GB2360679A - Security system for jukeboxes - Google Patents
Security system for jukeboxes Download PDFInfo
- Publication number
- GB2360679A GB2360679A GB0113768A GB0113768A GB2360679A GB 2360679 A GB2360679 A GB 2360679A GB 0113768 A GB0113768 A GB 0113768A GB 0113768 A GB0113768 A GB 0113768A GB 2360679 A GB2360679 A GB 2360679A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data
- content
- local
- music
- storage location
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/30—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for musical instruments
- G07F17/305—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for musical instruments for record players
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/002—Programmed access in sequence to a plurality of record carriers or indexed parts, e.g. tracks, thereof, e.g. for editing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/10—Indexing; Addressing; Timing or synchronising; Measuring tape travel
- G11B27/11—Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information not detectable on the record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/02—Arrangements for generating broadcast information; Arrangements for generating broadcast-related information with a direct linking to broadcast information or to broadcast space-time; Arrangements for simultaneous generation of broadcast information and broadcast-related information
- H04H60/06—Arrangements for scheduling broadcast services or broadcast-related services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/62—Establishing a time schedule for servicing the requests
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/20—Disc-shaped record carriers
- G11B2220/25—Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
- G11B2220/2537—Optical discs
- G11B2220/2545—CDs
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/40—Combinations of multiple record carriers
- G11B2220/41—Flat as opposed to hierarchical combination, e.g. library of tapes or discs, CD changer, or groups of record carriers that together store one title
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/60—Solid state media
- G11B2220/65—Solid state media wherein solid state memory is used for storing indexing information or metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H20/00—Arrangements for broadcast or for distribution combined with broadcast
- H04H20/16—Arrangements for broadcast or for distribution of identical information repeatedly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/09—Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
- H04H60/14—Arrangements for conditional access to broadcast information or to broadcast-related services
- H04H60/21—Billing for the use of broadcast information or broadcast-related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/09—Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
- H04H60/14—Arrangements for conditional access to broadcast information or to broadcast-related services
- H04H60/23—Arrangements for conditional access to broadcast information or to broadcast-related services using cryptography, e.g. encryption, authentication, key distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/27—Arrangements for recording or accumulating broadcast information or broadcast-related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/35—Arrangements for identifying or recognising characteristics with a direct linkage to broadcast information or to broadcast space-time, e.g. for identifying broadcast stations or for identifying users
- H04H60/46—Arrangements for identifying or recognising characteristics with a direct linkage to broadcast information or to broadcast space-time, e.g. for identifying broadcast stations or for identifying users for recognising users' preferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Music is distributed to local electronic jukeboxes from a central location. The jukeboxes include secure hardware to decrypt and encrypt music and monetary certificate to prevent improper use or copying of music. In particular the hardware includes means which decrypts an incoming signal, further encrypts the data produced by the first decryption and then performs a second decryption on the further encrypted data. The further encryption only takes place if a necessary credit level is attained. The hardware further includes a device for authenticating a decrypted data package.
Description
2360679
SYSTEM FOR SELECTIVELY DISTRIBUTING MUSIC BACKGROUND OF THE INVENTION
1. Field of the Invention 5 The present invention relates to a music distribution system for jukeboxes. More specifically, it relates to a system in which a jukebox selectively requests transmission of specific songs from a centralized storage location based upon usage information, and a system which coordinates transmission to optimize channel bandwidth.
2. Discussion of the Related Art Conventional jukeboxes play music from records or compact discs containing several songs. The records or disks are stored locally at the jukebox and are physically selected and played with these jukeboxes. The user views a display listing song selections contained in each record or disk. The user then selects a song to be played by depositing money into the jukebox and pushing keys which represent the desired song. A record or disc changer in the jukebox selects the appropriate record or disc and transfers it to the player, which can take as much as 30 seconds.
There are many deficiencies in conventional jukebo'x'es.' The most significant problem relates to music selection. The users are limited to the songs on the records or compact disc which are physically present in the jukebox. However, much of the music on these records or discs may be unused. This is because less popular songs are often included on the record or disc with more pppular songs. Jukebox records typically have two songs, one an each side. Compact discs may have-many songs. Generally, only a couple songs on a disc are popular and played often. The remaining songs are merely part of the disc and are not played.
1 G 2 Estimates indicate that 80% of songs in a jukebox may be unused. this wastes space in the jukebox which could have additional popular songs. Also, it is not easy to customize song selection for specific clientele at a location. Different establishments have clientele which often desire different types of music, or particular songs. There is no easy mechanism to determine the tastes of the users at a specific location. Therefore, the jukebox owner will. use general popularity information to select songs. Alternatively, certain studies, either formally by researchers or informally through the establishment operator, will be used to select songs. Such studies also have deficiencies due to sampling problems.
After music is selected, updating the music is time consuming and expensive. The records or compact discs must be manually updated by replacing the records or disks. Each copy of the record or disc must be purchased and then installed in the jukebox. The title also must be updated manually when discs are changed.
Costs of installing and maintaining a jukebox can be extremely high. A jukebox can hold as many as 100 discs or records, Installation of the jukebox requires purchase of a complete set of records or discs. Additional purchases must be made in order to change the music. Also, since a jukebox includes many moving parts, breakdowns are common. Breakdowns oftenoccur With the money reception portions or record/disc movement portion. Maintaining the jukebox requires visits from specialized technicians. Since the cost of playing a song is typically low, a jukebox is too expensive for an establishment in which sings are not often played.
Therefore, a need exists for a jukebox which permits simple customization of song selection for specific locations. A need exists for a jukebox system which eliminates manual selection and changing of songs. A need exists for a system which reduces the costs of operating a jukebox.
3 In personal music listening, a tape, record or disc is played an a simple system. The possible songs are limited by the songs owned by the user. it is expensive to have large music library, since each song must be purchased. Also, song selection can be quite time consuming with a large library, since the songs must be selected manually. The costs of a jukebox prevent the user from using a jukebox as a personal music playing device. Additionally, if a person rents a jukebox, such as for a party, songs cannot be consecutively played. Rather, a delay is required between songs in order to change discs, which is typically between 8 and 30 seconds. Therefore, a need exists for a jukebox system which is inexpensive and can operate as a personal music player. A need also exists for a system which can play selections consecutively, and can include transition effects, such as fades.
Some of the difficulties of conventional jukeboxes have been overcome by different variations of jukebox type designs. Generally, these systems are one of three types: on-demand streaming, near on-demand streaming and downloading.
In an on-demand streaming system, the user selects a specific song from a central -or general library. The song is then immediately performed. On-demand streaming rRquires a high speed data channel, at least 128 to 256 kbps, between the server and the jukebox. Accommodating this for more"thah 'a local area would be prohibitively expensive. Such a system also requires an extremely high speed modem, which is also expensive.
Near on-demand streaming uses a variety of channels to transfer songs to a location for performance. The user can then select one of the multiple songs available on the channels, similarly to selecting a television or radio channel. In order to have the same replay possibilities as a jukebox, each song would have to be replayed approximately six times simultaneously. As with on-demand systems, 4 the necessary bandwidth for real time transfer of music far exceeds today's technologies.
In a download system, music is loaded a jukebox from a central location. the music is stored at the local location for future playing. A computer jukebox is an example of such a system. In a computer jukebox, the songs are digitally stored in a memory. For example, in U.S. Patent No. 5,355,302 to Martin et aL, new recordings are downloaded into the memory of each computer jukebox. Old reicordings are erased from the memory to create space for the new songs. The jukebox monitors and stores information regarding the number of times each song has been played. The information is collected at a central location which uses this information to calculate royalty payments and to determine which songs are less popular and need to be replaced in the jukebox. The jukeboxes are managed remotely by a central management system using modems and public telephone lines or radio frequency transceivers and antennas. the central management location also contains a master catalog containing information about each song record it stores. The central management system monitors the jukebox, determines available memory space in the jukebox and transmits the new songs and catalog infQrmation to update de jukebox. The computer jukebox stores songs and graphics locally with information about the songs. The jukebox c2n initiate communications with the central management system at predetermined times or if the jukebox determines that an event has occurred that the management system should be aware of.
In known computer jukebox systems, the central manageMent system determines which songs need to be replaced and which jukeboxes need to be updated by using new song request data entered by customers to aid in determining whether new song data should be downloads to the jukebox. The jukebox contains a classification hierarchy which allows the user to find a song of interest. However, existing systems do not include mechanisms for allowing the user to select songs by classes of music types and do not provide information at the local jukebox relating to song availability at the central storage location. In addition, automatic mechanisms are not used to update songs based an user selections. Therefore, a need exists for a system which can automatically update songs based upon user preferences.
In existing systems, songs are transferred from a central location to the local jukeboxes through a variety of media, including satellite broadcasts, RF transmissions, telephone line transmissions and physical transfers or disks. Songs are generally transferred individually to each jukebox. The large files associated with downloading music files can be prohibitively expensive, inefficient and time consuming. The average size of a compressed song is on the order of 50 megabytes. The cost to transfer the large files including songs, can be prohibitive for a computerized jukebox using a central music storage location. In order to compete with traditional jukeboxes, the cost of music distribution must be similar to that for purchase of new compact disks. Additionally, the cost for the equipment to provide the communication of the songs to the jukebox can be high. Transferring songs over a telephone line using modems is expensive, particularly if a long distance telephone connection is necessary between the jukebox and the central location. although high. speed modems are fairly inexpensive, in many locations, the telephone lines may not be sufficiently clear of noise such that the high speeds can be achieved. Higher bandwidth or speed telephone lines may not generally be available in any locations, and generally cost more. ISDN communications have evedhigher speeds, but are more expensive both for the telephone line and for the equipment. Other types of high speed modems, such as ADSL modems, also are 6 significantly more expensive and connections are not widely available. Satellite receiver costs is also high, both for the equipment and for the ongoing service. Songs may also be transferred through the Internet, but significant delays are possible. The computer jukebox still needs to be connected to the Internet through some type of modem, although a long distance call may not be necessary. therefore, a need exists for a more efficient transmission system. In order to compete with traditional jukeboxes, the music distribution system must include a low cost for both the communication lines and for the communication equipment. Also, as the size of the system grows, significant increases in the cost of distribution equipment must be kept at a minimum.
