US20190297369A1 - Method and apparatus for on demand video and other content rental - Google Patents
Method and apparatus for on demand video and other content rental Download PDFInfo
- Publication number
- US20190297369A1 US20190297369A1 US16/387,452 US201916387452A US2019297369A1 US 20190297369 A1 US20190297369 A1 US 20190297369A1 US 201916387452 A US201916387452 A US 201916387452A US 2019297369 A1 US2019297369 A1 US 2019297369A1
- Authority
- US
- United States
- Prior art keywords
- content
- time
- period
- decryption key
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims description 29
- 230000004044 response Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 4
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 230000008569 process Effects 0.000 description 9
- 238000012546 transfer Methods 0.000 description 7
- 239000000463 material Substances 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/437—Interfacing the upstream path of the transmission network, e.g. for transmitting client requests to a VOD server
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47202—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/61—Network physical structure; Signal processing
- H04N21/6106—Network physical structure; Signal processing specially adapted to the downstream path of the transmission network
- H04N21/6125—Network physical structure; Signal processing specially adapted to the downstream path of the transmission network involving transmission via Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/61—Network physical structure; Signal processing
- H04N21/6156—Network physical structure; Signal processing specially adapted to the upstream path of the transmission network
- H04N21/6175—Network physical structure; Signal processing specially adapted to the upstream path of the transmission network involving transmission via Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/165—Centralised control of user terminal ; Registering at central
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17318—Direct or substantially direct transmission and handling of requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Definitions
- This invention generally relates to video on demand and more specifically to controlling use of video on demand content.
- Video on demand is a well-known technology. It generally allows users to select and watch digital video content over a network, such as cable TV, as part of an interactive television system.
- VOD systems either stream content allowing viewing in real time or download it in which the program is brought in its entirety to a set top box in the cable television context before viewing starts.
- Most current video on demand systems are in the context of cable and telephone company or satellite television distribution systems. In most of these systems the user buys or selects a movie or television program and it begins to play in the television set almost immediately. Typically a payment must be made for each viewing.
- the commerce-related part of the transaction is similar to renting a video since viewing is strictly limited in terms of time and/or number of viewings.
- viewing is strictly limited in terms of time and/or number of viewings.
- Such video on demand systems are very limited in terms of user control and access and they typically require viewing to begin immediately upon purchase. This is due to the inherent limitations of the delivery system and the user's device which is typically a cable television set top box or equivalent.
- a video on demand system is provided, not in the context of cable television, but instead in the computer network (Internet) context. It is known of course to purchase (or obtain without payment) video and audio material from a website via the Internet, which is then downloaded partially or in its entirety to the user's device typically a personal computer, or consumer electronics device such as an iPod or Apple TV device or other such device. If these are purchases the viewer then owns the content and can view it as many times as he wants indefinitely.
- Internet computer network
- a video on demand approach is used in which the user rents use of the audio or video material for a limited time for a fixed payment and then can view the rented content at the time and place of his choosing using his consumer electronics device, such as an Apple TV or iPod device.
- his consumer electronics device such as an Apple TV or iPod device.
- Some such devices may require connection to the Internet via a host computer.
- the present system supports movie rental from, for instance, the Apple iTunes Store which is a central website, providing content. Users are able to rent movies or other video material and view it on their Apple TV or iPod device.
- the material may be transferred from one client (user) device to another.
- a 30-day or other defined time period begins. The material may be viewed and/or listened to any time during that 30-day time.
- any time during that 30-day time when the viewer actually plays the material a 24-hour window begins during which unlimited viewing is permitted. However once that 24-hour window has ended no more viewing is permitted.
- the present system supports both high definition television and standard definition television.
- each individual program has its own assigned rental period both in terms of the overall time of rental such as the 30-day time span and also the 24-hour window.
- FIG. 1 shows the environment in which the present system operates.
- FIG. 2 shows a flowchart showing the process of renting a movie in this example.
- FIGS. 3A-3E shows various timelines for renting and viewing a movie under different circumstances.
- FIG. 1 shows the environment in which the present system operates. Most elements here are conventional and hence not explained in further detail.
- a digital video on demand delivery service such as the iTunes Store 12 in one embodiment, more broadly a set of content and commerce servers operated by a commercial entity for storing (or accessing) a number of programs and/or movies and/or audio items such as music.
- This element 12 of the system is conventional since for instance such stores or more broadly content storage facilities already exist.
- the iTunes Stores 12 is conventionally coupled to the Internet 14 .
- client device 18 indicated here as an Apple TV device, but which might be an Apple iPod device (with its host computer) or similar consumer electronic devices or computers available from other manufacturers and which are currently available.
- Each such device 18 has as shown here a global universal identifier GUID 20 which identifies that particular device.
- DRM digital rights management
- Such servers already exist in the content of present video and audio downloads and viewing services.
- Digital rights management refers to the policy enforcement for protecting the content from unauthorized use. Typically this involves some form of encryption.
- the content is transferred from the iTunes Store 12 or other source to the client device 18 in encrypted form and must be decrypted at the client device 18 .
- Some such encryption schemes are sophisticated. For instance typically the encryption applied to each particular content transfer is different. Also the decryption keys supplied may be useful only for a small portion of each piece of content. In this case what is referred to as a key bag or a file is provided as part of the DRM file holding a number of keys for decrypting the content.
- the encryption may be symmetric or asymmetric (public key-private key) as known in the field.
- security information is provided in the form of a set of DRM data transferred along with or associated with the downloaded encrypted content and is necessary for decrypting and viewing same.
- the DRM data includes conventionally data defining a security policy associated with that content item, restricting a number of available plays and device transfers.
- the commerce aspect of ordering the content by the client device 18 is shown by the “rental order” from the client device and is received via the Internet 14 at the iTunes Store 12 which charges the user of the client device 18 the appropriate rental to a credit card or other account.
- the iTunes Store 12 provides the “encrypted content” or asset along with at the same time or a later time the relevant DRM data which is transferred to the client device 18 .
- the encrypted content is downloaded from the iTunes Store 12 to the client device 18 first, without the DRM data (including the key bag) needed to play the content.
- the DRM data is transmitted later, usually in response to the play request by the user, including the key bag as explained further below.
- a content rental database and logic 26 is also shown here.
- This element here is not present in conventional audio/video content purchase systems. Its operation is explained further below, but essentially it controls delivery of the relevant DRM data as so as to enforce the rental time limits. It may be resident on its own server or part of the iTunes Store server(s) 12 .
- FIG. 2 shows in a flowchart the overall digital rights management for a rental in accordance with this disclosure using the FIG. 1 system.
