The present invention relates generally to a digital information transmission, receiving, and playback system. Specifically, the present invention pertains to a computer network based digital information library providing interactive client computer access.
Recent technological advances in the compression of digital data and the expansion of storage capacities of computer systems together with the increased bandwidth of computer network infrastructures have created new possibilities for personalized access to and usage of large amounts of digital information. One form of this type of digital information is audio information delivered across a computer network as digitized information.
In the field of interactive digital information transmission, receiving, and playback systems, several patents are known to the present applicants. U.S. Pat. No. 5,132,992, issued Jul. 21, 1992 to Yurt et al. (Yurt), describes a system of distributing video and/or audio information employing digital signal processing to achieve high rates of data compression. The Yurt patent describes a transmission system including a conversion means for placing the items from a source material library into a predetermined format as formatted data. Audio data is compressed by an audio compressor by application of an adaptive differential pulse code modulation (ADPCM) process to the audio data. Stored items are accessed in the compressed data library through the use of a unique address code assigned to each item during storage encoding. The unique address code is used for requesting and accessing information and items throughout the Yurt transmission and receiving process. The Yurt transmission system includes means by which a user enters a customer identifier (ID) code by which the system accesses the users account, and indicates to the system that the user is a subscriber of the system. If a subscriber is in good standing, the Yurt system delivers selected titles using the described techniques.
One significant problem with the audio transmission and receiving system described in Yurt is the lack of an effective means for ensuring the security of the digital information library and of the items downloaded to a user from the digital information library. Although Yurt describes the use of a unique identification code assigned to items in the library and a customer ID code assigned to particular users, no authentication protocols or encryption techniques are described to prevent the unauthorized creation of clone libraries or the unauthorized download or copying of library items. Secondly, Yurt and related prior art does not describe an authentication or encryption means providing secure transactions between a server based digital information library supporting a client computer system having an interface to a mobile playback device. Thirdly, the prior art does not describe a mechanism for selecting a digital information passage to be previewed. Prior art systems also do not describe a system whereby only part of a program gets downloaded from a client computer system to a mobile playback device depending on how much storage space is available in the mobile playback device. Prior art systems also do not describe a mechanism for specifying multiple programs to be downloaded from a digital information library into a mobile playback device. Prior art systems also do not detail the processes required in the authoring system to generate content for the digital information library. Finally, prior art systems do not describe an accounting system whereby library content providers can perform real-time queries on usage information related to the access of library items.
The preferred embodiment of the present invention is a computer network based digital information library system employing authentication, targeting, and encryption protocols for the secure transfer of digital information library programs to a client computer system and a mobile digital information playback device removably connectable to the client computer system. The present invention is a computer network based library and information delivery system for accessing and obtaining selected digital information files. The library and information delivery system comprises: 1) a library server having a plurality of digital information files; 2) a client computer system coupled to the library server over a network; and 3) a mobile device removably connectable to the client computer system, the client computer system including logic for requesting a download of a selected one or more of the digital information files from the library server, the client computer system further including logic for downloading the selected one or more of the digital information files to the mobile device.
The accompanying drawings, which are included as part of the present specification, illustrate the presently preferred embodiment of the present invention and together with the general description given above and the detailed description of the preferred embodiment given below serve to explain and teach the principles of the present invention.
The preferred embodiment of the present invention is a computer network based digital information library system employing authentication, targeting, and encryption protocols for the secure transfer of digital information library programs to a client computer system and a mobile digital information playback device removably connectable to the client computer system. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that these specific details need not be used to practice the present invention. In other instances, well known structures, interfaces, and processes have not been shown in detail in order not to unnecessarily obscure the present invention.
Note that any or all of the components of the system illustrated in
The software implementing the present invention can be stored in main memory 104, mass storage device 107, Or other storage medium accessible to processor 102. It will be apparent to those of ordinary skill in the art that the methods and processes described herein can be implemented as software stored in main memory 104 or read only memory 106 and executed by processor 102. This software may also be resident on an article of manufacture comprising a computer usable mass storage medium 108 having computer readable program code embodied therein and being readable by the mass storage device 107 and for causing the processor 102 to perform digital information library transactions and protocols in accordance with the teachings herein.
Digital Information Library System
In addition, it will be apparent to those of ordinary skill in the art that other forms of networking may equivalently be supported by the present invention. For example, a wireless transmission means such as infrared or radio links may also provide the distribution network 240 described in the present application. As an alternative to the Internet, a proprietary network/bulletin board such as AMERICA-ON-LINE (AOL), or COMPUSERVE may be used.