Also, computer jukeboxes typically have a closed architecture, i.e., the jukebox is associated with a specific music distributor and distribution system. This creates a large dependency of the jukebox on the distribution system. If the distributor ceases to exist, the music in the jukebox may not be replaceable.
Similarly, spare parts for repair may cease to exist. Therefore, a need exists for an open architecture for a distribution system.
Finally, a system of computer jukeboxes must be secure. Since songs are digitally stored in a modifiable memory device, the songs can be copied to other devices. Also, unauthorized songs may be loaded onto a jukebox. The music distribution system must provide a mechanism for security of the songs. The music copy and music distribution must pay a fee. The payment mechanism must avoid credit or debit falsifications. Several secure payment mechanisms such as smart card, debit card, credit cards, etc. have been used. These mechanisms may provide a satisfactory security as long as the connections between the payment mechanism and the electronic control can not be accessed by hackers or the software that controls the payment mechanism can not be modified.
1 7 However, for juke boxes, the juke box operators must have access to the connections because they need to service the machines. thus connections can be cut and payment mechanism can be emulated fooling the electronic control. From the other side, the software that controls the payment mechanism can be easily 5 modified and fooled. In this way hackers avoid paying the fees.
Therefore, a need exists to create a more secure payment mechanism that is still secure even if the payment mechanism or software controlling it, is violated or fooled.
SUMMARY OF THE INVENTION
The deficiencies of existing jukebox systems are substantially overcome by a jukebox system according to the present invention in which individual songs are digitally stored. Music can be transferred from a central storage location to the jukebox, to update the music without a physical replacement. A music hierarchy system exists in the jukebox for determining customer preferences in order to automate music selection during updating. Also, a unique distribution system is used between the central location and the jukebox which improves on bandwidth,utilization for transmission.
Accordingly, it is an object of the present invention to provide a jukebox system which uses a statistic replacement algorithm working 'With different memory hierarchies, a scheduling algorithm, and conventional means of communication with addressable and broadcasting capabilities.
It is a further object of the present invention to provide newly installed systems with music on demand and to provide all other systems requesting music based on local user needs at deferred times. The deferment results in supplying music more efficiently and at a lower cost and by combining requests from multiple 8 locations for a single transmission of music to the multiple jukeboxes simultaneously.
It is a further object of the present invention to have a jukebox programmable with different payment methods to allow advanced payments and to 5 allow automatic access by the jukebox to the central storage system.
It is a further object of the present invention to store a portion of a hierarchical menu at a local jukebox location and to retrieve additional portions of the menu based upon local user accesses.
The present invention also allows songs to be placed on the local jukebox based upon user inquires into various areas relating to availability. The local jukebox automatically determines music to be retrieved at certain locations and selectively downloads music based upon actual user preferences at that location.
It is another aspect of the invention to create a system of music which has a low cost, both for equipment and service, for communicating songs to the jukebox and information to the central location. According to this aspect of the invention, one of the jukeboxes designated a master, can operate as a regional service center. Music is communicated from the central storage location to the regional service center. Music may be stored at the regional service center or further transmitted to other jukeboxes. The subsequent transmission from- the egiohal service center to the slave jukeboxes can be over local telephone lines at lower speeds with reduced costs. Similarly, the individual jukeboxes can communicate information directly to the regional service center.
It is another aspect of the invention to provide a music distribution system which is compatible with the use of compact disks already owned by a jukebox operator. The computerized jukebox can have an inter-face to connect with the commercial compact disk changers. Album covers and song names can be entered 9 or scanned into the memory in the jukebox. If the user selects one of the albums or songs on one of the compact disks, the jukebox communicates to the CD changer to select and play the appropriate song.
It is another aspect of the invention to provide a secure environment for the transfer of music and other sensitive information (such as monetary certificates)for purchasing songs or paying for services from the central location to each of the computer jukeboxes. The system includes secure hardware in each of the jykeboxes which is used to encrypt and decipher the music and other sensitive information (such as monetary certificates) for purchasing songs or paying for services provided to that jukebox. The music is stored in an encrypted format which prevents copying to other locations, including other jukeboxes within the system. The secure hardware is used to ensure the authenticity of distributed music an proper payment for the music.
BRIEF DESCRIPTIONS OF THE DRAWINGS
Fig. 1 is a schematic illustration of a music distribution system according to an embodiment of the present invention.
Fig. 2 is a schematic illustration of local music structure including a hierarchy of.classes of music.
Fig. 3 is a schematic illustration of a queue chain, for requested music in a statically assigned channel server.
Fig. 4 is a schematic illustration of a queue chain for requested music in a dynamically assigned channel server.
Fig 5 is a schematic illustration of a queue chain for requested music in a delay lock out channel server.
Figs 6a and 6b illustrate the process for initialization of the secure hardware in a se--urity mechanism of the present invention.
Figs 7a, 7b and 7c illustrate the process for distribution of music using the security mechanism of the present invention.
Figs 8a, 8b and 8c illustrate the process for distribution of monetary certificates in the security mechanism of the present invention.
Fig. 9 illustrates a block diagram of a second embodiment of the music distribution system according to the present invention.
DETAILED DESCRIPTION
The present invention relates to a jukebox with digitally store music, and a music distribution system for replacing music in the jukebox. It included an apparatus and method for requesting certain music stored at a central storage location and transmitting it to local jukeboxes.
The present invention more particularly relates to a Virtual Inventories with Perpetual Reproduction and Execution of Electronic Titles (VIP) architecture for managing Virtual Electronic Titles (VET). A VET is digitally encoded into a secure digital envelope to be used for mail distribution or electronic transmission or storage and can only be opened by authorized users. The VET envelope contains diverse qbject types with relational links, and packaging and accounting information. VETs can be sold, purchased, stored, rented, distributed, executed, reproduced, produced or interchanged. Execution of an object type in a VET resJts in human perception of texts, graphics, sounds, videos, three dimensional objects, etc. Thus, VETs can form the storage mechanism for a digital jukebox. Each song is stored as a separate VET which can then be executed upon demand from the user.
Reproduction of an object type in a VET results in reproducing the object types in a media, such as Digital Video Disc (DVD), Compact Disc (CD), tapes, paper text printing, paper image printing, sculptures, etc. thus, it is also possible to reproduce a song in another format so that the customer can obtain an actual copy, and the jukebox can function as a retail distribution center. Royalty payments for the transmission copies can be ensured through use of the payment mechanism discussed below.
Fig. 1 illustrates a music distribution system using VETs according to an embodiment of the present invention, including access methods between a jukebox and a central storage location. Fig. 1 contains a CIP architecture in a client/server environment. Three main elements comprise the VIP, including the Intelligent Terminal (IT)1T1AT9, the Operation Service Centers (OSC) R1, R2, G1 and the Communication Means (CM) CM1-CM9. Even though a single distribution system is illustrated, multiple distribution systems may be used for distributing music to any of the ITs. For example, as illustrated in Fig. 1, IT4 can receive music through either R1 (a primary distribution channel) or R2(a secondary distribution channel). Similarly, each IT may be connected to more than one independent network. Thus, each IT can operate in an open architecture which is not limited to a single distributor. The IT can operate like a computer in that it can include instructions for connecting to different distribution networks. A single network is illustrated in Fig. 1 and discussed below.
In one embodiment of the present invention, the IT is a Personal Jukebox (PJ) that can be capable of supplying music execution on demand 95% of the time at no cost. Personal Jukebox does not limit the devices to in-home locations. Rather, it refers to the capability to select songs according personal tastes and desires of the customers at a specific location. However, the distribution system of the present invention can be used to provide music through a PJ for individuals inhome. The high capability of the PJ to execute music on demand is achieved by senQir.g the music demand directly from the end users, as discussed below. The VIP uses the demand figures as sensed by many Pjs to physically place VETs. The 12 Regional Servers R1, R2 in the OSC use the local demand sensing information to determine local popularity demand, while the Global Server G1 uses the information to determine regional popularity demand. Each PJ uses individual demand sensing to determine local storage of VETs.
The PJ platform (any of IT11-IT9)contains a CPU hardware box, a massive storage system, and a real time operating system and drivers for the hardware devices. The CPU hardware box is based on PC-like hardware or set-up-box type hardware. the massive storage system is large enough to store more than 200 compressed songs, as VETs, with associated date types (text and graphic images), or generally has about 1 Gigabyte storage capacity. The massive storage system is scaleable to the user's needs. Since songs can be individually selected for inclusion(or deletion)from the storage system of the PJ, only desired songs need to be stored. No storage is wasted on songs which are not desired.
The Global Distribution Platform G1 in fig. 1 consists of a LAN connected to a WAN. This Global Operation Service Center G1 is comphsed of a master server, hierarchical storage subsystem, a communication server, a connection equipment to a public or private network, and a VET factory.
