METHOD OF DISTRIBUTING DIGITAL INFORMATION
BACKGROUND OF THE INVENTION
1. FIELD OF THE INVENTION
The present invention relates generally to the field of electronic distribution of digital information. More specifically, the invention relates to a system and method for the secure distribution of digital copies of high-value master files, such as motion pictures.
2. BACKGROUND OF THE INVENTION
In recent years, the Internet has become an increasingly popular medium through which consumers can locate and purchase various goods and services. Among the many goods available through the Internet are audio and video recordings. These recordings are typically marketed on magnetic tapes and magnetic and optical discs. As the bandwidth of Internet access has increased, however, electronic delivery of audio and video recordings has become practical. For example, audio recordings are now widely available over the Internet in the popular MP3 format. As the bandwidth of Internet access continues to increase and more sophisticated data compression techniques become available, it is expected that digital copies of music, movies, games, software and other multimedia content will increasingly be downloaded over the Internet and other electronic communication media. This method of distribution is a convenience to consumers and, furthermore, significantly reduces the packaging and distribution costs for the distributed materials.
Although there are numerous advantages to the electronic distribution of entertainment content in digital format, such distribution presents a threat to the owner of copyrighted entertainment content. The primary concern of the copyright owner is that once copyrighted material is available in a digital format, the advances in transmission and duplication technologies will result in wide-spread, unlicensed duplication of the copyrighted material. Currently, there is no existing standard that fully protects the copyright owner, retailer and consumer from possible fraud or other misuse, intentional or otherwise, of copyrighted material that is electronically transmitted. Even with the encryption schemes available today, there is always the possibility that the encryption scheme will be broken.
Electronic distribution of entertainment content also presents a perceived threat to retailers. Now that consumers have direct access to content providers via the Internet, the role of the conventional retailer is likely to be diminished. This trend is already evident in connection with many consumer goods that can be purchased directly from manufacturers over the Internet. The valuable role that retailers provide in exposing products to consumers is often disregarded by the manufacturers. There are numerous examples of manufacturers whose products are first sold by conventional retailers but who then utilize the Internet to sell directly to consumers after the consumers have returned product registration cards to the manufacturer.
SUMMARY OF THE INVENTION
The present invention provides a unique system and method for distributing digital information that protects the respective business interests of both retailers and owners of the digital information. Each transaction with a consumer who purchases digital information involves both the owner of the information and a retailer. The consumer interfaces with the retailer via a website, conventional catalog or equivalent means to obtain information concerning available products and to place an order for a desired product. The order is accompanied by payment to the retailer. The retailer then sends a request for the desired product to a data center maintained by the owner of the digital information. This request, which may be accompanied by payment from the retailer to the information owner, includes the consumer's Internet Protocol (IP) or other electronic address, but does not otherwise identify the consumer. Thus, the retailer's valuable customer information is protected.
For each of the products offered by the retailer, the retailer has one or more decryption keys provided by the information product owner. When the retailer sends a request for a product to the information owner, the retailer also sends the appropriate decryption key to the consumer. In response to the retailer's request, the information owner sends a compressed, encrypted, watermarked copy of the requested product directly to the consumer. The downloaded file is automatically decrypted using the decryption key that the consumer received from the retailer. The product is then available for use in accordance with the terms of purchase, e.g., one-time use, restricted use, or unlimited use. The owner of the information thus retains control over the original information content. Copies of the information are provided only to the consumer, not to the retailer. Furthermore, the copies provided to the consumer are encrypted by the information owner, who has complete control over the encryption scheme and the distribution of the decryption keys.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a simplified functional block diagram of the distribution system of the present invention.
Figure 2 is a functional flow diagram illustrating the method of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
In the following description, for purposes of explanation and not limitation, specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known methods and devices are omitted so as to not obscure the description of the present invention with unnecessary detail.