Each of the servers at library site 250 and the client computer system 214 at client site 210 can be implemented as a computer system such as the one described above in connection with
The mobile playback device 212 is a minimally configured, low-cost, standalone mobile unit for receiving and storing digital information files or programs as downloaded by library server 260 and client computer system 214 and for playing back the digital information files or programs for a user of the mobile playback device 212. The mobile playback device 212 is temporarily removably coupled to the client computer system 214 while the download takes place. Once downloaded, the mobile playback device 212 may be detached from the client computer system 214 and used as a standalone digital information playback device. A co-pending U.S. Patent Application titled, “Interactive Audio Transmission, Receiving and Playback System”, assigned Ser. No. 08/490,537, and assigned to the Audible Words Corporation of Montclair, N.J. describes the details of mobile playback device 212.
In its basic form, the preferred embodiment of the present invention is a digital information library system providing selection of digital information programming on demand over a computer network. In an alternative embodiment, the digital information programming is selected via the computer network but delivered using mass storage media 241. This alternative embodiment is described in more detail below.
The digital information library is an indexed collection of digital information programming, drawing content from digital information sources such as books, daily news and entertainment feeds, conferences and educational sources, other computer systems, the host on the World Wide Web (WWW) of the Internet, and customized audio or visual image programming. Other sources of the digital information content include, but are not limited to, conference or seminar proceedings, lecture or speech materials, language lessons, readings, comedy, customized spoken digests and related, “need-to-know” business information, computer software, local sound studio material, text to speech conversion of machine readable files, pre-recorded material from magnetic tape, CD-ROM, digital audio tape, or analog cassette tape. This digital information content is input as raw digital information content to authoring system 280 shown in
In an alternative embodiment, the digital information comprises digitized image or graphics data used to produce visual images on a display screen or projection screen. These images may be included in the digital information retained and maintained by the library server 260.
Authoring System
Authoring system 280 is used to edit, index, compress, scramble, segment, and catalog digital information content into digital information programs in digital information files, which are stored on mass storage media 241 or on library server 260 as scrambled and compressed digital information files 262. The digital information programs are initially categorized according to traditional criteria (e.g. genre, modern fiction, mystery, adventure, romance, non-fiction, classics, self-help, science fiction, westerns, etc.). Categories associated with specific authors or publishers are also provided. Both unabridged and abridged titles are provided. In some circumstances, it may be necessary to digitize digital information content from an undigitized form. The raw information digitizer 307 is provided for this purpose. Authoring system 280 also partitions digital information content into segments, which can be identified, searched, and skipped over if desired. All of these functions are performed by authoring system 280.
The raw digital information content 310 is also fed to template header generator 312. Each digital information file maintained by the library server 260 includes other descriptive information used to identify the file's content and to provide information used to process the digital information within the file. Each digital information file includes a template header, a descrambling map, selected preview clips, and the digital information programming itself. In the preferred embodiment, the template header comprises a number of attributes corresponding to the digital information in the file. For example, the digital information may be audio information generated from the content of a book or other published work. In this example, the audio file template header contains attributes including: 1) the title of a book, volume, or medium from which the digital information content originated, 2) the legal copyright associated with the digital information content, 3) audible title(s) of the content, 4) a table of contents of the content, and 5) playback settings for appropriately playing or rendering the digital information. The table of contents contains content navigation information including but not limited to: the number of chapters, the length of the program, and information indicative of the relevant content sections. The table of contents is generated with input from authoring system operator 305 or automatically by analysis of digital information content 310. The descrambling map 322 is used to interpret the digital information after the digital information has been scrambled by scrambler 318 as described below. The preview clips 324 comprise short pre-generated portions of digital information content used to give a consumer a sense of the content of a particular digital information file. In the preferred embodiment, these previews are generated as conventional formatted files which can be directly played by sound generation circuitry 130 or rendered by other means. A digital information file can have several preview clips associated with it. The preview clips 324 are not compressed or scrambled in the preferred embodiment. The template header 312 remains with the digital information file as it is transferred to the network 240 or mass storage media 241. The other descriptive information related to a digital information file is typically stored with digital information file, but is not required to be so stored.
Referring again to
After digital information compressor 314 has compressed the raw digital information using a selected compression method suitable for the category of digital information, the scrambler 318 scrambles the digital information. The digital information is scrambled to prevent an unauthorized consumer from using the digital information. In the preferred embodiment, scrambler 318 uses a conventional encryption method to render the data unusable. A corresponding descrambling map 322 is generated to provide a means for descrambling the scrambled digital information file. A scrambling map 316 is used by scrambler 318 to scramble the digital information file. The scrambler 318 can encrypt the entire digital information file or selected critical subsets of the digital information file. The level of scrambling can be selected depending upon the capabilities of the authoring system 280, the mobile playback device 212 and/or the anticipated software player 226 on client computer system 214. In an alternative embodiment, a proprietary digital information format is used in lieu of scrambler 318.