Regional OSCs R1, r2 are similar to the Global OSC G1, except that they do not require a VET factory. Regional OSCs R1, R2 are ge ogra phically closer to the ITS that they are serving. Thus, they can provide a faster, and generally less expensive, source for any given VET. As noted above, the demand information from each of the Pjs corresponding to a Regional OSC can be used to determine specific VETs to maintain at the Regional OSC. Regional OSCs, such as R1, R2, can operate as alternate nodes in the VIP network and OSC replacement for other regiods so that if a node in the VIP network fails, alternative routes and alternative Regional or Global OSCs can be accessed. While a single level of OSC is 13 illustrated between the Global OSC and the Pjs, multiple levels may be used. The demand information is used at each level to maintain the most popular songs for the lower levels.
The OSC provides operation services to the ITs. In Fig. 1, different options for the ITs to access the OSCs are shown CM1-CM9. There is a high volume, high speed distribution of VETs from the OSCs to the ITs. In addition, there is a low volume, low speed exchange of information from the ITs to the OSCs. The information exchanged includes the IT sending a VET request to an OSC, an IT accessing statistical information at the OSC, and OSC accessing sales information from an IT, and an OSC marking a remote control diagnostic, etc. If a Regional OSC fails, an IT can connect to another Regional OSC, or to the Global OSC for services.
IT1 in Fig. 1, uses an asynchronous analog telephone line for the exchange of information. IT1 sends a request for a VET to the Regional OSC to reduce the cost of the telephone call. The Regional OSC R1 then forwards the request to the Global OSC G1, which in turn up-links the requested VET to the satellite. The satellite then transmits the requested. VET to the IT1 satellite receiver. In this embodiment, only a receiver, antenna, down converter and a phone line are needed locally.
IT2 uses an integrated digital switched network for the change of information and VET distribution. This network requires a modem and is currently becoming standardized among service providers.
IT3 uses removable discs to store ail information related to accounting, sales, user VET requests, etc. The disc is mailed to the contracted OSC where the infornation is loaded into databaSeS to process the information. The OSC the generates a custom made disc with the VET requests for specified IT user.
14 Alternatively, the OSC may generate a generally programmed disc with common distributions, such as for new songs.
IT4 uses a cable modem to exchange information and request VETs. Currently, there is no uniformity among cable operators which makes this method of accessing the OSC difficult. Also, some cable operators do not have bi- directional data transmission capabilities.
IT5 uses an asymmetric digital subscriber line to exchange information and request VETs.
IT6 uses switched digital video or a hybrid-fiber coaxial cable modem to access the OSC. Which allows for an extremely high speed bandwidth. This method is actively being developed in the US by the increase in fiber optic communications.
IT7 uses the terrestrial, wireless technologies Multipoint Multichannel Distribution Service (MMDS) or Local Multipoint Distribution Service (LIVIDS) for access to the OSC. The MIVIDS is unidirectional with a high bandwidth. LIVIDS is bi-directional based on cellular-like technology.
IT8 uses only a satellite receiver and is not interactive. VETs are broadcasted continuously and the ITs automatically select what they want to download based upon local demand statistics as discusse d be low. ITs are charged a periodic fee or are charged for the number of VETs that are down loaded. The OSCS have the ability to disable/enable the IT downloading (reproduction) and execution capabilities of the IT.
IT9 uses a portable computer to capture transaction and statistical information from the It, and downloads contents required by the IT. The connection bet\jeen the IT and the OSC is through a port or LAN.
A communication server or access server performs the interfacing functions of network protocol translation, speed marching, buffering, and network packet routing between the ITS and OSCs. When using satellite delivery to the ITS the network carder is connected to the OSC by means of a high speed T1 or E1 link (or other high speed link).from the communications server to the satellite up- link, where data will be sent to the satellite for delivery to the geographically distributed ITS. The communication server and the OSC are internally connected to a Master server through a network hub which performs the interconnection of all network devices to guarantee a high network throughput speed.
The VET factory in the Global OSC G1 produces VET envelopes which are transferred throughout the system. The VET factory has one or more multimedia workstations with editing and authoring capabilities, temporary storage, content capture units and an internal connection to the OSC network hub. The workstation is connected to the LAN and WAN through the network hub so that the workstation can access the master server and the external WAN devices. The contents of the VET can include text such as an album name, song name, author, producer, date, serial number, royalty owner, etc., an image such as an album cover, or audio such as. the song or digital file. The workstation creates the VET and sends it to the Master Server through the Network Hub. The Master Se'rver in turn updates the VET data base. The workstation has ports to connect to capture devices, such as CD players to capture songs. The capture unit converts a title into a signal.
In the present invention, a VET envelope is distributed as a single unit. the envelope contains a group of VETs of the same or different data types liked together. Normally, the VETs in an envelope will have a title relationship. For 2 5 example, an envelope can be created from an album so that the envelope contains five songs from the album. The envelope would contain 5 compressed and 16 encrypted audio titles, 5 uncompressed non-encrypted song titles, each linked to its respective audio title, one uncompressed album title liked to each of the song titles and onecompressed non-encrypted cover page linked to the album title.
The access method between a PJ and a central storage location as shown in Fig.1 includes the following steps. The OSC periodically broadcasts to all locations a list of new songs available for distribution. The Personal Jukebox (IT1- IT9) downloads the list of new songs. The PJ determines the users' demand by capturing the users' requirements and processes the demands statistically. The PJ then determines which new titles are convenient to download. Previous to the attempt to download, the PJ would have been loaded with credits through a bank payment, bank deposit or a PJ fund collection mechanism, such as coins, bills, smart cards, etc. Once the credits are deposited, the PJ is auto-enabled or not disabled by the OSC satellite transmission to download a number of song titles. As a title is downloaded, the number of credits is decreased. The PJ downloads only titles that it has selected, as long as credits remain. Each of the jukeboxes locally stores a portion of the music available in the system and can play that music. Music not on the jukebox can be retrieved from a central storage location through any electronic transfer medium such as CM1-CM9 shown in Fig.i. Only music which has been enabled through the use of the credits can be received, deciphered and played. When a PJ runs out of credits, songs are not enabled. Also, music which is copied from another source, such as another PJ, will not be enabled. Thus, improperly copied songs cannot be deciphered or played. Other security features are discussed below.
Fig. 2 illustrates a local music structure for determining demand information and Cxerforming song selection. Such a structure is included at each level in the VIP based upon information from a lower level. The structure includes a hierarchy of 17 classes of music with levels for music types (such as Latin) and sub- types (such as Samba, Salsa, Merengue), albums, and songs. Each jukebox includes only a portion of the hierarchy which would be locally accessible. The entire hierarchy would be located in the central location. Regional distribution locations, such as R1, R2 in Fig 1, may include all or a portion of the hierarchy. The portion of the hierarchy on the jukebox is then traversed in order to select songs that are locally available 10 be played. The user selects a music type, then a sub-type, an album an, d then a song. Only songs for which VETs are stored can be locally accessed. Even though a user selects an album, not all of the songs on the album may be stored or selected. Thus, the popular songs on an album are stored while less popular songs are not.
In order to determine user preferences, the user can traverse the hierarchy to select types of music or specific songs which are not currently available and which would be desirable. These songs can then be downloaded to the jukebox from the central (or regional) location. The jukebox maintains statistics regarding the number of times that a node in the hierarchy is reviewed by a user. If the node is reviewed a certain number of times (either within a given time period or as a certain percentage of the total number of nodes visited), information which is below that node is retrieved from the central storage location. Thus, there may not be any songs locally from a type of music. However, as users access the hierarchy and select each type, its statistics increase until lower portions of the hierarchy should be retriev ed. The number of hits necessary in order to request additional portions of hierarchy or of certain songs from the central location can vary based upon the objectives for the jukebox. More rapid retrieval, such as direct on-line access, would naturally be more expensive. Alternatively, the system can request that the new music or hierarchy be sent within a given time, such as two days. As (7.1 18 discussed above, some songs may be periodically broadcast from the central location. The hierarchy may also be similarly broadcast. Within this structure, when a jukebox determines that a song portion of the hierarchy is to be retrieved, it monitors the broadcast until the song or portion of the hierarchy is broadcast.
When detected, the jukebox will download the desired information from the broadcast.
When a portion of the hierarchy is retrieved, it will not necessarily retrieve everything under it. Rather, it will retrieve one level and portions of lower levels.
Additionally, poffions of the hierarchy and songs which are not accessed as often are deleted in order to make space for new portions and songs. Thus, the jukebox is automatically updated with songs of interest to the clientele for that particular location.
The system also optimizes the channel bandwidth for transmission of information from the central location to the separate jukeboxes. Each request for additional portions of the hierarchy or for specific titles of songs includes a time for delivery. When information is requested so that times for delivery overlap, the information can be simultaneously transmitted to multiple jukeboxes. This is particularly relevant when the information is transmitted by satellite or through a computer network. It permits a broadcast transmission to multiple final locations.
In one embodiment of the present invention, the Song/Album Cover ratio is the numbler of productive songs in an album. The productive sings are classified in two types: those that generate 80% of the monthly sales and those that generate the remaining 20% of sales. Based on studies, the present invention uses 16% of the album songs in CD-based jukeboxes which generate the 80% of the monthly sales- Those songs are Top Performers. The Average Performers are the 11 % of the album songs which generate the other 20% of sales. The total number of 19 productive songs is the combination of the Top Performers and the Average Performers. The OSC inventories are loaded with productive songs only, thereby eliminating 73% of the non-productive songs. The Top and Average Performers, Monthly Premiere songs and the index are periodically transmitted by the central 5 storage location without any requests from the jukeboxes.
