A MACINTOSH OPERATING SYSTEM - A method for preventing unauthorized recording of media content on a Macintosh operating system. The present method registers a compliance mechanism on a client system having the Macintosh operating system operating thereon. The compliance mechanism comprises a framework for validating the compliance mechanism on the client system, and a multimedia component opened by the framework. The present method uses the multimedia component for decrypting the media content on the client system. The present method also prevents decryption of the media content on the client system having the Macintosh operating system operating thereon if a portion of the compliance mechanism is invalidated. | 11-04-2010 |
20100306859 | SECURE MEDIA COPYING AND/OR PLAYBACK IN A USAGE PROTECTED FRAME-BASED WORK - A system and method of secure copy and/or playback control of a usage protected frame-based work is disclosed. The method includes accessing serial copy management system information for the usage protected frame-based work. In addition, the method validates the serial copy management system information. Copy management information of the usage protected frame-based work is also accessed. In so doing, the copy management information is utilized to determine if a secure copy/playback application is authorized to generate a copy of the usage protected frame-based work. Thus the copy management information acts as a technological measure which “effectively controls access to a work” by requiring the application of information, with the authority of the copyright owner, to gain access to the work. | 12-02-2010 |
20100306860 | USING A CUSTOM MEDIA LIBRARY TO SECURE DIGITAL MEDIA CONTENT - A system and method for using a custom media library to secure digital media content on a computing system is disclosed. The method includes directly linking the custom media library with a copyright compliance mechanism (CCM)-enabled playback/recording application. In addition, the custom media library generates a new pathway distinct from a commonly used data pathway of the CCM-enabled playback/recording application and a media rendering subsystem of an operating system. Also, a CCM is alerted to monitor a plurality of media subsystems of the computing system. In so doing, a raw media file may be securely passed from the CCM-enabled playback/recording application via the custom media library and over the new pathway to a media subsystem of the operating system that is monitored by the CCM, such that the raw media file is rendered, playable and copyable in a secure environment. | 12-02-2010 |
20100318809 | METHOD AND SYSTEM FOR CONTROLLING PRESENTATION OF COMPUTER READABLE MEDIA ON A MEDIA STORAGE DEVICE - A method of controlling presentation of content on a media storage device is described. The method is comprised of verifying the presence of a media presentation mechanism and a usage compliance mechanism on a computer system operated by a recipient to whom the media storage device is distributed. The usage compliance mechanism includes a file system filter driver for controlling data reads associated with the computer readable media. The media presentation mechanism is communicatively coupled with the usage compliance mechanism. The present method further includes the file system driver performing a first decryption of the computer readable media. The present method further includes the media presentation mechanism performing a second decrypting of the computer readable media concurrent with presenting the computer readable media to the recipient. | 12-16-2010 |
20110010778 | STANDALONE SOLUTION FOR SERIAL COPY MANAGEMENT SYSTEM (SCMS) COMPLIANCE - Standalone serial copy management system (SCMS) compliance with respect to distributing and receiving protected digital media is disclosed. In general, when a digital media file is selected for transfer or reception between a computing system and another device, serial copy management system copy/playback information for the digital media file is accessed. If the serial copy management system copy/playback information comprises unrestricted copy/playback information the SCMS may utilize a common transfer pathway for the transfer or reception. However, if the serial copy management system copy/playback information comprises controlled copy/playback information the SCMS utilizes a new pathway distinct from said common transfer pathway for the transfer or reception of digital media, providing complete copyright protection from point of entry. In so doing, standalone SCMS compliance uses technological measures that effectively control access to the copyright protected work, as described in 17 U.S.C. sections 1201, 1202 and 1001. | 01-13-2011 |
20110035686 | SIMULATION OF A MEDIA RECORDING WITH ENTIRELY INDEPENDENT ARTISTIC AUTHORSHIP - A method and system for generating a simulation of a media recording with entirely independent artistic authorship is disclosed. One embodiment accesses a plurality of parameters from a media recording to generate a parametric field. In addition, a virtual 3-D environment including an original source point or pluralities of points of the media recording is generated. Then, at least one new and different capture point is selected by the operating artist from within the virtual 3-D environment. The operating artist then creates the performance desired by adjusting a plurality of parameters of the parametric field within the virtual 3-D environment based on the new and different source point staging and voicings to virtually record an entirely original independent audio and/or video work of authorship. | 02-10-2011 |