- the initial action 32 here is that the movie (content) download is initiated to the user device 18 (after of course the ordering procedure has been completed and the content encrypted.).
- the next step 34 it is determined if at the present time the download has been completed. This is a query made for instance every 5 seconds. If before the download is completed (“No”) the user has clicked “play” on his user device 18 , that is he wants to start playing, the download is continued during playing.
- the next step 40 is that at some time after the download begins and after beginning of the 30-day period, the user does decide to play the content. This condition is checked periodically such as every 1 second. If at any particular time the user has not selected play, it is determined in the next step 42 if the 30 day token has expired. If “No”, control returns to the “user clicks play” step 40 . If “Yes” at 42 , the movie playback is disabled at the next step 46 because the 30-day rental time has expired. If the user however clicks play at 38 then the 24-hour window key or token is initiated at 48 at the content rental database. This begins the 24-hour viewing window. This is checked whether the user clicks play during the download or after the download. Then it is checked periodically at 50 such as every 5 seconds if the 24-hours since the play was initiated has expired. If “No”, play is resumed. If “Yes”, the movie playback is disabled at the next step 46 .
- the user has 30 days to view the movie after the download begins.
- this time is a variable designated the rental duration.
- the user also has 24 hours in this example to view the movie after initiating the first play. (The 24 hours here is only exemplary.)
- This variable is designated playback duration.
- Both of these variables may be unique to each asset as determined by the system operator and entered into the content rental database 26 for each content item. Generally after the 30-day or 24-hour periods have expired, the item becomes unplayable due to expiration of its token. However if the time limit is hit while the movie is still playing, the play will not be interrupted. Generally the play will be allowed to finish, that is one can finish watching the movie as long as the movie is not stopped or paused by the user for the remainder of the movie.
- a pause function There is also provided generally both in the user device 18 and in terms of the tokens a pause function. That is one may pause viewing and this also stops the tolling of the 24-hour time limit.
- the pause time limit is for example 12 hours or for instance a number of times of the actual movie duration.
- FIGS. 3A-3E Various time lines or scenarios for various circumstances of operation of the FIG. 2 method are shown in FIGS. 3A-3E which are largely self-explanatory.
- the horizontal line represents the passage of time.
- Exemplary dates and times of day are shown for purposes of illustration.
- the first action at point 1 is that the user makes rental and the 30-day rental time begins.
- the customer actually starts to view (play) the movie and the 24-hour viewing window begins.
- There is unlimited playback allowed during this 24-hour window that is one may watch the movie or other item as much as one wants and as many times as one wants within the 24 hour window.
- the 24 hours expires at point 3, in this case 24 hours after the initialization of play.
- the 30 days expires as shown at point 4. Of course in the typical situation the 30 day limit will not be relevant unless the 24 hours begins in the last day of the 30-day window.
- FIG. 3B shows a similar situation as FIG. 3A except that in this case the customer starts viewing the movie at 2 during the download (which may take for instance 30 minutes). Obviously in this case the 30-day rental window at 4 is irrelevant. Note that typically downloading movies takes a considerable amount of time due to the large amount of digital information involved. In this case, the movie viewing window expires at 3 24 hours after the beginning of the viewing time.
- FIG. 3C shows the more complex situation where there is a pause involved as an example of an implementation of the present method.
- pauses are initiated by the viewer when he wants to stop viewing and do something else and return to viewing later.
- the download is initiated and the 30-day window begins.
- the user begins to view the movie and his 24-hour window begins. Again he has unlimited playback during this 24-hour window.
- the customer pauses the movie. In this case, he pauses it for two days until point 4 where he pushes the play button on his consumer electronics playback device and resumes viewing.
- FIGS. 3D and 3E illustrate the situation where the viewing only begins in the last 24 hours of the 30-day window.
- the customer initiates the download and the 30-day rental window begins. The customer however only starts to view the movie at point 2, 29 days into the 30-day rental window.
- the 24-hour viewing window starts immediately.
- the customer stops the movie. Normally the viewing period would have ended at point 4, which is the expiration of the 30-day window.
- the customer attempts to resume watching the movie, but since the 30-day window expired he cannot watch it anymore.
- the 24-hour token may be allowed to dominate in which case viewing may be continued as along as it is completed within 24 hours of point 4. This would result in viewing terminating at point 5 in any situation.
- FIG. 3E shows a variation on FIG. 3D where at point 1 the customer initiates the download and the 30-day rental period starts. At point 2, the customer starts to view the movie in the 29th day of the 30-day rental period. The 24-hour viewing window starts immediately. At point 3, the customer pauses the movie and leaves his playback device on pause. Normally at point 4 the 30-day rental period would initially have ended. At point 5, the 24-hour window would have ended. However at point 6, the customer resumes play by pushing the play button on his device. In this case, the 24-hour window has expired but the user may view the remainder of the movie as long as the movie is not paused or stopped again. The movie-watching period expires immediately after play is completed.
- the content item may be transferred by the user from one consumer electronics device to another as explained further below. However the 30-day time period and 24-hour window still obtain.
- This entity is a set of data for each rental transaction, and includes the following: a rental identification (rentalid) which is a unique identifier assigned by the content rental database to each rental transaction; an account identifier which is an identifier for each user's iTunes account assigned by the iTunes Store; an identifier for the particular content item (program or movie) being rented; and other DRM specific data, including the conventional key bag.
- a rental identification (rentalid) which is a unique identifier assigned by the content rental database to each rental transaction
- an account identifier which is an identifier for each user's iTunes account assigned by the iTunes Store
- an identifier for the particular content item (program or movie) being rented and other DRM specific data, including the conventional key bag.
- This rental bag is illustrated in FIG. 1 and its use explained further below.
- Deauthorization occurs when a user who has rented a content item purchases a new computer or playback device and wishes to transfer the rented item to the new computer or device.
- Check in is associated with deauthorization. Briefly, a transfer involves checking in the rental item (to the content rental database) and then subsequently checking the same item out to the new (or another) device.
- check in occurs when a user deauthorizes his old computer or device in favor of a new one, or when he transfers an asset (content item) from one device to another, such as from his computer to his iPod.
- a check in is followed by a check out, to the new or other device.
- the iTunes client software (which is inherently resident in the iTunes client device 18 ) passes the rental bag, via the iTunes Store 12 , to the content rental database and logic 26 .
- the content rental database and logic 26 (hereinafter “rental database”) checks whether the rental bag is eligible for check in. If not, an error indication is returned to the iTunes client. If eligible, the rental database sends the rental bag to the DRM server 24 .