During transmission, one bandwidth requirement is necessary for the transmission of the Top and Average Performers and Monthly Premiere songs, which is a non interactive, update transmission which can be programmed to occur in programmable periods, such as twice a month. All local jukeboxes receive the non-interactive broadcast of new titles. The titles can be actually downloaded by the jukeboxes during the broadcast time. A second bandwidth requirement is necessary for the interactive, update transmission when the jukeboxes request their VETs from the OSCs based on user demand. This often occurs when a jukebox is installed in a new location. Both the interactive and non-interactive modes can run simultaneously.
This results in a Coincident Overlapping Concurrent Delivery (COCD) system to minimize the bandwidth requirements and the cost of transmission and to improve the availability of transmission of VETs. Different clients may request the same VET in an overlapping time. The more overlap'p'ing tim'e'that exists, the more chances there are that more clients will share the same VET delivery. Overlapping time is promoted by offering the lowest.cost for the clients tolerating the longest transmission delay range.
The COCD is comprised of a queuing system, distributors, channel servers, a COCD controller and a request conflict handler. A queue includes VETGroups which represent one or more VET-Transmission-Requests. the queues have a concatenation pointer to move the VET-Groups that complete their wait time in the queue to another queue or to a Distributor. The Distributor sends the VET- Group to a Channel Server for transmission.
In the COCD system, and IT, such as a Personal Jukebox, sends a VETTransmission_Request when it requires a VET to be transmitted. Queues, Groups and Requests have unique instruction parameters. The class parameters include: instructing the COCD system how long VET should wait before transmission, indicating during what time frame the transmission should occur, instructing the COCD system about communication savings, and indicating when the queue becomes enabled for transmission, etc. The availability parameters include indicating to the COCD the worst case delay window expected for a group in that queue.
The COCD controller is a task which performs the COCD intelligence and operation. It creates VET-Groups, inserts and moves them from queue to queue, updates the parameters and arranges the scheduling.
The OSC will invoke the COCD upon receipt of the IT's VET-Transmission_Requ est. The COCD determines which VET-Groups are, pending for transmission with the same VET name and compatible instruction parameters. A new group is created and inserted in the queue if the VET-Transmission_Request and the VET-Group do not have the same class parameters. Otherwise. the VET-Transmission-Request is stacked in the group. If a shorter delay time is requested, the group is updated with the new request availability parameters and all of the stacked requests are moved to a higher availability queue that matches all the instruction parameters. If a.shorter delay time in not requested, then the request is stacked in the group. This ensures that only -one transmission will occur for all the pending requests stacked and waiting in the same group for the sarne VET transm, ission.
21 The COM Distributor chooses VET-Groups from one or more enabled queues and distributes them to one or more channel servers. The Distributor balances the choosing and distributing as a'function of the weight of the queue and the throughput of the channel server by implementing distribution functions such as 5 round robin, fixed priority, daisy chain, etc.
The channel server in the COCD receives the groups from the Distributor and performs the actual VET transmission. Figs. 3,4, and 5 illustrate an example of t e COM system with several VET requests waiting. There are 6 different queues configured in the COCD as shown.
In Fig. 3, queues 1,2, and 3 are concatenated and illustrate optimizing availability of statically assigned channel servers. If, for example, a VET-Group X is the first in a queue and the higher availability queues in the chain are empty, the Distributor will pull the Vet-Group X for transmission, causing the transmission to occur ahead of schedule. This feature is especially suitable for communication services where the channel servers are statically assigned (continuos)because the OSC is charged whether the channel is used or not. The COM reschedules the VET requests to distribute them to optimize the use of the channel server time.
In Fig. 4, queues 4 and 5 are concatenated and illustrate optimizing transmission costs of dynamically assigned chanri& servers. By delaying the transmission of requested VETs, there is a reduction in data transmission and a lower transmission cost,- especially when channel servers are dynamically assigned because the carriers charge according to the amount of data transmitted.
In Fig. 5, queue 6 is by itself and illustrates optimizing for delay lock out. In this embodiment, there may be a precise time specified for a particul ar group in a queue. these VETs are time dependent. and are therefore not promoted to a higher availability queue and are not stacked with or into other VET groups. This delay 22 lock out allows a more precise wait time before transmission. This feature is particularly suitable for broadcast transmission systems, which require some type of deterministic transmission time. for example, with non-interactive satellite transmission (IT8 in Fig. 1), the OSC must transmit the song names (the index hierarchy) of new songs which are available. The system may delay a fixed time, such as one week, for each jukebox to determine demand for each of the new songs before transmitting the songs themselves.
In Figs. 3 and 4, queues 1 and 4 have been assigned a channel server through Distributor 1. The other queues in Figs. 3-5 are concatenated to the Next-State or the next queue. For example, in Fig. 3, the output of queue 3 goes to the input of queue 2 and the output of queue 2 goes to the input of queue 1. Queue 1 occupies 66% of the time of the channel server, while queue 4 is using only 33% of the channel service's attention.
The queuing system of the present invention allows for the more efficient transfer of music to multiple locations, saving both time and money.
The Personal Jukebox in the present invention may be for either commercial or home use. For the home version, the monitor, communication equipment, funds collection units and the sound subsystem are optional and can be added at will since the home user may have a television as a monitor and a -home sound system connected to the PJ.
Figs. 6a-8c illustrate operation cl' a security system according to an embodiment of the present invention, The security system is used to prevent improper copying of songs stored in a Personal Jukebox. It also prevents unauthorized storage or playing of music with the Personal Jukebox. It also prevdnts improper use of monetary certificates used for purchasing song copies or other types of products or services. In the security system of the present invention, 23 the songs in each jukebox are stored in an encrypted format which prevents them from being transferred to another jukebox or other storage medium. music which is transferred to the jukebox from one of the OSCs is also encrypted. The decryption of the transferred music requires sufficient monetary credits; otherwise, the VETs cannot be decrypted. Similarly, the coordination of the use of monetary credits must be controlled by the OSC to prevent unauthorized increases in credits.
Each PJ includes secure hardware, which according to one embodiment is located on the audio card. The secure hardware, implemented in a monolithic format, is used to encrypt and decrypt information. Since the secure hardware is monolithic, only the input and output data can be accessed. All of the digital inputs and outputs to the secure hardware are in an encrypted format which prevents unauthorized copying of the VETs or monetary certificates or another sensitive data.
The secure hardware for each PJ is unique, and will decrypt and encrypt data differently. Therefore, the secure hardware is not transferable between different jukeboxes. However, if the secure hardware for a jukebox becomes damaged, it must be repaired in order to retrieve and decrypt the VETs stored by the secure hardware. A set of public and private keys are used to encrypt and decrypt VETs in the secure hardware. The OSC can maintain a proper index to keys which can be used to repair or replace defective. or damaged secure hardware.
Preferably, a maintenance person will need to access the data (after entry of passwords or other appropriate safeguard) at the OSC to download the necessary keys for correcting the secure hardware. The initialization process for the secure hardware is illustrated in Figs. 6a and 6b.
As illustrated in Fig. 6a, an authorized center of the OSC generates an exteffial IT (intelligent Terminal. or Juke Box)key, an external SH(secure hardware)key, and an external serial number for the secure hardware and 24 corresponding IT (step 101). This information is encrypted (step 103)using a secret SH key (step 102) which is known exclusively at the OSC and the specific secure hardware. The encrypted information, called an initialization envelope, is the delivered to the secure hardware of the IT. the initialization envelope can be transferred in different manners, including an physical disks, by modem, or through a broadcast to the specific IT. The secure hardware the decrypts the initialization envelope "step 106) to recover the external keys and serial number. No other IT knows the Int. SH key (105 in figure 6a) used to encrypt the initialization envelope, therefore the envelope can exclusively be decrypted by the IT for which the envelope was generated. The secure hardware then determines whether the initialization was proper by comparing the external SH key with the internal SH key. If the keys do no match, then the initialization envelope has become corrupted ( or is unauthorized)and the process terminates (step 109). Alternatively, the IT can be disabled, since an unauthorized modification was attempted. If the keys do match, then the internal IT key and internal serial number are updated with the new information from the OSC (steps 110,113). If the secure hardware is being repaired or replaced, the external IT key selected by the OSC will correspond to the internal IT key for the device where the secure hardware is located. Since the VETs are encrypted and decrypted using the internal IT key, the repaired or replaced secure hardware can decrypt and play the previously stored VETs. The serial numbers are used to control monetary credits as discussed below- Th e process for distributing VETs in connection with the security system is illustrated in Figs. 7a, 7b and 7c. A compressed VET 201,. including a corresponding cost, is encrypted (step 203) at the OSC using a VET key 202 to create a VET envelope. The VET key can be based upon time to prevent a broken code from beinc used continuously. The VET envelope is then transferred to the proper ITs, where they are stored in the IT hierarchical storage. Since the VET envelopes are encrypted when stored they cannot be improperly copied by others. the VET envelopes can be copied to other ITs or other storage devices, but a proper key is needed to decrypt them. The secure hardware is the used to decrypt the VET envelopes. First, a proper VET key is selected (step 216) based upon the date of the VET envelope. The VET key is used to decrypt the contents of the VET envelope (step 218). If the IT has sufficient monetary credits (steps 207-2099, then the decrypted VET us again encrypted, this time with the internal IT key of the secure hardware (step 224, Fig. 7b). The encrypted VET is again stored in the IT hierarchical storage. When a song is selected to be played, the VET is retrieved from storage and decrypted using the internal IT key (step 227) in the secure haidware. At steps 228-229, the VET is then decompressed, D/A converted, and output to the audio amplifier 230. Monetary credits are used for decrypting VET envelopes. This ensues that payments are received for songs which are provided to an IT. As noted above, the VET envelope includes a cost. The IT includes an internal store 212 of the monetary credits available. The cost of the VET to be decrypted is compared with the value in the internal store 212. If the internal credits are sufficient, then the amount in the internal store is reduced by the VET cost (step 209) and the decrypted VET is further processed; as discussed above. If the internal credits are not sufficient, the decryption is terminated (step 210).