The basic configuration of the system and method of the present invention is illustrated in Figures 1 and 2. For the purpose of this description, the invention will be described in the context of distributing a digital copy of a motion picture. However, it will be understood that the invention is not limited in this regard, but may also be used to distribute other types of digital information, including music, games, software, digital books and other multimedia content. A data center 10 is maintained by the owner of the digital information. In the specific example of movies, this would typically be a motion picture studio. For other types of content, the owner may be a game manufacturer, a book publisher, a record label, etc. Data center 10 comprises a digital library of products (i.e., movies) to be sold or otherwise distributed to consumers. In addition, the data center maintains files of product descriptions and attributes and encryption/ decryption schemes and keys for the products. The owner retains absolute control over the master digital copies of its products. Proprietary protection schemes, such as digital watermarking and encryption are determined individually and exclusively by the owner of the product.
Data center 10 communicates with a retailer 20 and a consumer 30. Communication between any two of the three system participants may be by way of a global computer network, e.g., the Internet, or by other shared or dedicated communication links, including, for example, coaxial cables, fiber optic cables, wireless datalinks and the like. Any combination of such communication technologies may be used.
A retailer 20, who is authorized to distribute the products of data center 10, maintains a master index or catalog of all digital products that it is licensed to sell, including product descriptions and attributes provided by the data center. Each product in the catalog has a corresponding encryption key code that is issued to the retailer by the owner of the digital material. The key code is the device that "unlocks" the encrypted version of the digital product that the consumer ultimately receives. The encryption key code may be changed or updated as necessary for security purposes. Encryption key
codes may be unique to each of the products available from the data center. For added security, the encryption key codes may be unique to each encrypted copy sent from the data center. In such case, retailer 20 may be provided with a set of key codes corresponding to the number of copies of a product that such retailer is authorized to "distribute". In this way, the owner of the digital information can exercise greater control over the distribution of its products. The encryption key codes may also specify the manner in which the product may be used by the consumer. For example, a movie may be offered at a particular price for one-time viewing, at a higher price for viewing some specified number of times and at a still higher price for unlimited viewing. In each case the consumer would receive a unique key code corresponding to the level of use purchased by the consumer. As already mentioned, each owner of copyrighted material is able to use its own unique and proprietary digital watermarks and encryption schemes that are fully independent from other copyright owners and are not within the control or purview of the retailer or others.
The catalog of digital products that is maintained by retailer 20 is made available to the public via the retailer's website, printed catalog or equivalent means. A consumer 30 obtains information about available products from the retailer's catalog. Upon selecting a desired product, the consumer places an order with the retailer and pays for the order using a credit card account or other means. After verifying the transaction, retailer 20 creates a digital certificate, which is transmitted to the consumer via the Internet or other electronic transmission medium. The digital certificate contains a confirmation of the order and the appropriate key code for the ordered product. Retailer 20 also transmits a request to data center 10 where the digital master of the desired product resides. This request identifies the product to be transmitted (including the level of use, if appropriate), the identity of the retailer, and the consumer's electronic address to which the product is to be sent. The request from the retailer may be accompanied by payment or, alternatively, an appropriate debit to the retailer's account may be entered by the data center.
Upon receiving the request from retailer 20, data center 10 creates an encrypted copy of the desired product using an encryption code that corresponds to the key previously issued to the retailer (and forwarded by the retailer to the consumer) for the specific product identified in the retailer request. Data center 10 may also apply a digital watermark to the copy for identification and tracking purposes. The encrypted copy of the product is then sent to the electronic address of consumer 30 as requested by the retailer. Data center 10 need never release an unprotected copy of its valuable master files and can
maintain a strict accounting of all encrypted copies that are distributed without reliance on reporting from the product retailers.
When the consumer 30 receives the encrypted product, it is unlocked by the key furnished by retailer 20. The key allows consumer 30 to view the product in accordance with the terms of purchase. The product can be viewed by consumer 30 on the device to which the product was sent, but it is protected against subsequent transmission by the encryption code and the digital watermark. In the event of suspected piracy or subsequent unauthorized transmissions, the watermark will identify the retailer who sold the copy and the electronic address of the consumer to whom it was sent.
It will be recognized that the above-described invention may be embodied in other specific forms without departing from the spirit or essential characteristics of the disclosure. Thus, it is understood that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.