- the DRM server 24 processes the rental bag and extracts from it and returns to the content database 26 the rentalid, the date of the first playback of the content item, and the user account identifier.
- the rental database checks in the item then indicating the rental is terminated. In other words, it renders that content item (as still resident on the iTunes playback device 18 but in encrypted form) no longer playable.
- the rental database then sends the updated rental bag back to the iTunes client device 18 .
- the check out process occurs more frequently. Not only is it used as the second part of a transfer to complete the transfer, it is also invoked for each new rental (content item download.) Also, the check out process is invoked in the case when the client device 18 attempts to play a content item but does not have the requisite rental bag for decryption. For instance, this happens when the user attempts to play the item during the initial download.
- the check out process first requires the iTunes client device 26 to pass a rental bag (one received earlier by the client in a prior rental transaction) to the database 26 . Also sent is the client device GUID 20 . The database 26 sends this data on to the DRM server 24 .
- the DRM server 24 processes the rental bag and returns to the database 26 the rentalid, the first playback time and date of the content item, and the user account identifier.
- the database 26 checks in response whether the rental bag is eligible for check out. If ineligible, and error message is returned to the iTunes client device 18 . If eligible, the database 26 sends to the DRM server 24 the original rental bag and the new data associated with the current content item being check out. This data includes the rental id, key(s), rental expiration date (30 days) and rental duration date (24 hour period).
- the DRM server 24 in response formulates an updated rental bag with the data associated with the current content item being checked out, and send this updated rental bag to the database 26 .
- the database 26 then associates the GUID (global universal identifier) and the rentalid of the updated rental bag in its database, thereby rendering that content item playable upon that device 18 .
- the database 26 then sends the updated rental bag to the client device 18 .
- a security check procedure to attempt to defeat hackers, who try to use the system in unauthorized fashion, such as tampering with the content. This procedure is invoked for both check in and check out and does require initially detection by the system of tampering; this detection is part of the DRM process.
- an element (“flag” in software terminology) is provided in the DRM data indicating the possible detected tampering.
- the content database then sends the rental bag to the DRM server with this indication.
- the DRM server determines if there has been in fact tampering, and if so sends an indication (another flag) back to the content database.
- the content database maintains a flag counter for this type of flag for each item, and increments the counter upon receipt of each such flag. If the counter value exceeds a predetermined threshold, then that rentalid is excluded so that content item for that device is rendered unplayable. A warning or notice may be provided to the user at this point.
- check out is modified so that when the content database checks whether the rental bag is eligible for check out, if it determines that the content item is already checked out to that GUID, then the transaction is excluded. Further, if the flag counter value for the rental is greater than the threshold, the transaction is excluded as above. If the value of the flag counter is below the threshold, the content is allowed to be played but the counter value is incremented. Again, a warning or notice may be provided to the user.
- two embodiments are provided for respectively higher/lower levels of security.
- the relevant key bag for the entire rented item is downloaded to his client device and stored there. He can then play the content, even if thereinafter his client device is no longer in communication with the iTunes Store (e.g., the client device is no longer connected to the Internet).
- the keys are downloaded only as needed for each portion of the rented item, so the client device must remain in communication with the iTunes Store.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A video on demand system in the context of the Internet, for video rentals. A user accesses an on-line store to rent a video program or movie. The rental is for a limited time (such as 30 days) and within that thirty days, the video program or movie can only be viewed for a 24 hour time window. The time limits are enforced by the on-line store which maintains a database of each rental transaction and allows supply of the needed keys for decrypting the (encrypted) video or movie only if within the time limits.
Description
- This application claims priority to U.S. provisional application 61/010,763, filed Jan. 11, 2008 incorporated herein by reference in its entirety.
- This invention generally relates to video on demand and more specifically to controlling use of video on demand content.
- Video on demand is a well-known technology. It generally allows users to select and watch digital video content over a network, such as cable TV, as part of an interactive television system. VOD systems either stream content allowing viewing in real time or download it in which the program is brought in its entirety to a set top box in the cable television context before viewing starts. Most current video on demand systems are in the context of cable and telephone company or satellite television distribution systems. In most of these systems the user buys or selects a movie or television program and it begins to play in the television set almost immediately. Typically a payment must be made for each viewing.
- Typically in the video on demand context, the commerce-related part of the transaction is similar to renting a video since viewing is strictly limited in terms of time and/or number of viewings. In some video on demand systems for instance one may watch the video as many times as one wants, but only beginning for a period of 24 hours beginning when the rental is made. Such video on demand systems are very limited in terms of user control and access and they typically require viewing to begin immediately upon purchase. This is due to the inherent limitations of the delivery system and the user's device which is typically a cable television set top box or equivalent.
- In accordance with this disclosure, a video on demand system is provided, not in the context of cable television, but instead in the computer network (Internet) context. It is known of course to purchase (or obtain without payment) video and audio material from a website via the Internet, which is then downloaded partially or in its entirety to the user's device typically a personal computer, or consumer electronics device such as an iPod or Apple TV device or other such device. If these are purchases the viewer then owns the content and can view it as many times as he wants indefinitely. However in the context of the system disclosed here, instead a video on demand approach is used in which the user rents use of the audio or video material for a limited time for a fixed payment and then can view the rented content at the time and place of his choosing using his consumer electronics device, such as an Apple TV or iPod device. Some such devices may require connection to the Internet via a host computer.
- Hence in one embodiment, the present system supports movie rental from, for instance, the Apple iTunes Store which is a central website, providing content. Users are able to rent movies or other video material and view it on their Apple TV or iPod device. In some embodiments, the material may be transferred from one client (user) device to another. Typically upon purchase of the audio or video asset (program or movie and also referred to as content), a 30-day or other defined time period begins. The material may be viewed and/or listened to any time during that 30-day time. In addition, any time during that 30-day time when the viewer actually plays the material, a 24-hour window begins during which unlimited viewing is permitted. However once that 24-hour window has ended no more viewing is permitted. Of course these time limits are merely illustrative. In one embodiment, the present system supports both high definition television and standard definition television. In one embodiment, each individual program has its own assigned rental period both in terms of the overall time of rental such as the 30-day time span and also the 24-hour window.