The scrambled digital information content is output by scrambler 318 to segmentation logic 326. Segmentation logic 326 petitions the digital information content into blocks for efficient storage in and transfer to a mobile playback device 212 or software player 226 and for efficient navigation during playback. Transport integrity data is generated and appended to the segmented digital information. In an alternate embodiment, portions of the segmentation process may take place before or after digital information compressor 314 and scrambler 318. Segmentation information may also be used in the header generation process by template header generator 312. The compressed, scrambled, and segmented digital information blocks are provided to the library server 260 by authoring system 280. Library server 260 assembles the segmented digital information blocks, the descrambling map 322, the preview clip(s) 324, and the template header 312 for a particular item of digital information content into a digital information program file or files, which are stored in a digital information program file storage area 262. Other raw digital information content is converted into digital information files using the authoring system 280 in a similar manner.
Library Server
Referring again to
The library server 260 interfaces with a client application program or client browser 219 executing on client computer system 214. The client browser 219 is used to make requests of library server 260 for various types of service including, but not limited to, searching the digital information files 262 for a desired program, previewing a selected preview clip associated with a digital information file 262, purchasing a selected program, requesting operating code segments or player configuration data, and downloading the purchased program or other material to the requesting client computer system 214.
The library server 260 interface with the authorization server 270 and client computer system 214 uses the unique authentication protocol and encryption protocol of the preferred embodiment of the present invention. The preferred embodiment of these protocols is described in the sections below.
Client Computer System
Referring again to
Mobile Playback Device
The mobile playback device 212 converts a digital information file into sound or displayable imagery which is played through audio output means or displayed on a display device. In the preferred embodiment, the mobile playback device 212 is a minimal capability, low-cost device primarily dedicated to playing audio files or displaying visual images or text on a display device. The mobile playback device 212 is minimally configured to retain its light-weight, low cost, and readily mobile features. The preferred embodiment does not therefore include the use of a portable personal computer or laptop computer as the mobile playback device 212; because, such general purpose computing devices typically do not meet the light-weight and low cost constraints of the preferred mobile playback device 212. Such general purpose computing devices typically have unnecessary functionality, more complicated interfaces, and may suffer cost and performance penalties in comparison to the special purpose mobile playback device 212. In the preferred embodiment, the mobile playback device 212 includes a processor, memory, and an interface to client computer system 214 over which compressed digital information files 216 are received. As described in more detail below, mobile playback device 212 also includes a player ID 223, group IDs 225, and server public key 215 used for authenticating digital information and software files received from server 260 via client computer system 214. The user controls the mobile playback device 212 using buttons and knobs provided on the device. These controls are used to navigate through digital information files 216, adjust configuration data and playback parameters, or perform other functions as directed by firmware stored in playback device 212. When coupled to the player, client computer system 214 or other electronic devices can solicit user input from these controls. In an alternative embodiment, a set of additional user controls is provided on a remote control unit that is coupled to the player via a wired or wireless connection. Digital information output may be provided via a headphone jack, on board speaker, or wireless transmitter to a separate wireless receiver with speakers or headphones. Audio level can be adjusted with a volume knob. A wireless transmitter may contain an adjustment knob to adjust the transmission frequency or other transmission parameters. Visual information output is provided via LCD display, LED display, or outputs to a standard visual display device. The mobile playback device 212 contains a limited quantity of non-volatile memory, RAM, and ROM. Digital information content, configuration data, and operating code are stored in the memory space of the mobile playback device 212. Configuration data includes but is not limited to: public and private IDs, content playback parameters, and user interface parameters. The use of non-volatile memory allows portions of the digital information content, configuration data, and firmware to be updated via download. Both digital information content and firmware (operating software) is stored in this memory device. Portions of the firmware and configuration information are stored permanently in a read only memory (ROM). An internal memory allocation method is used to track the content of mobile playback device 212 memory. This allocation method, in conjunction with segment navigation data 218, also provides the means for locating desired digital information, program, configuration data, or header data resident in the mobile playback device 212 memory. The mobile playback device 212 includes an interface to the client computer system 214 through which the mobile playback device 212 receives compressed digital information files 216, software updates, and configuration changes from client computer system 214.
Downloading Digital Information Content, Software Updates, or Configuration Information From the Library Server to the Client Computer System
The client browser software 219 of client computer system 214 operates in cooperation with library management software 261 of library server 260 and the firmware resident on the mobile playback device 212 to provide a means by which a consumer may browse, preview, select, purchase, and take delivery of selected digital information content from digital information library server 260 across distribution network 240. The digital information content is typically downloaded to the client computer system 214 at the time of purchase, but it is possible to download digital information content either, 1) sometime after the purchase, or 2) multiple times after an initial purchase. The client browser 219 can be configured to download content to client computer system 214 without user intervention. In addition, portions of the client computer system 214 software itself or mobile playback device 212 resident software/firmware may be downloaded or updated from library server 260. The mobile playback device 212 resident software/firmware is downloaded through client computer system 214. If library server 260 has an updated or more recent copy of client computer system 214 software or mobile playback device 212 software/firmware, the library server copy is downloaded to replace the outdated version of the corresponding client computer system 214 software or mobile playback device software 212. The software is encrypted, scrambled, and digitally signed in a manner similar to the scrambling and delivery of the digital information files. Changes to the ID list, audio prompts, and other configuration data for playback device 212 can be downloaded in a manner similar to the downloading of software updates from library server 260.