Fig 7c iHustrates.a process for inputting songs from sources other than the OSC. The secure hardware is used to compress and encrypt a received song as a VET. The Vet is divided into blocks (step 232), each of which can be associated with a cost. The cost and VET data are multiplexed (step 235) and encrypted (step 238) -using the VET key. The outputted VET envelope is the stored in the IT hierarchical storage (step 240) for further processing.
26 Figs. 8a-8c illustrate the process for increasing monetary credits for an It, Monetary credits are increased by transferring a monetary certificate to the It from the OSC. The monetary certificate is. encrypted to prevent unauthorized modifications. At step 301, the certificate is created with an amount and proper keys. The monetary certificate (with or without a monetary amount) can also include a new VET key to be used for a later dated VET transfers. The certificate is then encrypted using the internal IT key for the IT to receive the credit (step 303). Of course, the transfer of money to the OSC from the IT owner can be performed in different manners, is it necessary to say this? We do use satellite, keyboard, modem, fax to transfer the monetary credits. The certificate is then transferred to the It through an appropriate transfer mechanism. Such mechanisms can include direct transmissions or through transfer of appropriate codes to be entered on a keyboard. The internal It keys is used to decrypt the certificate (step 322). The certificate is then authenticated by comparing the received external IT key to the internal IT key (step 325) and comparing the received external serial number with the internal serial number (step 331). If there are any differences, the certificate is judged to be invalid. When a certificate is invalidate transmissions or through transfer of appropriate codes to be entered on a keyboard. The internal it keys is used to decrypt the certificate (step 322). The certificate- is then authenticated by comparing the received external IT key to the internal IT key (step 325) and comparing the received external serial number with the internal serial number (step 331). If there are any differences, the certificate is judged to be invalid. When a certificate is invalid, the transaction can be aborted, or, alternatively, the IT may be disabled (step 327). Serial numbers are used to ensure that certificates are not counEerfeited, duplicated or lost. Each certificate has a serial number set by the OSC. The serial number in the IT corresponds to the last serial number sent to the 27 IT. The serial number is initialized in the secure hardware from the OSC as discussed above. When each certificate is received, the internal serial number is increased (step 331) by a predetermined amount. Typically, serial numbers may be increased by one, but other amounts could be used for further protection. If the certificate is determined to be authentic, then the internal monetary credits are increased by the amount of the credits in the certificate (step 333).
The monetary certificates can also be used to transmit new VET keys. When a certificate is received, the VET key is compared to the internal VET key (step 335). If it is different, then a new key is being provided. The system then stares the VET key along with the date of the certificate. The new VET key is used for VETs received after the certificate and until the next VET key change is made. Since VETs may be stored before being decrypted, the VET keys fro various dates can be stored in a memory 334 of the secure hardware. The certificate can also be used to adjust the block cost for creating VETs which are not from the OSC. The internal block costs is set to the received external block cost(step 338). The internal block cost is used in the VET processing as discussed above. Once the certificate has been fully processed, the processing ends.
Fig. 9 illustrates a second embodiment of the music distribution system according to the present invention. As in the first embodiment, this embodiment includes a global music distribution platform 908 which is an operational service center- The operational service center 908 can communicate to jukeboxes using a variety of mechanisms. For example, communications can be on telephone lines using a modem 911, through removable storage media 907,916, such. as diskettes, or through satellite 901 transmissions. with satellite transmissions, son gs and other 2 5 information can be transferred to a large number of jukeboxes simultaneously, reducing the total transfer cost per song. A stand alone/listen only jukebox 927 may 28 be connected to a satellite receive 919 to only receive satellite transmissions. it may not have direct communications to the operational service center 908.
Alternatively, a listen/talk jukebox 926 may receive songs through the satellite receiver 918 and may transfer information through a telephone line modem 917.
Typically, this connection would be a long distance telephone connection, which would be expensive for transmitting songs, but could be used for transferring playing data, which has a much smaller volume. Removable storage media 916, such as a diskette, can be used for communicating with a stand alone mail jukebox 925. the songs and the playing data can be transferred by mailing diskettes from the operational service center to the jukebox location where they are loaded by an operator.
The distribution costs for music and the collection costs for playing data can be further reduced by use of an operator region 902. One of the jukeboxes in the operator region 902 functions as a master jukebox 906. The master jukebox 906 operates in a manner similar to the regional operating service centers R1, R2 of the first embodiment of the invention illustrated in Fig. 1. In addition, the master jukebox 906 functions as a regular jukebox location. Thus, the master jukebox 906 can communicate with the operational service center 908 through any of the distribution types, including telephone line modems 910, removable storage 907, or satellite reception 903. In addition, the master jukebox 906 is connected through telephone line modems.910, 913, 914, 915 to a plurality of slave jukeboxes 922, 923, 924. Preferably, the slave jukeboxes 922, 923, 924 are located within a local calling region of the master jukebox 906. In this manner, the songs can be distributed less expensively from the master jukebox to the slave jukeboxes.
Alternatively, removable storage media 912 can be used for transferring songs to slave Jukeboxes 920,921. The communications between the slave jukeboxes and 29 the master jukebox can also be two way. In this manner, the information about playing of songs, and the selections for new songs can be transferred back to the master jukebox. From there it can be transferred to the operational service center 908. Although Fig. 9 illustrates a single level between the operational service center 908 and the master jukebox 906, any number of regional operational service centers or other master jukeboxes can be used in a hierarchical structure. Since each master jukebox will communicate with only a portion of the slave jukeboxes in the system, communications over telephone lines should be sufficient. A single phone line can provide 270 hours of communication per month. Assuming that the transfer of a song lasts approximately 20 minutes, a single phone line can distribute 2160 songs per month. The master jukebox 906 could provide an average of six new songs per month to 360 slave jukeboxes. With this number of songs, each stave jukebox may be assigned certain time slots for accessing the master jukebox.
When accessed, the slave jukebox can transfer the playing information to the master jukebox and download and necessary songs.
Fig. 9 also illustrates use of the present invention in connection with current jukebox technologies. Many jukebox operators may already have a significant inventory of compact disks on which a large portion of the music is stored. As illustrated in Fig. 9, a jukebox 927 can have an interface. for. connecting to a CD changer 928. The existing inventor of compact disks can be played in the CD changer. In addition to. selecting songs stored in the memory of the jukebox 927, the jukebox can be programmed to operate the CID changer through the inter-face.
Thus, if a user desires to listen to a song which is located on an existing CD inside the CD changer, the jukebox will provide a signal to the CD changer to select and play-jhe desired song. In order to operate with the CD changer, information about the CID's in the changer must be entered into the jukebox. A scanner 929 can be connected to the jukebox for scanning in album covers to be displayed during the selection process. A keyboard 930 can be used for entering song information, as well as the specific location of the CID's in the changer.
Having now described a few embodiments of the invention, it should be apparent to those skilled in the art that the foregoing is merely illustrative and not limiting, having been presented by way of example only. Numerous modifications and other embadiments are within the scope ofone of ordinary skill in the art and are contemplated as failing within the scope of the invention as defined by the appended claims.