-
FIG. 1 shows the environment in which the present system operates. -
FIG. 2 shows a flowchart showing the process of renting a movie in this example. -
FIGS. 3A-3E shows various timelines for renting and viewing a movie under different circumstances. -
FIG. 1 shows the environment in which the present system operates. Most elements here are conventional and hence not explained in further detail. At the head end, there is a digital video on demand delivery service such as the iTunes Store 12 in one embodiment, more broadly a set of content and commerce servers operated by a commercial entity for storing (or accessing) a number of programs and/or movies and/or audio items such as music. Thiselement 12 of the system is conventional since for instance such stores or more broadly content storage facilities already exist. The iTunes Stores 12 is conventionally coupled to the Internet 14. Also connected to the Internet 14 at the user end is a client device 18 indicated here as an Apple TV device, but which might be an Apple iPod device (with its host computer) or similar consumer electronic devices or computers available from other manufacturers and which are currently available. Each such device 18 has as shown here a global universal identifier GUID 20 which identifies that particular device. - Also provided here at the head end is a conventional DRM (digital rights management)
server 24. Such servers already exist in the content of present video and audio downloads and viewing services. Digital rights management refers to the policy enforcement for protecting the content from unauthorized use. Typically this involves some form of encryption. The content is transferred from the iTunes Store 12 or other source to the client device 18 in encrypted form and must be decrypted at the client device 18. Some such encryption schemes are sophisticated. For instance typically the encryption applied to each particular content transfer is different. Also the decryption keys supplied may be useful only for a small portion of each piece of content. In this case what is referred to as a key bag or a file is provided as part of the DRM file holding a number of keys for decrypting the content. The encryption may be symmetric or asymmetric (public key-private key) as known in the field. Typically the security information is provided in the form of a set of DRM data transferred along with or associated with the downloaded encrypted content and is necessary for decrypting and viewing same. The DRM data includes conventionally data defining a security policy associated with that content item, restricting a number of available plays and device transfers. The commerce aspect of ordering the content by the client device 18 is shown by the “rental order” from the client device and is received via the Internet 14 at the iTunes Store 12 which charges the user of the client device 18 the appropriate rental to a credit card or other account. In response, the iTunes Store 12 provides the “encrypted content” or asset along with at the same time or a later time the relevant DRM data which is transferred to the client device 18. Generally, the encrypted content is downloaded from the iTunes Store 12 to the client device 18 first, without the DRM data (including the key bag) needed to play the content. The DRM data is transmitted later, usually in response to the play request by the user, including the key bag as explained further below. - Also shown here is what is referred to as a content rental database and logic 26. This element here is not present in conventional audio/video content purchase systems. Its operation is explained further below, but essentially it controls delivery of the relevant DRM data as so as to enforce the rental time limits. It may be resident on its own server or part of the iTunes Store server(s) 12.
-
FIG. 2 shows in a flowchart the overall digital rights management for a rental in accordance with this disclosure using theFIG. 1 system. Not shown here is the initial order by the user or the content encryption which is conventional, sinceFIG. 2 shows the sequence of events at a high level. The initial action 32 here is that the movie (content) download is initiated to the user device 18 (after of course the ordering procedure has been completed and the content encrypted.). In the next step 34 it is determined if at the present time the download has been completed. This is a query made for instance every 5 seconds. If before the download is completed (“No”) the user has clicked “play” on his user device 18, that is he wants to start playing, the download is continued during playing. Thus this functions as a conventional video on demand system where the user watches the video as it is being downloaded. However there is no requirement to do so. That is one may alternatively download the content and watch it later. In this case if after the download is completed, the user has not yet clicked play, at 36 a 30-day key or token (counter) is provided at the content rental database ofFIG. 1 . That is, this token expires in forinstance 30 days. This time period is only an example here. This is the duration of the rental time in this particular example. - The next step 40 is that at some time after the download begins and after beginning of the 30-day period, the user does decide to play the content. This condition is checked periodically such as every 1 second. If at any particular time the user has not selected play, it is determined in the next step 42 if the 30 day token has expired. If “No”, control returns to the “user clicks play” step 40. If “Yes” at 42, the movie playback is disabled at the next step 46 because the 30-day rental time has expired. If the user however clicks play at 38 then the 24-hour window key or token is initiated at 48 at the content rental database. This begins the 24-hour viewing window. This is checked whether the user clicks play during the download or after the download. Then it is checked periodically at 50 such as every 5 seconds if the 24-hours since the play was initiated has expired. If “No”, play is resumed. If “Yes”, the movie playback is disabled at the next step 46.
- Thus in this particular example, the user has 30 days to view the movie after the download begins. In one embodiment this time is a variable designated the rental duration. The user also has 24 hours in this example to view the movie after initiating the first play. (The 24 hours here is only exemplary.) This variable is designated playback duration. Both of these variables may be unique to each asset as determined by the system operator and entered into the content rental database 26 for each content item. Generally after the 30-day or 24-hour periods have expired, the item becomes unplayable due to expiration of its token. However if the time limit is hit while the movie is still playing, the play will not be interrupted. Generally the play will be allowed to finish, that is one can finish watching the movie as long as the movie is not stopped or paused by the user for the remainder of the movie. There is also provided generally both in the user device 18 and in terms of the tokens a pause function. That is one may pause viewing and this also stops the tolling of the 24-hour time limit. The pause time limit is for example 12 hours or for instance a number of times of the actual movie duration.