The preferred embodiment utilizes three authentication processes to protect the transfer of information from server 260 to client system 214 and playback device 212. First, a point-to-point authentication protocol is performed whereby the library server 260 must verify that the requesting client computer system 214 is an authorized client and the client computer system 214 must verify that the library server 260 is an authorized provider. Secondly, a targeting protocol is performed whereby the library server 260 utilizes a set of identifiers (i.e. player IDs) for mobile playback devices 212 authorized to receive the selected download data from library server 260. The mobile playback device identifiers are provided by client computer system 214 or are referenced from user profiles stored on library server 260. In the targeting process, library server 260 formats and downloads data that can only be read by mobile devices 212 with these identifiers. Thirdly, a library server digital signature is appended to the downloaded data for use by the mobile playback device 212 to verify that the downloaded data was originated by an authorized library server. These three authentication processes of the present invention are described in detail in the following sections.
Point-to-Point Authentication Protocol
The library server 260, client computer system 214, and mobile playback devices 212 each have a unique verification sequence which is used to verify the authenticity of another system. In communications between library server 260 and client system 214, both systems alternately act to (1) request verification of the other system and (2) provide an authenticating response to a verification request. Communication between mobile devices 212 and client computer system 214 use a similar authentication protocol, as well as real-time communication between mobile devices 212 and library server 260 via client system 214. This verification sequence comprises a pre-defined set of bit streams or data structures which are sent by the requesting system (i.e. the system requesting verification) to the receiving system being authenticated (i.e. the respondent) in a point-to-point transmission. The receiving system must respond to the verification sequence in a pre-defined manner by sending particular response bit streams or data structures to the requesting system. If the appropriate response data from the respondent is received by the requesting system, the system being verified is considered an authorized system. Conversely, the system being verified is considered unauthorized if the appropriate response data is not received by the requesting system prior to a pre-defined time-out period. Both systems begin communication by acting as requesters and respondents in separate verification cycles. Upon completion of these point-to-point authentication cycles, further client/server processing only continues if both systems deem each other to be authorized systems.
In an alternate embodiment, point-to-point authentication is used in a subset of the communications among library server 260, client computer system 214, and mobile playback devices 212. In another embodiment, point-to-point authentication is not used and system security rests on the use of targeting and/or digital signature authentication.
Targeting Protocol
The targeting protocol of the present invention is a means and method for limiting the playback of digital information content, the adjustment of player configuration data, and the download of player operating code to a specified player 212/226 or a specified set of mobile playback devices 212. Each player 212/226 contains a unique player ID 223. The player ID 223 comprises a public player ID and a private player ID. The public player ID is a unique identifier and serves as a serial number for player identification. The private player ID is used to target data for individual mobile playback devices 212. Private player IDs are never sent through any communications link or network path, except during installation. In the preferred embodiment, private player IDs should be sufficiently diverse, but need not be unique.
Mobile playback devices 212 may be logically grouped together using a Group ID. Digital information content, software, or configuration data changes may be targeted to a group of mobile playback devices 212 defined by a group ID. Each player 212/226 includes memory space for storage of one or more group IDs 225 of which the particular player 212/226 is a member. Each group ID includes a public portion and a private portion, each of which is equivalent to the public and private player IDs, respectively. Each group is identified by a uniquely valued public ID that is not shared with other player or group IDs. Digital information content, software, or configuration data can be targeted to a particular group ID in the same way as it would be targeted for a specific player ID. Mobile playback devices 212 in the same group share the same Group ID. A particular Group ID is pre-defined as the global group to which all mobile playback devices 212 are a member. Mobile playback devices 212 may be members of more than one group. A particular player 212/226 is added to a new group by appending the new group ID to the set of group IDs 225 maintained in the particular player 212/226. The new group ID is appended after the server 260 provides a public group ID and a group key to the player 212/226 via client computer system 214. The player 212/226 generates a private group ID from the combination of the group key and the mobile playback device's 212 private player ID. As with the private player ID, the private group ID is never sent through any communications link or network path, except during installation. In an alternative embodiment, players receive the group private ID directly or by combining the group key with the players public ID or other known numeric value. In another alternative embodiment, the private group ID is not used in the targeting process and is not transferred to the player. The group assignment process may be restricted to using real-time communications between server 260 and the player via client system 214, or it may take place sometime after group assignments have been downloaded to client system 214. Having described the player IDs and group IDs defined in the present invention, the use of these IDs in the targeting protocol is described next.