20110099640 | METHOD AND SYSTEM FOR SELECTIVELY CONTROLLING ACCESS TO PROTECTED MEDIA ON A MEDIA STORAGE DEVICE - A method of preventing unauthorized reproduction of media disposed on a media storage device according to one embodiment is described. The method comprises installing a compliance mechanism on the computer system. The compliance mechanism is communicatively coupled with the computer system when installed thereon. The compliance mechanism is for enforcing compliance with a usage restriction applicable to the media. The method further includes obtaining control of a data input pathway operable on the computer system. The method further includes accessing data that is disposed on the media storage device that is associated with the usage restriction. The method further includes preventing the computer system from accessing the media digitally via the data pathway while enabling presentation of the protected media. | 04-28-2011 |
20110103769 | SECURE TIME AND SPACE SHIFTED AUDIOVISUAL WORK - Disclosed herein is a system and method for securely providing a time and space shifted audiovisual work. The method includes accessing a time shifted and a space shifted audiovisual work comprising a series of related images that are intrinsically intended to be shown with accompanying sounds. In addition, the time shifted and the space shifted audiovisual work is presented with a copyright compliance mechanism (CCM)-enabled playback/recording/recording application, the CCM-enabled playback/recording application utilizing a new pathway distinct from a commonly used data pathway of a audiovisual work rendering subsystem of an operating system, such that the audiovisual work continuously remains in a secure environment during rendering, playback and recording. | 05-05-2011 |
20110296534 | SECURITY THREAD FOR PROTECTING MEDIA CONTENT - Disclosed herein is a system and method for protecting copyrighted media content. The copyright and playback management information is embedded into at least one data field of the media content. The media content is then encoded for a serial copy management system (SCMS) that utilizes the copyright and playback management information to ensure the appropriate copyright protection of the media content based at least in part on the embedded copyright and playback management information. | 12-01-2011 |
20120036584 | REPORTING INFORMATION ABOUT USERS WHO OBTAIN COPYRIGHTED MEDIA USING A NETWORK IN AN UNAUTHORIZED MANNER - Methods and systems for reporting information about users who obtain copyrighted media illegally using a network are provided. A particular copyrighted media from a source of copyrighted media may be associated with a user's computer. Copyright fees have not been paid for the particular copyrighted media. Information about the user of the computer is reported. | 02-09-2012 |
20120036585 | METHOD AND SYSTEM OF DETERRING UNAUTHORIZED USE OF MEDIA CONTENT BY DEGRADING THE CONTENTS WAVEFORM - In one embodiment, the present invention pertains to a method and system for deterring unauthorized use of media content in a computing system and network. In one embodiment, the invention comprises detecting an unauthorized use of the media content in a computing system or network, the media content having a characteristic digital waveform format and an associated indicator for indicating to a compliance mechanism an unauthorized use of the media content. On detecting an unauthorized use of the media content, the media content characteristic digital waveform format is degraded. In this embodiment of the invention, unauthorized use is non-compliance with a use restriction applicable to the presentation of the media content in the computing system or network. In accordance with this embodiment of the invention, the media content is rendered incomprehensible to an unauthorized user experiencing the media content, thereby likely deterring further unauthorized use of the media. | 02-09-2012 |
20120039467 | METHOD AND SYSTEM FOR AUTOMATICALLY DETECTING MEDIA AND IMPLEMENTING INTERACTION CONTROL THEREON - A method for automatically detecting media and implementing interaction control thereon. The present method receives a media change notification (MCN) from a non-defeatable autorun. After receiving the MCN of a media event an operation is automatically executed. The operation then initiates a controller for controlling interaction of deliverable electronic media from a media file corresponding to the media event, wherein the receiving, executing, and controlling are automatically implemented and cannot be defeated by a user. | 02-16-2012 |
20120042134 | METHOD AND SYSTEM FOR CIRCUMVENTING USAGE PROTECTION APPLICABLE TO ELECTRONIC MEDIA - A method for bypassing a compliance mechanism assertion of a usage restriction applicable to electronic media accessible in a computer system is described. The method includes a hardware device for causing the computer system to bypass the usage restriction, the hardware device communicatively coupled with the computer system and appropriate for reading from and writing to the storage device upon which the electronic media is disposed, the computer system having the compliance mechanism communicatively coupled to and operable therewith, the compliance mechanism for asserting the usage restriction. An application causing the computer system to bypass the usage restriction asserted by the compliance mechanism; and activating a presentation mechanism causing the computer system to present the electronic media in an unrestricted manner, the compliance mechanism unable to assert the usage restriction upon the presentation mechanism and the computer system. | 02-16-2012 |