- Various time lines or scenarios for various circumstances of operation of the
FIG. 2 method are shown inFIGS. 3A-3E which are largely self-explanatory. In this case the horizontal line represents the passage of time. Exemplary dates and times of day are shown for purposes of illustration. With reference toFIG. 3A , the first action atpoint 1 is that the user makes rental and the 30-day rental time begins. At point 2 (shaded), the customer actually starts to view (play) the movie and the 24-hour viewing window begins. There is unlimited playback allowed during this 24-hour window, that is one may watch the movie or other item as much as one wants and as many times as one wants within the 24 hour window. The 24 hours expires atpoint 3, in thiscase 24 hours after the initialization of play. The 30 days expires as shown atpoint 4. Of course in the typical situation the 30 day limit will not be relevant unless the 24 hours begins in the last day of the 30-day window. -
FIG. 3B shows a similar situation asFIG. 3A except that in this case the customer starts viewing the movie at 2 during the download (which may take forinstance 30 minutes). Obviously in this case the 30-day rental window at 4 is irrelevant. Note that typically downloading movies takes a considerable amount of time due to the large amount of digital information involved. In this case, the movie viewing window expires at 3 24 hours after the beginning of the viewing time. -
FIG. 3C shows the more complex situation where there is a pause involved as an example of an implementation of the present method. Typically pauses are initiated by the viewer when he wants to stop viewing and do something else and return to viewing later. As shown atpoint 1, the download is initiated and the 30-day window begins. Atpoint 2, the user begins to view the movie and his 24-hour window begins. Again he has unlimited playback during this 24-hour window. Atpoint 3, part way through the movie, the customer pauses the movie. In this case, he pauses it for two days untilpoint 4 where he pushes the play button on his consumer electronics playback device and resumes viewing. In this case, even though his 24-hour window has expired, the pausing enables him to view the rest of the movie as long as he does not pause or stop the movie again. The viewing period will then expire immediately after completion of the movie. Again in this case point five which is the 30-day rental window is irrelevant. -
FIGS. 3D and 3E illustrate the situation where the viewing only begins in the last 24 hours of the 30-day window. InFIG. 3D atpoint 1, the customer initiates the download and the 30-day rental window begins. The customer however only starts to view the movie atpoint 2, 29 days into the 30-day rental window. The 24-hour viewing window starts immediately. Atpoint 3, the customer stops the movie. Normally the viewing period would have ended atpoint 4, which is the expiration of the 30-day window. At this point at 5, the customer attempts to resume watching the movie, but since the 30-day window expired he cannot watch it anymore. In another embodiment rather than the 30-day token dominating the 24-hour token, the 24-hour token may be allowed to dominate in which case viewing may be continued as along as it is completed within 24 hours ofpoint 4. This would result in viewing terminating atpoint 5 in any situation. -
FIG. 3E shows a variation onFIG. 3D where atpoint 1 the customer initiates the download and the 30-day rental period starts. Atpoint 2, the customer starts to view the movie in the 29th day of the 30-day rental period. The 24-hour viewing window starts immediately. Atpoint 3, the customer pauses the movie and leaves his playback device on pause. Normally atpoint 4 the 30-day rental period would initially have ended. Atpoint 5, the 24-hour window would have ended. However atpoint 6, the customer resumes play by pushing the play button on his device. In this case, the 24-hour window has expired but the user may view the remainder of the movie as long as the movie is not paused or stopped again. The movie-watching period expires immediately after play is completed. - Note in certain embodiments, the content item may be transferred by the user from one consumer electronics device to another as explained further below. However the 30-day time period and 24-hour window still obtain.
- The following is directed to the DRM aspects and what is referred to here as “check-in” and “check-out” procedures in accordance with this disclosure. This is explained in the context of the
FIG. 1 system. It is understood that this is carried out in the context of a set of computer programs typically part of the content rental database and logic with co-operating aspects in the DRM server and iTunes Store. These programs are readily coded in light of this disclosure. Typically they would be coded in for instance the C++ language, but this is merely illustrative. Of course the actual code being executed would typically be in compiled form. Moreover the actual encryption/decryption and other DRM aspects are largely conventionally except as explained herein. Hence no further discussion is given of the encryption/decryption or other verification and security aspects. Instead the focus here is on the present rental aspect of the content as opposed to the conventional purchase/download approach. - First, there is provided here what is referred to as a “rental bag” that is part of the DRM for rentals. This entity is a set of data for each rental transaction, and includes the following: a rental identification (rentalid) which is a unique identifier assigned by the content rental database to each rental transaction; an account identifier which is an identifier for each user's iTunes account assigned by the iTunes Store; an identifier for the particular content item (program or movie) being rented; and other DRM specific data, including the conventional key bag. This rental bag is illustrated in
FIG. 1 and its use explained further below. - Also provided are three rental related processes referred to here as deauthorization, check in and check out. Deauthorization occurs when a user who has rented a content item purchases a new computer or playback device and wishes to transfer the rented item to the new computer or device. Check in is associated with deauthorization. Briefly, a transfer involves checking in the rental item (to the content rental database) and then subsequently checking the same item out to the new (or another) device. Hence check in occurs when a user deauthorizes his old computer or device in favor of a new one, or when he transfers an asset (content item) from one device to another, such as from his computer to his iPod. A check in is followed by a check out, to the new or other device.
- In more detail, check in involves the following actions, referring to
FIG. 1 . First, the iTunes client software (which is inherently resident in the iTunes client device 18) passes the rental bag, via theiTunes Store 12, to the content rental database and logic 26. The content rental database and logic 26 (hereinafter “rental database”) checks whether the rental bag is eligible for check in. If not, an error indication is returned to the iTunes client. If eligible, the rental database sends the rental bag to theDRM server 24. TheDRM server 24 processes the rental bag and extracts from it and returns to the content database 26 the rentalid, the date of the first playback of the content item, and the user account identifier. The rental database checks in the item then indicating the rental is terminated. In other words, it renders that content item (as still resident on the iTunes playback device 18 but in encrypted form) no longer playable. The rental database then sends the updated rental bag back to the iTunes client device 18. - The check out process occurs more frequently. Not only is it used as the second part of a transfer to complete the transfer, it is also invoked for each new rental (content item download.) Also, the check out process is invoked in the case when the client device 18 attempts to play a content item but does not have the requisite rental bag for decryption. For instance, this happens when the user attempts to play the item during the initial download. The check out process first requires the iTunes client device 26 to pass a rental bag (one received earlier by the client in a prior rental transaction) to the database 26. Also sent is the client device GUID 20. The database 26 sends this data on to the
DRM server 24. TheDRM server 24 processes the rental bag and returns to the database 26 the rentalid, the first playback time and date of the content item, and the user account identifier. The database 26 checks in response whether the rental bag is eligible for check out. If ineligible, and error message is returned to the iTunes client device 18. If eligible, the database 26 sends to theDRM server 24 the original rental bag and the new data associated with the current content item being check out. This data includes the rental id, key(s), rental expiration date (30 days) and rental duration date (24 hour period). TheDRM server 24 in response formulates an updated rental bag with the data associated with the current content item being checked out, and send this updated rental bag to the database 26. The database 26 then associates the GUID (global universal identifier) and the rentalid of the updated rental bag in its database, thereby rendering that content item playable upon that device 18. The database 26 then sends the updated rental bag to the client device 18. - Provided in one embodiment is a security check procedure to attempt to defeat hackers, who try to use the system in unauthorized fashion, such as tampering with the content. This procedure is invoked for both check in and check out and does require initially detection by the system of tampering; this detection is part of the DRM process.
- For check in, when the client first accesses the rental database, an element (“flag” in software terminology) is provided in the DRM data indicating the possible detected tampering. The content database then sends the rental bag to the DRM server with this indication. The DRM server then determines if there has been in fact tampering, and if so sends an indication (another flag) back to the content database. The content database maintains a flag counter for this type of flag for each item, and increments the counter upon receipt of each such flag. If the counter value exceeds a predetermined threshold, then that rentalid is excluded so that content item for that device is rendered unplayable. A warning or notice may be provided to the user at this point.