Library server 260 includes a player ID table 266 as shown in
For small groups of mobile playback devices 212, each targeted header of a digital information file may contain a plurality of descrambling maps, each associated with a different player 212/226. In this manner, multiple mobile playback devices 212 can read a single file 220 stored on the client computer system 214.
A person of ordinary skill in the art will note that alternative methods of targeting exist. In an alternative embodiment, library server 260 uses the targeted recipient's private player 212/226 identifier or the targeted group's private group identifier to generate scrambling map 316. Descrambling map 322 is not stored with the file as it is already known by the recipient player or group. This method targets content to a single player 212/226 or group and achieves the identical result of preventing unauthorized playback of content.
In another alternative embodiment, library server 260 does not scramble the digital information content or uses a known key to scramble the digital information content. In this embodiment, descrambling map 322 is unnecessary and is not stored with the file. Either the public or private player 212/226 identifier can be stored in the header for targeting identification purposes. Upon receipt of data from library server 260, the player 212/226 checks if its player 212/226 identifier or group identifier is included in the header. This method assumes unmodified mobile playback devices 212 and achieves the identical result of preventing unauthorized playback of content.
In another alternative embodiment, the player IDs for the targeted mobile playback devices 212 are sent to the library server 260 by the client computer system 214 when the user registers with the library server 260 to obtain the user's client ID. In this alternative embodiment, these player IDs are stored on the library server 260 in a user profile. In this embodiment, the library server 260 manages the player IDs for the targeted mobile playback devices 212.
Digital Signature Protocol
The third authentication protocol used in the present invention is the digital signature protocol. For selected data blocks generated by library server 260 and downloaded to a client computer system 214, library server 260 uses its private library key 263 to apply a digital signature to the data block. The digital signature comprises a known bit string or data pattern which is combined with the data in data blocks that are downloaded from library server 260 to client computer system 214. The library server 260 may perform this operation on all the data blocks or a selected subset of the data blocks. After a data block is downloaded to a player 212/226 through a client computer system 214, the player 212/226 can retrieve the digital signature applied by the library server 260 using a public server key known to the player 212/226. The player 212/226 can thereby verify that the data block originated with an authorized library server 260. The public server key is also known to client computer system 214, which can perform the identical operation to verify that the data block originated with an authorized library server 260. In this embodiment, library server 260 performs signatures on the content. A person of ordinary skill in the art would realize that the signatures may also be performed on the digital information by authoring system 280. The signatures may also be performed in a multiple step process shared by authoring system 280 and library server 260.
In an alternate embodiment, digital signatures are applied to downloaded material by a trusted client computer system 214. In another alternate embodiment, digital signatures are not applied to downloaded material and system security rests on the use of targeting and/or point-to-point authentication.
Downloading Digital Information Content, Software Updates or Configuration Information From the Client Computer System to the Mobile Playback Device
In a first step, the client computer system 214 and the mobile device use the point-to-point authentication protocol described above to verify that an authorized mobile playback device 212 is communicating with an authorized client computer system 214. If this is the case, the mobile playback device 212 transmits its memory map to the client computer system 214 via the mobile device interface 221. A table of contents defining the available digital information files 220 and player configuration profiles resident in client computer system 214 is displayed along with the mobile playback device 212 memory map for a user of client computer system 214. The user selects which files 220 of client computer system 214 should replace portions or segments of specified mobile playback device 212 memory as defined by the mobile playback device 212 memory map. Alternately, client browser 219 can be configured to automatically perform this selection process. In either case, the user is prevented from selecting digital information content larger than the available memory of playback device 212. In addition, control software and/or configuration data for playback device 212 may be automatically updated by client computer 214. The specified digital information files 220, associated headers, operating code, or configuration data are thereafter downloaded into mobile playback device 212 memory. The mobile playback device 212 uses checksums to verify the integrity of the download. The mobile playback device 212 uses the server public key 215, the header, and the digital signature to authenticate the download as described above. The header descrambling map is used by targeted mobile playback devices 212 to unscramble the downloaded data. In other embodiments, mobile playback device 212 may unscramble the downloaded data and/or decompress the downloaded data before authenticating the signature. Each segment of the digital information content may be independently authenticated and validated using any of the techniques described above. Digital information prompts on the mobile playback device 212 guide the user to the desired portion of the downloaded digital information content as specified by the table of contents residing in the header of the downloaded data. The user may preview selected portions of the digital information content by selecting a preview option. The preview option plays a predetermined portion of a selected digital information program. Upon selection of a particular digital information program, the selected digital information program is played for the user after the mobile playback device 212 converts the digital information content into sound or displayable imagery which is played through an audio output means or displayed on a display device.