Claims (1)
- What is claimed is:31 CLAIMS 1. A music distribution system. for local digital electronic jukeboxes comprising:a central storage location including available songs, graphics, and titles; a menuing system, said menuing system includes storing a portion of a menu at a local jukebox location and storing a complete menu at said central storage location; a communication means between said central storage location and said local jukeboxes; and a scheduler for coordinating transmission from said central storage location to said local jukeboxes; 2. A music distribution system for local digital electronic jukeboxes as claimed in claim 1, wherein said menuing system includes a statistical replacement algorithm for retrieving additional portions of a menu based upon local accesses to said local jukebox.lq 3. A music distribution system for local digital electronic jukeboxes as clailmed in claim 1, wherein said songs are placed on said local jukebox based upon user inquiries about availability.4. A music distribution system for local digital electronic jukeboxes as claimed in claim 1, wherein said music is retrieved by said local jukebox automatically based upon actual user preferences at a location.5. A music distribution system for local digital electronic jukeboxes as claimed in claim 1, wherein said scheduler arranges the broadcast. of songs simultaneously to a plurality of jukeboxes.32 6. A music distribution system for local digital electronic jukeboxes as claimed in claim 1, wherein said scheduler delays transmission of music within a requested time frame to improve transmission times and minimize costs.7. A music distribution system for local digital electronic jukeboxes as claimed in claim 1, wherein said transmission occurs automatically for noninteractive updates.8. A music distribution system for local digital electronic jukeboxes as claimed in claim 1, wherein said local jukebox includes an advanced payment system to allow automatic access to said central storage system.9. A method for selectively and optimally distributing music including the steps of: broadcasting a list of new available songs from a central storage location to a plurality of local jukeboxes; downloading said list into a local jukebox; capturing user demand in said local jukebox; processing said user demand statistically in said local jukebox; determining which new songs to download using results of said processing step; loading credits through payments in said local jukebox; downloading requested songs automatically.from said central storage location into said local jukebox; decreasing a number of credits corresponding to said downloading; and storing a portion of said available music locally.10. A method for selectively and optimally distributing music as claimed in claini 9, further including; 33 retrieving music from a hierarchy of classes of music, said hierarchy stored in its entirety in said central storage location, and a portion stored on said local jukebox.11. A method for selectively and optimally distributing music as claimed in claim 9, further including: deferring transmission of music based on local user needs; and transmitting music requested based on local user needs from said central storage location simultaneously to multiple jukeboxes when requested delivery times overlap.12. A method for optimally transmitting music selections in a music distribution system comprising:maintaining statistics in a digital electronic jukebox, regarding a number of times a node in a menu hierarchy is reviewed by a user; using said statistics to indicate when a node has been reviewed a predetermined number of times; sending a request automatically for updated music from said jukebox to a central storage location, based on said statistics determined in said jukebox; said receiving step further including transmitting music from said central storage location to a plurality of jukeboxes simultaneously; and storing a portion of said menu hierarchy at said jukebox.13. A method for optimally transmitting music selections in a music distribution system as claimed in claim 12, wherein said menu hierarchy includes levels for music types, subtypes, albums, and songs.14. A method for optimally transmitting music selections in a music distribution systems as claimed in claim 12, wherein said statistics represent actual user preferences at said jukebox location.34 15. A method for optimally transmitting music selections in a music distribution system as claimed in claim 12, wherein said transmitting is coordinated by delaying some transmission times within an acceptable time period and according to a schedule to increase transmission efficiency and minimize costs.16. A security system for a music distribution system having at least one distribution center and at least one jukebox comphsing:receiving means for receiving first data encrypted according in a first manner; first decryption means for decrypting said first data to create second data; encryption means for encrypting said second data in a second manner to create third data; second decryption means for decrypting said third data to generate fourth data.17. The security system of claim 16, wherein said fourth data can be executed to produce one of sounds, graphics, text and video images.1 18. The security system of claim 16, wherein said receiving m eans, first decryption means, encryption means and second decryption means are located in the at least one jukebox.19. The security system of claim 18, wherein said receiving means, first decryption means, encryption means and second decryption means are located in secure hardware in said at least one jukebox.20. The security system of claim 18, wherein the music distribution system includes a plurality of jukeboxes; wherein each jukebox includes a respactive receiving means. first decryption means, encryption means and second decryption means., and wherein the second manner used to encrypt said second data is different for each of said jukeboxes.21. The security system of claim 16 further comprising:second encryption means for encrypting data in said first manner to generate said first data; and transmission means for transmitting said first data.22. The security system of claim 21, wherein said second encryption means and said transmission means are located in the at least one distribution center.23. The security system of claim 22, further comprising:means for changing said first manner used to encrypt said data to create a new first manner used to data to be transmitted after said first manner is changed., means for transmitting a new first manner for encrypting data to said first decryption means.24. The security system of claim 23, wherein said first decryption means includes: means for determining when said first data is received; means for determining whether said first.data is encrypted in said first manner or in said new first manner based upon when said first data is received; and means for decrypting said first data based upon one of said first manner and said new first manner.25. The security system of claim 23, wherein said first decryption means includes means for receiving said new first manner, and means for verifying that said hew first manner is authentic.26. The security system of claim 16. further comprising:36 means for transmitting said second manner to said encryption means and said second decryption means., means for receiving said second manner; and means for verifying that said second manner is authentic.27. The security system of claim 16, wherein said first data includes a cost associated with said first data; wherein said first decryption means includes means for determining whether a credit is greater than said cost; and wherein said first decryption means decrypts said first data only when said credit is greater than said cost.28. The security system of claim 27, further comprising credit means for increasing said credit.29. The security system of claim 28, wherein said credit means includes: means for receiving an amount to increase said credit; means for determining whether said amount is authentic; and 15 means for increasing said credit if said amount is authentic. 30. A monolithic device for providing security in a system for distribution of electronic data packages comprising: a circuit for decrypting an electronic data package to generate a decrypted package; a circuit for encrypting a poffion of the decrypted package to generate an encrypted package; and a circuit for outputting said encrypted package.31. The monolithic device of claim 30, further comprising a circuit for determining whether a credit level exceeds a necessary credit level; and wherein said circuit for encrypting and circuit for outputting only execute if the credit level exceeds a necessary credit level.37 32. A monolithic device for providing security in a system for distribution of electronic data packages comprising:a circuit for decrypting and encrypted package to generate a decrypted package; a digital to analog conversion circuit for converting data in said decrypted package to analog data; and a circuit for outputting analog data.33. The monolithic device of claim 32, further comprising a circuit for decompressing said decrypted package to generate a decompressed package; and wherein said digital to analog conversion circuit converts data in said decompressed package to said analog data.34. A monolithic device for providing security in a system for distribution of electronic data packages comprising:an analog to digital conversion circuit for converting analog data to digital data; a circuit for encrypting the digital data generate a data package; and a circuit for outputting said data package.35. The monolithic device of claim 34, further comprising a circuit for compressing the digital data; and wherein said circuit. for encrypting encrypts 20 compressed digital data. 36. The monolithic device of claim 34, further comprising a circuit for determining whether a credit level exceeds a necess ary credit level; and wherein said circuit for encrypting and circuit for outputting only execute if the credit level exceeds a necessary credit level. 25 37. A monolithic device for providing security in a system for distribution of electronic data packages comprising:38 a circuit for decrypting a data package to generate a decrypted package;and a circuit for authenticating a source of the data package based upon data in the decrypted package.38. The monolithic device of claim 37, further comprising:a circuit for adjusting a credit level based upon data in the decrypted package and an output of the circuit for authenticating.39. A music distribution system comphsing:a central storage location including available songs; a plurality of computer jukeboxes; and at least one regional storage location communicating with the central storage location and the plurality of computer jukeboxes, the at least one regional storage location storing a portion of the available songs and transferring available songs to the computer jukeboxes.40. The music distribution system of claim 39, further comprising:a first communications system between said central storage location and said at least one regional storage location; and a second communications system between said at least one regional storage location and each of said plurality of computer jukeboxes.41. The music distribution system of claim 40, wherein said first communications system includes one of a satellite transmission system, a telephone line, and a mailed diskette.42. The music distribution system of claim 40, wherein said second communications system includes one of a satellite transmission system, a n5 telephone line and a mailed diskette.39 43. The music distribution system of claim 40, wherein said at least one regional storage location includes a master jukebox.44. A computer jukebox comprising:reception means for receiving songs from a central storage location; a memory for storing song; playing means for playing stored songs; an interface for outputting signals to control a compact disk change r.45. The computer jukebox of claim 44, further comprising; user selection means for selecting a song stored in one of said memory and on a compact disk in an attached compact disk changer; and means for outputting control signals to said compact disk changer through said interface to execute a selected song on a compact disk.