- A similar security process is provided for the check out procedure. The check out here is modified so that when the content database checks whether the rental bag is eligible for check out, if it determines that the content item is already checked out to that GUID, then the transaction is excluded. Further, if the flag counter value for the rental is greater than the threshold, the transaction is excluded as above. If the value of the flag counter is below the threshold, the content is allowed to be played but the counter value is incremented. Again, a warning or notice may be provided to the user.
- In accordance with another aspect, two embodiments are provided for respectively higher/lower levels of security. In the lower security embodiment, when the user elects to play the rented content, the relevant key bag for the entire rented item is downloaded to his client device and stored there. He can then play the content, even if thereinafter his client device is no longer in communication with the iTunes Store (e.g., the client device is no longer connected to the Internet). In the higher security embodiment, the keys are downloaded only as needed for each portion of the rented item, so the client device must remain in communication with the iTunes Store.
- This disclosure is illustrative but not limiting. Further modifications will be apparent to those skilled in the art in light of this disclosure and are intended to fall within the scope of the appended claims.
Claims (21)
1-16. (canceled)
17. A method comprising:
transmitting a request for content to a server;
receiving at least a portion of the content from the server in an encrypted form;
receiving a rental key from the server, the rental key being valid for a first period of time during which play back of the content can be initiated;
upon transmitting, to the server, a request to initiate play back of the content within the first period of time, receiving, from the server, a decryption key that enables play back of the content over a second period of time; and
receiving, based at least in part on the first period of time associated with the rental key and the second period of time associated with the decryption key, at least another portion of the content in encrypted form during the second period of time.
18. The method of claim 17 , further comprising:
decrypting the at least the portion of the content using the decryption key; and
presenting, the decrypted at least the portion of the content.
19. The method of claim 17 , wherein the first period of time is thirty days and the second period of time is twenty-four hours.
20. The method of claim 17 , wherein the decryption key is transmitted in a key bag data structure.
21. The method of claim 20 , wherein the key bag data structure stores a plurality of decryption keys for decrypting a plurality of portions of the content in the encrypted form.
22. The method of claim 17 , wherein the decryption key is not received when the request to initiate play back of the content is transmitted after the first period of time has expired.
23. The method of claim 17 , further comprising:
receiving a security policy along with the decryption key, wherein the security policy specifies at least one of: a maximum number of times the decryption key may be used to decrypt the at least the portion of the content over the second period of time, or a maximum number of client devices on which the decryption key may be used to decrypt the at least the portion of the content.
24. The method of claim 17 , wherein the content comprises video content.
25. The method of claim 17 , wherein the second period of time is different than the first period of time.
26. The method of claim 17 , wherein, during the second period of time, the decryption key enables play back of the content without communication with the server.
27. The method of claim 17 , wherein, during the second period of time, the decryption key enables play back of the content only when in communication with the server while play back occurs.
28. The method of claim 17 , wherein receiving the at least the other portion of the content comprises receiving a content stream that includes the at least the other portion of the content.
29. A non-transitory machine-readable medium comprising code that, when executed by one or more processors, causes the one or more processors to perform operations, the code comprising:
code to transmit a request associated with accessing content to a server;
code to receive, from the server in response to the request, a rental key that is valid for a first period of time during which play back of the content can be initiated;
code to, upon transmitting, to the server, a request to initiate play back of the content within the first period of time, receive, from the server, a decryption key that enables play back of the content over a second period of time; and
code to receive at least a portion of the content in an encrypted form; and
code to decrypt the at least the portion of the content during the second period of time using the decryption key.
30. The non-transitory machine-readable medium of claim 29 , wherein the code further comprises:
code to display the decrypted at least the portion of the content during the second period of time.
31. The non-transitory machine-readable medium of claim 29 , wherein the code further comprises:
code to receive a security policy along with the decryption key, wherein the security policy specifies at least one of: a maximum number of times the decryption key may be used to decrypt the at least the portion of the content over the second period of time, or a maximum number of client devices on which the decryption key may be used to decrypt the at least the portion of the content.
32. The non-transitory machine-readable medium of claim 29 , wherein the content comprises video content.
33. The non-transitory machine-readable medium of claim 29 , wherein the second period of time is different than the first period of time.
34. A device comprising:
a memory; and
at least one processor configured to:
transmit a request for time-limited access to content;
receive, responsive to the request, the time-limited access to the content, wherein the time-limited access comprises a first time period for initiating access to the content and a second time period for accessing the content after initiating access within the first time period;
initiate access to the content within the first time period; and
access at least a portion of the content within the second time period.
35. The device of claim 34 , wherein the content is encrypted and the at least one processor is further configured to:
receive a decryption key for accessing the content; and
decrypt the at least the portion of the content using the decryption key to access the at least the portion of the content within the second time period.