The software player 226 of client computer system 214 may also receive digital information content in approximately the same form as the digital information content downloaded to the mobile playback device 212; however, the digital information content for the software player 226 does not need to be downloaded to the software player 226. The software player 226 has direct access to the digital information content; because, it shares memory and/or disk storage space with the client computer system 214. Therefore, there are no downloading or memory map concerns. In the same manner as the mobile playback device 212, the software player 226 performs digital signature verification, verification of checksums, and receiving targeted information. In an alternative embodiment, software player 226 may use a communication protocol similar to that of mobile playback device 212 when receiving digital information content, configuration information, and dynamically downloaded software.
This concept can also be used for the authoring and authorization servers 280 and 270, respectively. As shown in
In another alternative embodiment of the present invention, digital information programming selections are made using the client computer system 214 and library server 260 as described above; however, the selections are delivered on mass storage medium 241. Mass storage medium 241 represents any of a variety of conventional mass storage technologies including CD-ROM, PCMCIA cards, DVDs, floppy disks, removable hard drives, digital magnetic tape, optical cards, flash memory or other optical, magnetic, electronic, or semiconductor memory devices. Upon selection by a user of a client computer system 214, selected programming is targeted and scrambled as described above and transferred to a selected mass storage medium 241 and mailed, hand-delivered, or held for pickup by the user. Once the user takes physical possession of the selected mass storage media 241, the selected programming may be read from the mass storage medium 241 by the client browser 219 and thereafter transferred to the mobile playback device 212 as described above.
An alternate embodiment of the system uses a common communication network to connect all system components. In
Thus, a method and apparatus for implementing a computer network based digital information library system employing authentication and encryption protocols for the secure transfer of digital information library programs, software, and configuration data to a client computer system and a mobile digital information playback device removably connectable to the client computer system is disclosed. Although the present invention has been described with respect to specific examples and subsystems, it will be apparent to those of ordinary skill in the art that the invention is not limited to these specific examples or subsystems but extends to other embodiments as well. The present invention includes all of these other embodiments as specified in the claims that follow.
The present patent application is a divisional of Ser. No. 09/234,044 filed Jan. 19, 1999, which is a continuation of Ser. No. 08/710,114 filed Sep. 12, 1996 now issued as U.S. Pat. No. 5,926,624.
Number | Name | Date | Kind |
---|---|---|---|
3763330 | Fulwiler | Oct 1973 | A |
3871112 | Licitis | Mar 1975 | A |
4159417 | Rubincam | Jun 1979 | A |
4266243 | Shutterly | May 1981 | A |
4393277 | Besen et al. | Jul 1983 | A |
4455651 | Baran | Jun 1984 | A |
4473824 | Claytor | Sep 1984 | A |
D276626 | Lockwood | Dec 1984 | S |
4490810 | Hon | Dec 1984 | A |
4499568 | Gremillet | Feb 1985 | A |
4545023 | Mizzi | Oct 1985 | A |
4575621 | Dreifus | Mar 1986 | A |
4591974 | Dornbush et al. | May 1986 | A |
4601011 | Grynberg | Jul 1986 | A |
4658093 | Hellman | Apr 1987 | A |
D289777 | Thomas | May 1987 | S |
4682368 | Takahashi | Jul 1987 | A |