%I 1 4-0 Amendments to the claims have been filed as follows CLAINTS 1. A security system for a content distribution system having at least one distribution center and at least one electronic content execution and reproduction device comprising:receivina mews for receiving first data encrypted in a first manner, first decrypdon mearis for decrypting the first data to create second data; encrypdon me=s for encrypting the second data in.a second manner to create third data; second decryption means for decrypdng the third data to generate fourth data 2. The security system of claim 1, wherein the at least one electronic content execution and reproduction device comprises at least one jukebox.3. The security system of claim 1, wherein the at least one electronic content execution and reproduction device compris es at least one computer.4. The security system of claim 1, wherein the at least one electronic content execution and reproduction device comprises at-least set-up box.5. The security system of claim 1, wherein the fburth data can be executed to produce at least one of: sounds, graphics, text and video images.20, 6. The security system of claim 1, wherein the fourth data can be executed by the at least one electronic content execution and reproduction device to reproduce a copy of content including at least one of the group consisting of sound, graD'hics,- text, and video images.7. The security system of claim 1, wherein the receiving means, first decryption mewns, encryption means and second decryption mcans are located in the at least one device.8. The secudty systern of claim 1, wherein the receiving means, first decryption mc-ans, encryption means, and second decryption means are located in a monolithic transaction deVice.9. The security system of claim 7, wherein the receiving means, first decryption means, encryption means and second decryption means are located in a secure device in tile at least one device.10. The security system of claim, 9, further comprising:means for aeneratina a first external key associated with the at least one electronic content execution and reproduction device., me= for generating a second external key associated With the secure device; means for encrypting the first external key, the second external key,. and a publicly- io known identifier associated with the secure device using an internal key associated with'the secure device to generate an initialization envelope; anid. means for delivering the initialization envelope to the secure device.11. The security system of claim 10, wherein the publicly-known. identifier.coTprises is a serial number of the secure device.12. The sectirity system of claim 10, further comprising. means for decrypting the initialization envelope. to recover the first external key, the second extemal key, and the publicly.known identifier.2Q 13. The security system of claim 12, further comprising: means for determlning whether the recovered second external key and the internal key are the same.14. The security system of claim 7, wherein the conlent disidbution systeni includes a pluralit y of devices; wherein each device includes a respective receiving means, first decryption means, encryption means and second decryption means; and wherein the second manner used to encrypt the second data is different for each of the devices.15. The security systernof claim 1, further comprising:second encryption means for encrypting data in the Eirst manner to generate the first data; and trarisrnission means for transmitting the first data.16. The security system of claim 1, further comprising: means for copying at least one of the first data, the second data, the third data, and the s fourth data- 17. The security system of claim 16, wherein the me= for copying compnses: means for COD rig at least one of the first data the second data, the third data, Yi and the fourth data only to storage devices that are authorized to store the at least one of the f=t dka, the io. second data, the third data and the fourth data- 18. The security system of claim 17,Wherein itid means for copying comprises: mearis.for copying at least one of the first data, the second data, the third ati, and the fourth data in exchange for monetary payments.19. 71e security system of claim 16, wherein the me= for copying comprises: means for executing at least one of the first d-ata the second data, the third data, and the fourth data only in playback devices that are authorized to execute the at least one of the first data, the second data, the third data and the fourth data. 2b 20. The security system of claim 19, wherein the means for executing comprises: means for executinat least one of the first data, the second data, the third data, and the fourth data Ln exchange for monetary payments.21. TIne security system of claim 15, wherein the second encryption means and the trarism ission means are located in the at least one distribution center.22. The security system of claim 21, flirther comprisL-ia:rneans for changing the first ma.,mer used to encrypt the data to create a new first manner used to generate data to be transmitted after the first manner is changed; nicans for transmitting a new first manner for encrypting data to the first decryption nicans.43 23. The security system of claim 22, wherein the Ent decryption means includes: means for determining when the first data is received; means for determining whether the first data is encrypted in the. first manner or in the new fu-st manner based upon when the first data is received, and means for decrypting the first data based upon one of the first manner and the new first mariner.24. The security system of claim 22, wherein the flist decryption means includes means for receiving the new first manner, and means for verifying that the new first'rnanner is 10 authentic.25. The'security system of.cfaim 1, further comprising: means for transmitting the second manner to the encryption means and the second decryption means; is m nnq-.for receiving the second manner, and means for verifying that the second manner is authentic.26. The security system of claim 1, wherein the first data includes a cost associated with the first data; wherein the.first decryption means. includes means for deteimining whether a 20 credit is greater than the cost; and wherein the first decryption means dec rypts the first data only when the crcd'it is greater than the cost.27. The security system of claim 26, further comprising credit means for increasing die credit.28. The security system of claim 27, wherein the credit means includes: means for receiving an amount to increase the credit; means for determining whether the amount is authentic; and means for increasing the credit if the amount is authentic.29. The security system of claim 1, further comprising:one-way communication me= coupled between the at least one distribution center and the at least one electronic content execution and reproduction device for transmitting the first C7 data from the at least one distribution center to the at least one electronic execution and reproduction device.30. A monolithic device for providing security.in a system for distribution of electronic data packages comprising:a device for decrypting an electronic data package to generate a decrypted package; a device for encrypting a portion of the decrypted package to generate an encrypted package; and a device for outputting the encrypted package.31. The monolithic device of claim 30, flirther comprising a device for detennining whether a credit level exceeds a necessary credit level; and 13 wherein the device for encrypting and device for outputting only execute if the credit level exceeds a necessary credit level.32. A monolithic device for providing security in a systera for distribution of electronic data packages comprisina a device for decrypting an encrypted package to generate a decrypted package; a digital to analog conversion device for converting data in the decrypted package to analog data; and a device for output' ring analog data 33. The monolithic device of claim 32, further comprising.a device for r_eproducing the decrypted package.34. The monolithic device of claim 32, further comprising a device for decompressing the decrypted package to generate a decompressed package; and wherein. the digital to analog conversion device converts data in the decompressed package to the analog data.35. The monolithic device of claim 34, further comprising a device for reproducing the decompressed package.36. A monolithic device for pro.viding security in a system for distribution of electronic data packages comprising: an analog to digital conversion device for converting analog data to digital data; a device for encrypting the digital data generate a data package; and a device for outputting the data package.37. The monolithic device of claim 3 6, fdrther comprising a device for compressing the digital data; and wherein the device fbr encrypting_!incrypts compressed digital data.38. The monolithic device of claim 3 6,- further comprising a device for determining whether a credit level exceeds a necessary credit level; and wherein the device for encrypting and device for outputting only execute if the credit_ level exceeds a necessary credit level.39. A monolithic device for providing security in a system for distribution of electronic data packages comprising:a device for decrypting a data package to generate a decrypted package; and a device for authenticating a source of the data package based upo'n data in the decrypted package.40. The monolithic device of claim 39, further C'ompdsing:a device for preventing rcuse of tlic electronic data packa,,,,es.41. The monolithic device of claim 39, further comprising: a device for adjusting a credit level based upon data in the decrypted package and aii output of the device for authenticating.42. A content distribution system for local digital electronic content execution and reproduction devices, the systcrn comprising:0 a central storage location including available content, wherein the central stora-C location includes means to selectively encrypt the content; a menuing system, the menuing systern. includes storing a portion of a menu at a local device location, wherein the local device location is separate from the central. storage location, and storing a complete menu at the central storage location; a communication means between the central storage location and die local devices, wherein the local devices download desired information automatically during a broadcast from the central storage location; and a scheduler for coordinating, t-mismission from the central storage location to the local 10 devices.43- The content distribution system of claim 42, wherein the local digital electronic content execution and reproduction devices comprise computers.is 44. The content distribution system of claim 42, wherein the local digital electronic content execution and reproduction devices cornprisejukeboxe-s.45. The content distribution system of claim 42, wherein the local digital electronic content execution and reproduction devices comprise setup boxes.46. The content distribution system of claim 42, wherein the content comprises at least one of sounds, text graphics, video images, music, and songs.47- The content distribution system of claim 42. flirther including:a data structure that relates similar conte nt, wherein the sirrular content has a high probability of being preferred by users of a particular location.48. The content distribution system of claim 47, wherein the probability is defined by a local device.ined by 49. The content distribution system of clairn 47, wherein the probability is def a centrul storage system.4.7 SO. The content distribution system of claim 42, wherein the scheduler arranges the broadcast of songs automatically based on at least one of. user preferences at a device location, anticipated use of similar content which is a vailable an the local device, local content menu profiles and content ' automatically transmitted from the central storage location to the local device without a request 51. The content distribution system of claim 42, wherein the scheduler accumulates requests for each different content within a time period defined in the request, and wherein one io broadcast is performed for the combination of the accumulated requests.52.. The content distribution system of claim 42, wherein the content is placed on the Vic local de 4 c based upon user inquiries about availability.53. The content distribution system of claim 42, wherein the scheduler a=ges the broadcast of content simultaneously to a plurality of devices.54. The content distribution system of claim 42, wherein the scheduler. delays transmission of content within a requested time frame to improve transmission tinies and minimize costs.55. The content distribution system of claim 42, wherein the transmission occurs automatically for non-interactive updates.56. The coment distribution system of claim 42, wherein the local device includes. an advanced payment system to allow automatic access to the central storage system.57. The content distribution system of claim 42, wherein the menuing system includes a statistical replacement algorithm for retrieving additional portions of a menu based upon local accesses to the local device.1 58. The content distribution systern of claim 57, wherein the local accesses to the Local device define a mix of content categories in which a percentage of content for a given category is determined by user preferences.59. The content distribution system of claim 42, wherein the local devices initiate communication with the central storage location arid the content is retrieved by the local devices automatically based upon actual user preferences at a device location, 60. 1 The content distribution system of claim 59, wherein the content is retrieved in io,advance of an automatic update based on an anticipated use of similar content which is locally accessed content, local content menu profiles and content automatically tmuraitted from the central storage location to ti local device without a request 61. A method for optimally t=mittmg content selectidns in a content distribution i s system comprising:maintaining statistics in a digital electronic content execution and reproduction device regarding a number of times a node in a menu hierarchy is reviewed by a user, using the statistics to indicate wen a node has been reviewed a predetermined number of times; sending a request automatically for. updated content from the device to a central storage location, based an the statistics determined in the device; encrypting the content and credits in the central storage location; receiving requested content within a timie period specified in the request, at the device; the receiving step further including transmitting content from the central storage location to a plurality of devices simultaneously; and storing a portion of the menu hierarchy at the device.62, The method of claim 50, wherein the content comprises at least one of sounds, text graphics, vid.-o images, music, and songs. 63. The melhod of claim 6 1, further comprising steps of:receiving first music encrypted in a first manner; L+. Cl storing the first content in the music-playing device; decrypting the first music in a secure device within the digital electronic content execution and reproduction device to create second content; encrypting the second content in a secure device within the diaital electronic content s execution and reproduction device; storing the first and second content in the digital electronic content execution and reproduction device; decrypting the second content in the secure device to create third content; playing the third content; reproducing the third content; and reproducing the second content.64. The method of claim 61, wherein the digital electronic. content execution and reproduction device comprises ajukebox.65. The method of claim 61, wherein the digital electronic content execuon and reproduction device comprises a computer.66. The method of.clairn 61, wherein the digital electronic content ex" ecufioa and reproduction device comprises a set-up box.67. The method for optimally transmitting content selections of claim 62, 'whercin the menu hierarchy includes levels for music types, subtypes, albums, and songs.68. The method for optimally transmitting content selections of claim 61, wherein the statistics represent actual user preferences at the device location.69. The method for optimally transmitting content selections of claim 61,, vherein the transmitting is coordinated by delaying transmission times of a portion of the requested content within a delay time period de5ned in the request and.according to a sch edule -zo increase transmission effliciency and minimize costs.70. The method for optimally transmitting content selections of claim 61, further comprising:broadcastinc, a list of new available content forn a central storage location to a plurality of local electronic content execution and reproduction devices; downloadina the list into a local device; downl oading requested content automatically during the broadcasting from the central storage location into the local device; loading credits through payments in the local device; de--reasiz. a number of credits corresponding to a number of downIoaded content. 10 71. The method of claim 70, wherein the electronic content execution and reproduction devices comprise jukeboxes.72- The method of claim 70, wherein the electronic content execution and is reproduction devices comprise computers.73. -ac method of claim 70, wherein the electronic content execution and reproduction devices comprise set-up boxes.74. The method 'Lar optimally transmitting content selections of claim 6 1, wheriein the content is retrieved from a hierarchy of classes of content, wherein the hierarchy is stored in its entirety in the central storage location.75. The method for optimally transmitting content selections of claim 61, fin-ther including, deferring tran smission of content based on local user needs; and tr=mitting content requested based on local user needs from the central storage location simultaneously to multiple devices, when requested delivery tirnes overlap.76. The method for optimally transmitting content selections of claim 61, whel-eln the central storage location enables and disables the local device.77. A content distribution system comprising:a central storage location including available content, wherein the central storage location includes means to selectively encrypt the content; a plurality of local electronic content execution and reproduction devices separate from 5 the central storage location; and at least one regional storage location separate from and communidting with the central storage location and the plurality of local electronic content execution and reproduction devices, the at least one regional storage location storing a portion of the available songs and transferring available songs to the computer devices.10, 78. - The content distribution system of claim 77, wherein the content comprises at least one of sounds, text, grapHcs, video images, music, and songs.79. The content distribution system of claim 77, wherein the plurality of local electronic content execution and reproduction devices comprises a plurality ofjukeboxes.80. The content distribution system of claim 77, wherein the plurality of local electronic content execution and reproduction devices comprises a plurality of computers.81. The content distribution system a f claim 77, wherein the plurality of local electronic content execution and reproduction devices comprises.a plurality of set-up boxes.82. The content distribution system of claim 17, fluther comprising:a first communications system between the central storage location and the at least one regional storage location; and a second communications system between the at least one regional storage location and each of &,e plurality of computer devices.83. The content distribution system of claim 77, wherein th c first communications ystern includes one of a satellite transmission system, a telephone line, and a mailed diskerte.84. The content distribution system of claim 77, wherein the second communications system includes one of a satellite transmission system, a telephone line, and a mailed diskette.85. The content distribution system of claim 77, wherein the at least one regional 5 location includes means to selectively encrypt the content- 86. The content distribution system of claim 77, wherein the at least one regional storage location includes a rna er computer device.10, 87. A computer jukebox comprisinT.reception means-for receiving songs from a central storage location, wherein the central storage location includes means to selectively encrypt the content, a memory for storing content; playing means for playing stored content; an interface for outputting signals to control a compact disk changer to select and play desired content.88. The computer jukebox of claim 87, further comprising: user selection means for selecting content stored in one of the memory and on a compact disk in an attached compact disk changer, and means for outputting control signals to the compact disk changer through the interface to execute selected content an a compact disk.89. A security system for a content distribution system having at least one distribution center and at least electronic content execution and reproduction device, Lie system comprising; content stored n an encrypted format in the at least one device; monolithic device in the at least one device; and monoLithic decryption device in the at least one device.90. The security system of claim 89, wherein the at least electronic content execution and reproduction device comprises at least one computer5-3 91. The security system of claim 89, wherein the at least electronic content execution and reproduction device comprises at least one jukebox.92. The security system of claim 89, wherein the at least electronic content execution 5 and reproduction device comprises at least one set-up box.93. The security system of claim 89, wherein the content comprises at least one of sounds, text, graphics, video images, music, and songs.10,', 94. The security system for a content distribution system of claim 89, fin-ther including:an exteffial key for the at least one device; an external key for encryption and decryption device; an external identifier for the at least one device; and is an internal key for the encryption and decryption dev ice.95. A method for securing a content distribution system having at least one distribution center and at least one electronic content execution and reproduction device, the method comprising steps of.%20 storing at least some content in an encrypted fbrmat in the at least one device; decrypting the at least some content using secure device in the at least one'device; determining wliether a credit level in the at least one device is greater than a cost for executing and reproducing the at least some content; and encrypting the at least some content with the secure device when the credit level is greater than the cost.96. The method of claim 95, wherein the at least one electronic content execution and reproduction device comprises at least one computer.97. The method of claim 95, wherein the at least one electron ic content execution and reproduction device comprises at least one jukebox.54 98. The method of claim 95, w herein the at least One electronic content execution and reproduction device comprises at least one set-up box.99. The method of claim 95, wherein the at least one content comprises at least one of s the group comprising sounds, text, graphics,' video images, music, and songs.100. The method for securing a content distribution system of claim 95, further comprising the step of.terminating the step of decrypting when the credit level is less than the cost 101. The method for securing a content distribution system of claim 95, flirther comprising the steps of.creating a first copy of the at least some content in the encrypted format, wherein the first copy is in an encrypted or decrypted format; and creating a new copy of the first copy, wherein the new copy is In an wicrypted or decrypted formal
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/833,265 US5959945A (en) | 1997-04-04 | 1997-04-04 | System for selectively distributing music to a plurality of jukeboxes |
GB9923422A GB2339325B (en) | 1997-04-04 | 1998-04-03 | System for selectively distributing music |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0113768D0 GB0113768D0 (en) | 2001-07-25 |
GB2360679A true GB2360679A (en) | 2001-09-26 |
GB2360679B GB2360679B (en) | 2001-12-12 |
Family
ID=26315975
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0113768A Expired - Fee Related GB2360679B (en) | 1997-04-04 | 1998-04-03 | System for selectively distributing music |
GB0124141A Expired - Fee Related GB2364430B (en) | 1997-04-04 | 1998-04-03 | System for selectively distributing music |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0124141A Expired - Fee Related GB2364430B (en) | 1997-04-04 | 1998-04-03 | System for selectively distributing music |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2360679B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1659588A1 (en) * | 2004-11-17 | 2006-05-24 | Sony Corporation | Content use system, recording apparatus, reproducing apparatus and system control method |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7920901B2 (en) | 2007-02-28 | 2011-04-05 | Research In Motion Limited | System and method for providing visual indicators in a media application |
EP1970909B1 (en) | 2007-02-28 | 2015-04-29 | BlackBerry Limited | System and method for providing visual indicators in a media application |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0678851A1 (en) * | 1994-04-18 | 1995-10-25 | Rolf Brugger | Apparatus for the distribution of musical information in digital form |
EP0710025A1 (en) * | 1994-10-28 | 1996-05-01 | Sony Corporation | Digital signal transmitting methods, digital signal receiving apparatus, and recording media |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5355302A (en) * | 1990-06-15 | 1994-10-11 | Arachnid, Inc. | System for managing a plurality of computer jukeboxes |
AU8073291A (en) * | 1990-06-15 | 1992-01-07 | Arachnid Inc. | System for remoting managing a plurality of computer jukeboxes at different locations from a centralized location |
-
1998
- 1998-04-03 GB GB0113768A patent/GB2360679B/en not_active Expired - Fee Related
- 1998-04-03 GB GB0124141A patent/GB2364430B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0678851A1 (en) * | 1994-04-18 | 1995-10-25 | Rolf Brugger | Apparatus for the distribution of musical information in digital form |
EP0710025A1 (en) * | 1994-10-28 | 1996-05-01 | Sony Corporation | Digital signal transmitting methods, digital signal receiving apparatus, and recording media |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1659588A1 (en) * | 2004-11-17 | 2006-05-24 | Sony Corporation | Content use system, recording apparatus, reproducing apparatus and system control method |
US7843772B2 (en) | 2004-11-17 | 2010-11-30 | Sony Corporation | Content use system, recording apparatus, reproducing apparatus and system control method |
Also Published As
Publication number | Publication date |
---|---|
GB2364430A (en) | 2002-01-23 |
GB2364430B (en) | 2002-03-13 |
GB0124141D0 (en) | 2001-11-28 |
GB2360679B (en) | 2001-12-12 |
GB0113768D0 (en) | 2001-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5959945A (en) | System for selectively distributing music to a plurality of jukeboxes | |
CA2201914C (en) | Method of communication for an intelligent digital audiovisual playback system | |
EP0934565B1 (en) | A digital information library and delivery system | |
EP1025498B1 (en) | Method and apparatus for targeting a digital information playback device | |
US9197914B2 (en) | Method for the distribution of audio-visual information and a system for the distribution of audio-visual information | |
US20040267880A1 (en) | System and method for delivery of media content | |
WO2006053302A9 (en) | A digital information library and delivery system | |
US20090222864A1 (en) | Apparatus and Method For Interactive Digital Media Content Requests | |
US20020198958A1 (en) | System and method for the delivery of information | |
JP2008250994A (en) | System for distributing file containing digital data using computer network | |
GB2360679A (en) | Security system for jukeboxes | |
GB2364431A (en) | System for selectively distributing music | |
MXPA97007917A (en) | System to distribute musica selectivame | |
EP1096749A2 (en) | Information distribution system | |
CA2547473C (en) | A digital information library and delivery system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20120802 AND 20120808 |
|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20170403 |