36. The device of claim 34 , wherein the at least one processor is further configured to:
access the at least the portion of the content within the second time period by receiving the at least the portion of the content streaming from a server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/387,452 US20190297369A1 (en) | 2008-01-11 | 2019-04-17 | Method and apparatus for on demand video and other content rental |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US1076308P | 2008-01-11 | 2008-01-11 | |
US12/169,508 US8706638B2 (en) | 2008-01-11 | 2008-07-08 | Method for on demand video and other content rental |
US14/224,010 US9374616B2 (en) | 2008-01-11 | 2014-03-24 | Method and apparatus for on demand video and other content rental |
US15/159,772 US10313725B2 (en) | 2008-01-11 | 2016-05-19 | Method and apparatus for on demand video and other content rental |
US16/387,452 US20190297369A1 (en) | 2008-01-11 | 2019-04-17 | Method and apparatus for on demand video and other content rental |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/159,772 Continuation US10313725B2 (en) | 2008-01-11 | 2016-05-19 | Method and apparatus for on demand video and other content rental |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190297369A1 true US20190297369A1 (en) | 2019-09-26 |
Family
ID=40851508
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/169,508 Active 2030-10-01 US8706638B2 (en) | 2008-01-11 | 2008-07-08 | Method for on demand video and other content rental |
US14/224,010 Expired - Fee Related US9374616B2 (en) | 2008-01-11 | 2014-03-24 | Method and apparatus for on demand video and other content rental |
US15/159,772 Active US10313725B2 (en) | 2008-01-11 | 2016-05-19 | Method and apparatus for on demand video and other content rental |
US16/387,452 Abandoned US20190297369A1 (en) | 2008-01-11 | 2019-04-17 | Method and apparatus for on demand video and other content rental |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/169,508 Active 2030-10-01 US8706638B2 (en) | 2008-01-11 | 2008-07-08 | Method for on demand video and other content rental |
US14/224,010 Expired - Fee Related US9374616B2 (en) | 2008-01-11 | 2014-03-24 | Method and apparatus for on demand video and other content rental |
US15/159,772 Active US10313725B2 (en) | 2008-01-11 | 2016-05-19 | Method and apparatus for on demand video and other content rental |
Country Status (2)
Country | Link |
---|---|
US (4) | US8706638B2 (en) |
WO (1) | WO2009088490A1 (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8706638B2 (en) | 2008-01-11 | 2014-04-22 | Apple Inc. | Method for on demand video and other content rental |
US8571994B2 (en) * | 2009-06-26 | 2013-10-29 | Disney Enterprises, Inc. | Method and system for allocating access to digital media content |
US10565388B2 (en) | 2009-06-26 | 2020-02-18 | Disney Enterprises, Inc. | Method and system for providing digital media rental |
JPWO2011161898A1 (en) * | 2010-06-21 | 2013-08-19 | パナソニック株式会社 | Content duplication system, content utilization device, management server, content utilization method, content utilization program, and integrated circuit |
EP2400445A3 (en) * | 2010-06-28 | 2012-05-23 | Samsung Electronics Co., Ltd. | Image device, receiving method of contents, server and providing method of contents |
US9087208B2 (en) * | 2011-06-27 | 2015-07-21 | Google Inc. | Persistent key access to album |
US9009857B2 (en) * | 2011-10-28 | 2015-04-14 | Absolute Software Corporation | Temporally controlling access to software assets on user devices |
US8935809B2 (en) | 2012-06-22 | 2015-01-13 | International Business Machines Corporation | Consumption based digital content rental expiration |
US9215269B2 (en) * | 2012-08-23 | 2015-12-15 | Amazon Technologies, Inc. | Predictive caching for content |
US20140196064A1 (en) * | 2013-01-04 | 2014-07-10 | Comcast Cable Communications, Llc | Content Marketplace And Customization Of Content Acquisition |
FR3009638A1 (en) * | 2013-08-06 | 2015-02-13 | Editions Montparnasse | INTERNET FILM RENTAL SYSTEM |
US9223942B2 (en) * | 2013-10-31 | 2015-12-29 | Sony Corporation | Automatically presenting rights protected content on previously unauthorized device |
US9544388B1 (en) | 2014-05-09 | 2017-01-10 | Amazon Technologies, Inc. | Client-side predictive caching for content |
JP5739572B1 (en) | 2014-08-21 | 2015-06-24 | グリー株式会社 | Program, information processing apparatus, and control method for information processing apparatus |
US9326046B1 (en) | 2015-03-19 | 2016-04-26 | Amazon Technologies, Inc. | Uninterrupted playback of video streams using lower quality cached files |
WO2016172270A1 (en) * | 2015-04-21 | 2016-10-27 | Edge2020 LLC | Price driven multimedia content transmission |
WO2017002158A1 (en) * | 2015-06-29 | 2017-01-05 | 楽天株式会社 | Authentication server, user terminal, content server, control method for these, and computer program |
US10182387B2 (en) | 2016-06-01 | 2019-01-15 | At&T Intellectual Property I, L.P. | Method and apparatus for distributing content via diverse networks |
KR102652361B1 (en) | 2019-02-08 | 2024-03-29 | 삼성전자주식회사 | Method for sharing content and electronic device thereof |
CN111625248B (en) * | 2020-06-01 | 2023-04-07 | 杭州万高科技股份有限公司 | Programming device and encryption programming method |
JP2022012813A (en) * | 2020-07-02 | 2022-01-17 | 富士フイルムビジネスイノベーション株式会社 | Information processing device and program |
Family Cites Families (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5485577A (en) * | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
EP0880840A4 (en) * | 1996-01-11 | 2002-10-23 | Mrj Inc | System for controlling access and distribution of digital property |
US6813636B1 (en) * | 1999-03-01 | 2004-11-02 | Aspect Communications Corporation | Method and apparatus for routing a transaction within a network environment |
JP2000341263A (en) * | 1999-05-27 | 2000-12-08 | Sony Corp | Information processing device and its method |
US7992163B1 (en) * | 1999-06-11 | 2011-08-02 | Jerding Dean F | Video-on-demand navigational system |
US6289455B1 (en) * | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
US20010036271A1 (en) * | 1999-09-13 | 2001-11-01 | Javed Shoeb M. | System and method for securely distributing digital content for short term use |
US6912514B2 (en) * | 1999-12-03 | 2005-06-28 | Matsushita Electric Industrial Co., Ltd. | Content distribution system and a reference server |
US6898708B2 (en) * | 1999-12-07 | 2005-05-24 | Sanyo Electric Co., Ltd. | Device for reproducing data |
US20020073033A1 (en) * | 2000-04-07 | 2002-06-13 | Sherr Scott Jeffrey | Online digital video signal transfer apparatus and method |
US7155415B2 (en) * | 2000-04-07 | 2006-12-26 | Movielink Llc | Secure digital content licensing system and method |
US20020154157A1 (en) * | 2000-04-07 | 2002-10-24 | Sherr Scott Jeffrey | Website system and process for selection and delivery of electronic information on a network |
US20020049717A1 (en) * | 2000-05-10 | 2002-04-25 | Routtenberg Michael D. | Digital content distribution system and method |
JP2002032685A (en) * | 2000-05-11 | 2002-01-31 | Nec Corp | Contents rental system |
EP1302882A1 (en) * | 2000-05-30 | 2003-04-16 | Akiyoshi Okamoto | Rental system of digital content |
US7228427B2 (en) * | 2000-06-16 | 2007-06-05 | Entriq Inc. | Method and system to securely distribute content via a network |