4698776 | Shibata | Oct 1987 | A |
4725977 | Izumi et al. | Feb 1988 | A |
4772873 | Duncan | Sep 1988 | A |
4779080 | Coughlin et al. | Oct 1988 | A |
4788543 | Rubin | Nov 1988 | A |
4788675 | Jones et al. | Nov 1988 | A |
4791565 | Dunham et al. | Dec 1988 | A |
4851931 | Parker et al. | Jul 1989 | A |
4855725 | Fernandez | Aug 1989 | A |
4885725 | McCarthy et al. | Dec 1989 | A |
4891838 | Faber | Jan 1990 | A |
4899292 | Montagna et al. | Feb 1990 | A |
D306589 | Murayama | Mar 1990 | S |
4916441 | Gombrich | Apr 1990 | A |
4924378 | Hershey et al. | May 1990 | A |
4937863 | Robert et al. | Jun 1990 | A |
4941040 | Pocock et al. | Jul 1990 | A |
4949187 | Cohen | Aug 1990 | A |
4989179 | Simko | Jan 1991 | A |
5008872 | Tomoda et al. | Apr 1991 | A |
5018017 | Sasaki et al. | May 1991 | A |
5042070 | Linna et al. | Aug 1991 | A |
5055947 | Satoh | Oct 1991 | A |
5065258 | Warren et al. | Nov 1991 | A |
5065345 | Knowles et al. | Nov 1991 | A |
5091939 | Cole et al. | Feb 1992 | A |
5091942 | Dent | Feb 1992 | A |
5099422 | Foresman et al. | Mar 1992 | A |
5115508 | Hatta | May 1992 | A |
5121492 | Saville, III et al. | Jun 1992 | A |
5126990 | Efron et al. | Jun 1992 | A |
5132992 | Yurt et al. | Jul 1992 | A |
5133076 | Hawkins et al. | Jul 1992 | A |
D330544 | Kane | Oct 1992 | S |
5153729 | Saito | Oct 1992 | A |
5159182 | Eisele | Oct 1992 | A |
5172413 | Bradley et al. | Dec 1992 | A |
5181107 | Rhoades | Jan 1993 | A |
5191410 | McCalley et al. | Mar 1993 | A |
5191573 | Hair | Mar 1993 | A |
5203001 | Yanagiuchi et al. | Apr 1993 | A |
5208665 | McCalley et al. | May 1993 | A |
5210611 | Yee et al. | May 1993 | A |
5221838 | Gutman et al. | Jun 1993 | A |
5226080 | Cole et al. | Jul 1993 | A |
5237612 | Raith | Aug 1993 | A |
D339329 | Lacko | Sep 1993 | S |
D339554 | Davidson | Sep 1993 | S |
5247347 | Litteral et al. | Sep 1993 | A |
5249166 | Hamilton et al. | Sep 1993 | A |
5251909 | Reed et al. | Oct 1993 | A |
5253275 | Yurt et al. | Oct 1993 | A |
5311423 | Clark | May 1994 | A |
5319582 | Ma | Jun 1994 | A |
5333116 | Hawkins et al. | Jul 1994 | A |
5355302 | Martin et al. | Oct 1994 | A |
5357475 | Hasbun et al. | Oct 1994 | A |
5359698 | Goldberg et al. | Oct 1994 | A |
5365502 | Misono | Nov 1994 | A |
5371532 | Gelman et al. | Dec 1994 | A |
5383112 | Clark | Jan 1995 | A |
5388196 | Pajak et al. | Feb 1995 | A |
5406626 | Ryan | Apr 1995 | A |
D358364 | Siddoway | May 1995 | S |
5420690 | Koishi | May 1995 | A |
5440336 | Buhro et al. | Aug 1995 | A |
5442389 | Blahut et al. | Aug 1995 | A |
5442390 | Hooper et al. | Aug 1995 | A |
5442789 | Baker et al. | Aug 1995 | A |
5463601 | Yanagisawa | Oct 1995 | A |
5483658 | Grube et al. | Jan 1996 | A |
D366874 | Robinson et al. | Feb 1996 | S |
5491774 | Norris et al. | Feb 1996 | A |
5491820 | Belove et al. | Feb 1996 | A |
5493677 | Balogh et al. | Feb 1996 | A |
5499221 | Ito et al. | Mar 1996 | A |
5499294 | Friedman | Mar 1996 | A |
5504815 | Ryan et al. | Apr 1996 | A |
5506904 | Sheldrick et al. | Apr 1996 | A |
5511000 | Kaloi et al. | Apr 1996 | A |
5511122 | Atkinson | Apr 1996 | A |
5513260 | Ryan | Apr 1996 | A |
D370484 | Williamson et al. | Jun 1996 | S |
5524051 | Ryan | Jun 1996 | A |
5539658 | McCullough | Jul 1996 | A |
5541638 | Story | Jul 1996 | A |
5550863 | Yurt et al. | Aug 1996 | A |
5553143 | Ross et al. | Sep 1996 | A |
5555098 | Parulski | Sep 1996 | A |
5557541 | Schulhof et al. | Sep 1996 | A |
5572442 | Schulhof et al. | Nov 1996 | A |
5574787 | Ryan | Nov 1996 | A |
5579471 | Barber et al. | Nov 1996 | A |
5586186 | Yuval et al. | Dec 1996 | A |
5590195 | Ryan | Dec 1996 | A |
5592511 | Schoen et al. | Jan 1997 | A |
5615061 | Singh | Mar 1997 | A |
D379456 | Osiecki | May 1997 | S |
5629980 | Stefik et al. | May 1997 | A |
5630121 | Braden-Harder et al. | May 1997 | A |
5634012 | Stefik et al. | May 1997 | A |
5634080 | Kikinis et al. | May 1997 | A |
5636276 | Brugger | Jun 1997 | A |
5638443 | Stefik et al. | Jun 1997 | A |
5646992 | Subler et al. | Jul 1997 | A |
5646997 | Barton | Jul 1997 | A |
5659613 | Copeland et al. | Aug 1997 | A |
5664228 | Mital | Sep 1997 | A |
5669283 | Iida et al. | Sep 1997 | A |
5673315 | Wolf | Sep 1997 | A |
5673316 | Auerbach et al. | Sep 1997 | A |
5675734 | Hair | Oct 1997 | A |
5699526 | Siefert | Dec 1997 | A |
5715403 | Stefik | Feb 1998 | A |
5724582 | Pelanek et al. | Mar 1998 | A |
5727156 | Herr-Hoyman et al. | Mar 1998 | A |
5727159 | Kikinis | Mar 1998 | A |
5732219 | Blumer et al. | Mar 1998 | A |
5734719 | Tsevdos et al. | Mar 1998 | A |
5734823 | Saigh et al. | Mar 1998 | A |
5734891 | Saigh | Mar 1998 | A |
5745568 | O'Connor et al. | Apr 1998 | A |
5745879 | Wyman | Apr 1998 | A |
5752244 | Rose et al. | May 1998 | A |
5757907 | Cooper et al. | May 1998 | A |
5758069 | Olsen | May 1998 | A |
5761485 | Munyan | Jun 1998 | A |
5769269 | Peters | Jun 1998 | A |
5781723 | Yee et al. | Jul 1998 | A |
5793980 | Glaser et al. | Aug 1998 | A |
5796824 | Hasebe et al. | Aug 1998 | A |
5809144 | Sirbu et al. | Sep 1998 | A |
5809246 | Goldman | Sep 1998 | A |
5819043 | Baugher et al. | Oct 1998 | A |
5825883 | Archibald et al. | Oct 1998 | A |
5841979 | Schulhof et al. | Nov 1998 | A |
5845065 | Conte et al. | Dec 1998 | A |
5860068 | Cook | Jan 1999 | A |
5881225 | Worth | Mar 1999 | A |
5889860 | Eller et al. | Mar 1999 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5910987 | Ginter et al. | Jun 1999 | A |
5915019 | Ginter et al. | Jun 1999 | A |
5917912 | Ginter et al. | Jun 1999 | A |
5918213 | Bernard et al. | Jun 1999 | A |
5920861 | Hall et al. | Jul 1999 | A |
5926624 | Katz et al. | Jul 1999 | A |
5928330 | Goetz et al. | Jul 1999 | A |
D413097 | Chang | Aug 1999 | S |
5931901 | Wolfe et al. | Aug 1999 | A |
5933498 | Schneck et al. | Aug 1999 | A |
5940504 | Griswold | Aug 1999 | A |
5943422 | Van Wie et al. | Aug 1999 | A |
5949876 | Ginter et al. | Sep 1999 | A |
5963916 | Kaplan | Oct 1999 | A |
5966440 | Hair | Oct 1999 | A |
5969283 | Looney et al. | Oct 1999 | A |
5970252 | Buxton et al. | Oct 1999 | A |
5982891 | Ginter et al. | Nov 1999 | A |
5991402 | Jia et al. | Nov 1999 | A |
6002720 | Yurt et al. | Dec 1999 | A |
6005938 | Banker et al. | Dec 1999 | A |
D419956 | Lucaci et al. | Feb 2000 | S |
6026368 | Brown et al. | Feb 2000 | A |
6028936 | Hillis | Feb 2000 | A |
6044471 | Colvin | Mar 2000 | A |
6067562 | Goldman | May 2000 | A |
6088450 | Davis et al. | Jul 2000 | A |
6112181 | Shear et al. | Aug 2000 | A |
6138119 | Hall et al. | Oct 2000 | A |
6141693 | Perlman et al. | Oct 2000 | A |
6157721 | Shear et al. | Dec 2000 | A |
6157929 | Zamiska et al. | Dec 2000 | A |
6158005 | Bharathan et al. | Dec 2000 | A |
6170060 | Mott et al. | Jan 2001 | B1 |
6182126 | Nathan et al. | Jan 2001 | B1 |
6185683 | Ginter et al. | Feb 2001 | B1 |
6226618 | Downs et al. | May 2001 | B1 |
6230173 | Ferrel et al. | May 2001 | B1 |
6237786 | Ginter et al. | May 2001 | B1 |
6240185 | Van Wie et al. | May 2001 | B1 |
6253193 | Ginter et al. | Jun 2001 | B1 |
6292569 | Shear et al. | Sep 2001 | B1 |
6363488 | Ginter et al. | Mar 2002 | B1 |
6385596 | Wiser et al. | May 2002 | B1 |
6389402 | Ginter et al. | May 2002 | B1 |
6389541 | Patterson | May 2002 | B1 |
6427140 | Ginter et al. | Jul 2002 | B1 |
6449367 | Van Wie et al. | Sep 2002 | B2 |
Number | Date | Country |
---|---|---|
0 128 093 | Dec 1984 | EP |
0 302 710 | Feb 1989 | EP |
2 651 352 | Mar 1991 | FR |
WO 8704309 | Jul 1987 | WO |
WO 9635987 | Nov 1996 | WO |
Number | Date | Country | |
---|---|---|---|
20020107941 A1 | Aug 2002 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09234044 | Jan 1999 | US |
Child | 09867505 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 08710114 | Sep 1996 | US |
Child | 09234044 | US |