20120042309 | METHOD AND SYSTEM FOR AUTOMATICALLY EXECUTING AN OPERATION AFTER A MEDIA EVENT - A method for automatically executing an operation after a media event. The present method receives a media change notification (MCN) from a non-defeatable autorun. Next, a file corresponding to a media event responsible for the MCN is accessed. The file corresponding to the media event is then authenticated and an instruction contained on the file is executed. Additionally, the accessing, authenticating, and executing of the content contained in the file cannot be defeated by a user. | 02-16-2012 |
20120042385 | PROTECTING COPYRIGHTED MEDIA WITH MONITORING LOGIC - Methods and systems for protecting copyrighted media with monitoring logic are provided. In one embodiment, monitoring logic is installed on a client device associated with a user. The monitoring logic detects whether the media is present on the client device. If the media is present, the media is analyzed to determine if it is copyrighted. | 02-16-2012 |
20120042391 | METHOD AND SYSTEM FOR PROTECTING CHILDREN FROM ACCESSING INAPPROPRIATE MEDIA AVAILABLE TO A COMPUTER-BASED MEDIA ACCESS SYSTEM - A method for protecting children from accessing inappropriate media available to a computer-based media access system according to one embodiment is described. The method comprises configuring a usage compliance mechanism with at least one restricted media identifier which identifies the inappropriate media. The method further includes determining that a child is attempting to access an instance of media and comparing that instance of media with the restricted media identifier. When the instance of media matches the restricted media identifier, the child is denied access to the instance of media. | 02-16-2012 |
20120131686 | METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED REPRODUCTION OF ELECTRONIC MEDIA - A method for selectively controlling access to electronic media disposed on a media storage device according to one embodiment is described. The method comprises creating a first list comprising a plurality of process identification values. Each of the plurality of process identification values of the first list is associated with a software application that is accessing the media disposed upon the media storage device. The method further includes creating a second list comprising a second plurality of process identification values. Each of the second plurality of process identification values is associated with a software application that is storing data. The method further includes determining that a particular software application is creating an unauthorized copy of the media disposed upon the media storage device. The method further includes preventing the particular software application from storing a usable copy of said electronic media. | 05-24-2012 |
20120174737 | SYNTHETIC SIMULATION OF A MEDIA RECORDING - A method and system for generating a synthetic simulation of a media recording is disclosed. One embodiment accesses a sound reference archive and heuristically creates a new sound that is matched against at least one sound in the sound reference archive. The media recording is analyzed and a synthetic sound based on the analyzing of the media recording is generated. | 07-12-2012 |
20130312120 | METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED RECORDING OF MEDIA CONTENT ON AN APPLE OPERATING SYSTEM - A method for preventing unauthorized recording of media content on an Apple operating system (OS). The present method registers a compliance mechanism on a client system having the Apple OS operating thereon. The compliance mechanism comprises a framework for validating the compliance mechanism on the client system, and a multimedia component opened by the framework. The present method uses the multimedia component for decrypting the media content on the client system. The present method also prevents decryption of the media content on the client system having the Apple OS operating thereon if a portion of the compliance mechanism is invalidated. | 11-21-2013 |
20140208446 | REPORTING INFORMATION ABOUT USERS WHO OBTAIN COPYRIGHTED MEDIA USING A NETWORK IN AN UNAUTHORIZED MANNER - Methods and systems for reporting information about users who obtain copyrighted media illegally using a network are provided. A particular copyrighted media from a source of copyrighted media may be associated with a user's computer. Copyright fees have not been paid for the particular copyrighted media. Information about the user of the computer is reported. | 07-24-2014 |
20140305288 | SYNTHETIC SIMULATION OF A MEDIA RECORDING - A method and system for generating a synthetic simulation of a media recording is disclosed. One embodiment accesses a sound reference archive and heuristically creates a new sound that is matched against at least one sound in the sound reference archive. The media recording is analyzed and a synthetic sound based on the analyzing of the media recording is generated. | 10-16-2014 |