US6754642B2 (en) * | 2001-05-31 | 2004-06-22 | Contentguard Holdings, Inc. | Method and apparatus for dynamically assigning usage rights to digital works |
US7174568B2 (en) * | 2001-01-31 | 2007-02-06 | Sony Computer Entertainment America Inc. | Method and system for securely distributing computer software products |
EP1479016A2 (en) | 2001-05-29 | 2004-11-24 | Matsushita Electric Industrial Co., Ltd. | Rights management unit |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US20030069854A1 (en) * | 2001-10-09 | 2003-04-10 | Hsu Michael M. | Expiring content on playback devices |
WO2003044680A1 (en) * | 2001-11-20 | 2003-05-30 | Contentguard Holdings, Inc. | Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates |
US20030229898A1 (en) * | 2002-06-05 | 2003-12-11 | Babu Suresh P. | Multiple on-demand media vendor integration |
US7020636B2 (en) * | 2002-09-05 | 2006-03-28 | Matsushita Electric Industrial, Co., Ltd. | Storage-medium rental system |
US7849016B2 (en) * | 2002-12-18 | 2010-12-07 | Vincent So | Internet-based data content rental system and method |
JP2004252931A (en) * | 2002-12-26 | 2004-09-09 | Sony Corp | Electronic device, device function control method and server |
US20050108176A1 (en) * | 2003-04-30 | 2005-05-19 | Jarol Scott B. | Configurable rules based content item consumption |
US7882034B2 (en) | 2003-11-21 | 2011-02-01 | Realnetworks, Inc. | Digital rights management for content rendering on playback devices |
KR20060108619A (en) * | 2003-12-17 | 2006-10-18 | 마쯔시다덴기산교 가부시키가이샤 | Content distribution server, key assignment method, content output apparatus, and key issuing center |
US20060123484A1 (en) * | 2004-03-04 | 2006-06-08 | Miodrag Babic | Method of clearing and delivering digital rights management licenses to devices connected by IP networks |
US20050276570A1 (en) | 2004-06-15 | 2005-12-15 | Reed Ogden C Jr | Systems, processes and apparatus for creating, processing and interacting with audiobooks and other media |
JP2006085483A (en) * | 2004-09-16 | 2006-03-30 | Sony Corp | License processing device, program and license lending-out method |
JP4234721B2 (en) * | 2005-03-29 | 2009-03-04 | 株式会社東芝 | Content distribution apparatus, user terminal apparatus, relief management method, and computer program |
US8893299B1 (en) * | 2005-04-22 | 2014-11-18 | Nvidia Corporation | Content keys for authorizing access to content |
JP4935015B2 (en) * | 2005-07-29 | 2012-05-23 | ソニー株式会社 | Content distribution system, content distribution method, content transmission terminal, and content reception terminal |
US20070079342A1 (en) * | 2005-09-30 | 2007-04-05 | Guideworks, Llc | Systems and methods for managing local storage of on-demand content |
KR100736080B1 (en) | 2005-10-27 | 2007-07-06 | 삼성전자주식회사 | Method and apparatus for managing rights of multi-layered multimedia stream by layer |
US20070130585A1 (en) * | 2005-12-05 | 2007-06-07 | Perret Pierre A | Virtual Store Management Method and System for Operating an Interactive Audio/Video Entertainment System According to Viewers Tastes and Preferences |
US7631323B1 (en) * | 2005-12-07 | 2009-12-08 | Netflix, Inc. | Method of sharing an item rental account |
US20070198422A1 (en) * | 2005-12-19 | 2007-08-23 | Anand Prahlad | System and method for providing a flexible licensing system for digital content |
US20070239611A1 (en) * | 2006-04-10 | 2007-10-11 | Scott Blum | Media player and access system and method |
CA2648310C (en) * | 2006-04-12 | 2016-10-18 | Thomson Licensing | Virtual dvd on demand and electronic dvd rental/buy/burn |
US20080005025A1 (en) * | 2006-06-15 | 2008-01-03 | Henry Joseph Legere | Method and apparatus for renting electronic media content without requiring returns or physical inventory |
US20080168515A1 (en) * | 2006-12-26 | 2008-07-10 | Benson Ronald G | System and method for delivery of media content to a user |
US20080250120A1 (en) * | 2007-02-22 | 2008-10-09 | Colin Kennedy Mick | Method and apparatus for distributing a multimedia file to a public kiosk across a network |
US20080263056A1 (en) * | 2007-04-19 | 2008-10-23 | Youbiquity, Llc | Electronic content asset publication system |
US20090157553A1 (en) * | 2007-12-17 | 2009-06-18 | Vizio | Purchase of electronic content after a trial or rental period of using content without access to an internet connection |
US8677430B2 (en) * | 2008-01-04 | 2014-03-18 | Apple, Inc. | Content rental system |
US8166508B2 (en) * | 2008-01-04 | 2012-04-24 | Apple Inc. | Content rental system |
US8706638B2 (en) | 2008-01-11 | 2014-04-22 | Apple Inc. | Method for on demand video and other content rental |
US20090193479A1 (en) * | 2008-01-30 | 2009-07-30 | Vizio | Method and apparatus for automatically notifying a renter of digital content when the rental period has expired |
-
2008
- 2008-07-08 US US12/169,508 patent/US8706638B2/en active Active
- 2008-12-31 WO PCT/US2008/014150 patent/WO2009088490A1/en active Application Filing
-
2014
- 2014-03-24 US US14/224,010 patent/US9374616B2/en not_active Expired - Fee Related
-
2016
- 2016-05-19 US US15/159,772 patent/US10313725B2/en active Active
-
2019
- 2019-04-17 US US16/387,452 patent/US20190297369A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20160269767A1 (en) | 2016-09-15 |
WO2009088490A1 (en) | 2009-07-16 |
US20090182670A1 (en) | 2009-07-16 |
US10313725B2 (en) | 2019-06-04 |
US20140298376A1 (en) | 2014-10-02 |
US8706638B2 (en) | 2014-04-22 |
US9374616B2 (en) | 2016-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190297369A1 (en) | Method and apparatus for on demand video and other content rental | |
US7233668B2 (en) | System and method for a commercial multimedia rental and distribution system | |
US8627415B2 (en) | System and method for secure commercial multimedia rental and distribution over secure connections | |
EP1277305B1 (en) | Secure digital content licensing system and method | |
US7155415B2 (en) | Secure digital content licensing system and method | |
US6993508B1 (en) | Method and mechanism for vending digital content | |
US7444306B2 (en) | Method and apparatus for the rental or sale, and secure distribution of digital content | |
CN102160391B (en) | Digital rights management licensing over third party networks | |
US8566893B2 (en) | Systems and methods for providing a token registry and encoder | |
US20010036271A1 (en) | System and method for securely distributing digital content for short term use | |
AU2001253243A1 (en) | Secure digital content licensing system and method | |
CN102158737A (en) | Systems and methods for managing local storage of on-demand content | |
CN104427358A (en) | Fast-expiring licenses used to speculatively authorize access to streaming media content | |
US8893299B1 (en) | Content keys for authorizing access to content | |
EP1665147A1 (en) | Business model for providing on demand digital content | |
JP4543881B2 (en) | Content reproduction method, reproduction program, and reproduction apparatus | |
WO2013026081A1 (en) | System and method of media streaming with enhanced security | |
KR20030067511A (en) | Process for transmitting digital data representative of a content | |
WO2001013310A1 (en) | System and method for secure distribution and on-line electronic usage management | |
KR100967484B1 (en) | Method for Digital Rights Management using Public Internet Protocol Address |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |