The management of media product life cycles and more specifically the management of all physical and digital media (disc, file, or cartridge) life cycles through destruction or end of life of the media and reporting the destruction to the studio for royalty reimbursement.
In the constantly changing world of all digital media, DVDs and other media disc systems are becoming obsolete at a growing rate. As a result, DVDs, Blu-rays, and CDs are now returned to stores because the media has either already been purchased or is stored in the digital cloud. However, this creates an issue when stores receive returned media items and, in particular, those media items that have been opened. Often these media items cannot be resold unless the retailer has a secondary or open box market or policy. Therefore, the retailer is left with a loss for that media item resulting in a major issue for the budgets of retailer entertainment departments. There is also the issue of media items that arrive at the retailer damaged in transit. If the media cannot be resold, it must be destroyed and verification of the destruction/unplayability is required in order for the store to receive a return on the royalty payment paid to the movie, recording, or software production studio. Similarly, if media items cannot be resold due to being opened or damaged after purchase, then they must also be destroyed in order for the retailer to recover the royalty that was paid or reverse the studio “pay on scan” process. Thus, a system for media inventory management is required that can automate the process and reduce the millions of dollars that retailers spend to manage their inventory of media items and also reduce the internal shrink associated with taking live product off the shelf. There is a measurable number of the amount of shrink of product from the time it's removed from the shelf to the time the product actually makes it to the studio return facility.
Traditional systems and methods have required the store to manually return the media to the studio for credit and in some instances destroy the media. This manual operation to return the media to the studio is slow and inaccurate and creates an opportunity for internal shrink and loss. In many cases, the media is not destroyed in a manner that renders it unreadable, unplayable or unusable. A manual destruction policy can create several potential problems, especially if an employee cannot be monitored during the process. The destruction must also be documented and reported in a detailed manner in order for a studio to grant repayment of the royalty. Again, issues are created when an employee fails to document the destruction properly or generate the proper report.
Disclosed is a media life cycle management system for the implementation and reporting of media destruction. The media destruction allows a retailer to recover the prepaid or pay on scan royalties from the media production studios, whether it is a movie, music, software, or video game. These prepaid or pay on scan royalty payments can be returned or credited to the retail store if they can provide verification and proof of media destruction or unplayability.
The return/credit of the royalty payment and proof of destruction can be an issue for many retail stores to prove and appropriately prepare documentation for the studio. The proof and documentation requirement is one of the problems that exemplary embodiments of the present invention solve. The present invention in an exemplary embodiment performs the destruction of the media in a manner to make it unusable and unreadable, while also recording proof of the media destruction. Studios look for the media item to be unusable and unreadable when providing reimbursement of the royalty payment.
In order to determine the specific studio, and thus what formatting and reporting setup to use the system, in one embodiment, must also read the media, and in some cases record pictures or video of any visible identifying marks or serial numbers. The identifying data read from the media, the pictures and/or video can then be saved locally or remotely. From the local or remote storage, a report generation system can prepare a report for each studio related to the media in the proper or preferred format, alleviating human error.
In certain embodiments, a user can provide the media item and, prior to destruction, it can also be exchanged if it is readable. Many times this kiosk will only be used by retailer employees, however, a media trade-in kiosk could also utilize the destruction subsystem for those media items that are deemed unreadable. The kiosk can also be used by customer service to determine whether or not a return is actually defective. In random testing of customer returns, on average over 60% is not actually damaged as the customer has reported as their reason for returning the product for refund. This gives the retailer the ability to validate a media's playability if this feature is so desired.
Disclosed is a retail operation friendly media management kiosk system for the destruction of media items, specifically the verified destruction and/or rendering unplayable of media items and reporting of said destruction/unplayability to the appropriate entity for reimbursement. The kiosk system utilizes a method and subsystem processes to achieve the destruction/unplayability and reporting. It would be understood that in some cases unplayability can be achieved without the destruction of the media item. In an exemplary embodiment of the present invention, the system comprises a kiosk with the ability to accept media items, verify their authenticity, determine the readability of the media item, determine the point of destruction that prevents any readability or usability of the media item, initiate destruction of the media item, record the destruction/unplayability of the media item, and generate reports of the destruction/unplayability. In cases where the media is determined to not be approved for destruction through established protocols and database listings, the media item can be sent to a recycle or storage bin/hopper thus allowing the media item to be retrieved at a later time or date.
Each kiosk 102 is a standalone system, of a rectangular design that includes a square base, a rectangular front, and a rearward tilting face that includes a display 104. The kiosk 102 encloses the internal operational components of the system. The display 104 can be a touchscreen or other manner of display with a user input device 106 for interfacing with the user 101. A camera 103 is also available above the display 104 to allow the user to interface with live support throughout their experience as needed. The display 104 and the user input device 106 allows a user 101 to access the kiosk interface. The user input device 106 can include, but is not limited to, a touchpad, a keyboard, a trackball, or a computer mouse. Along the rectangular front portion of the kiosk 102, are a plurality of slots or openings such as a first media acceptance slot 108, and second media acceptance slot 110. The first media acceptance slot 108 and second media acceptance slot 110 can be used to accept media item 105. The first media acceptance slot 108 can lead to the destruction system, while the second media acceptance slot 110 can lead to a sell-through or recycle program. Additional slots or openings can be included in alternative embodiments that do not fall outside the scope of the invention and can include, but are not limited to, a receipt printer slot 112, a scanner slot 114, a card reader slot 116, and an initiate destruction button or emergency stop button 118. There is also the media item removal door 119 that allows a technician or service personnel to retrieve media items from the kiosk or make repairs to the internal components. It would be understood that these slots could be presented in a number of combinations, orders, and presentations, and are not limited by their description as a slot as the dimensions required for their purpose may change over time. Also these slots can be remotely enabled or disabled depending on the particular use case.
The kiosk can communicate with a computer network 120 through the management server 122. The management server 122, in combination with other components of the kiosk system, coordinate with the kiosk system 102. The management server 122 can be a part of the kiosk 102 or remotely connected to a server accessible through the computer network 120. The computer network 120 can be a private network, utilizing a hardwired or private wireless network, or a public network such as the internet. Thus, any network topology that allows the kiosk to interact with a centralized database and management operating center can be utilized by the computer network 120.
In an exemplary embodiment, the media acceptance subsystem 232 can be directly associated with the verification subsystem 244 as seen in
Once the media item 273 proportionally transverses the upper and lower supports 270 and 272, the media transfer engager 274 can engage with the media item in such a way as to transfer it from the upper and lower supports 270 and 272 to the carousel 276. The carousel is not limited to being only a carousal, it could also comprise a media tray, a media gripper, a media belt, or a media post system. The kiosk can also utilize a plurality of carousals in alternative embodiments. The media transfer engager 274 can include, but is not limited to, posts, hoppers, arms, fingers, disc media trays and other mechanical or electro-mechanical methods of receiving and capturing the media item 273, The carousel 276 moves the media item 273 through the stages of the verification subsystem 244. The carousel 276 is moved utilizing a combination of a motor and plurality of gears, fitted slides or belts 288. The plurality of gears or belts could also encompass other known methods of mechanical power transmission. The motor and plurality of gears 288 can include, but is not limited, to a stepper motor, a Direct Current motor, worm gears, intersecting gears, belts, or a combination thereof. It would be understood that the different stages could be placed in any number of combinations without departing from the spirit of the invention.
An authenticity and security elements stage 278 allows the media item 273 to be analyzed for authenticity and security elements. The authenticity stage performs analysis of the media item 273 through processes such as, but not limited to, reading the data on the disc, validating imbedded hologram if exists, and analyzing the disc for holographic or other security images on the disc, or reading the security data ring. At each stage of the verification subsystem 244, the media item 273 can be read by optical, laser, and other known methods of reading data such as, but not limited to, the rotation of a media disc to allow for optical or laser reading. The optical scanning unit 279 comprising an HD camera or other imaging system as part of the scanner that takes a digital picture of the hologram and then allows the processor to authenticate the media item 273 by verifying security markings such as holographic, images or labels along the surfaces of the media item 273.
The pinhole and physical damage stage 280 allows the media item 273 to be analyzed for gradient depth of the physical damage, scratch depth and readability. The pinhole and physical damage stage 280 also has an imaging and light emitting arm 282 that works in conjunction with the imaging and light detection head 284. The imaging and light emitting arm 282 captures images of the media item's readable surface as well as shining a light source on the media item surface. The imaging and light detection head 284 captures images of the readable surface of dual layer media items, while also moving with the imaging and light emitting arm 282 to determine if there are any pinhole or voids in the media item 273. The imaging and light emitting arm 282 can have the imaging and light detection head 284 both above and below the media item 273. This is to ensure that the readable surface of a media item 273 is captured. The imaging and light detection head 284 can include a plurality of high powered Light Emitting Diodes (“LEDs”), a high definition optical sensor capable of capturing still or video images, and a laser unit for measuring the gradient thickness of the media for damage such as deep scratches or worn areas that allow light through.
The carousel 276 can move the media item 273 after the verification stages to a storage position 286. In addition, the kiosk 202 could include a carousel with additional slots or a second carousel to store additional media items during a media trade in, allowing a user 201 to provide multiple media items for trade-in at one time. Similarly, for an embodiment, that includes the media item packaging and documentation receiving slots, similar media acceptance subsystems and verification systems to those describe above would be utilized.
The carousel 276 for the verification subsystem for use with packaging and documentation would utilize a tray system with glass or other transparent material such as a polycarbonate. A clear conveyor belt could also be utilized as well as an alternate to carousel 276. The mechanical, electro-mechanical, and electrical components are controlled via the processor 230. For USB drives or memory cards the memory acceptance subsystem can include a module that would read the device, if readable then it would be pulled into the kiosk for physical damage verification and media trade-in. The module would then be replaced with an empty module. Alternatively, the USB or memory card attachment system could be released from the kiosk 202 that connects securely to an internal storage area.
Returning to
Each of these servers can be connected directly or remotely to the management server 222 through the computer network 220 through wired or wireless connections. In an exemplary embodiment, the inventory database 256 would be connected and synchronized to the retailer and vendor inventory databases while the accounting database would be under the control of the kiosk destruction system. The management server 222 can accept computer readable medium 250 for running executable programs or data transferability to the local server processor (not shown) or processor 230. A Content Management System (“CMS”) 251 is also connected to the management server 222 to provide for the management of incoming and outgoing digital content. In addition, the CMS 251 can also maintain and interface with the various databases and servers to ensure connections to remotely stored media and that locally stored media is up to date.
The user 201 utilizes the display 204 and/or the input device 206 to interface with the kiosk 202 to accept or deny the available destruction options. Throughout the process, the user 201 can request live support utilizing the camera 203, display 204, the input device 206, as well via the live interface 246 that communicates with the remote live support system 266 via the communication system 242 and computer network 220. It can be understood that the camera 203 can also include a microphone for voice communication. Once the kiosk 202 has performed the destruction, the user can accept a receipt from the printer 240 as initiated by the processor 230 and a photo is taken of the user. The kiosk 202 also has a control button 234 that allows the user to initiate the destruction subsystem 238 or temporarily interrupt the destruction subsystem 238. A scanner 236 allows the user 201 to scan the media item prior to inserting the media item into the media acceptance subsystem 232. If the user 201 has an identification card or other form of identification, the user can utilize the available card reader 205 to access the kiosk interface.
In
When a user initiates use of the kiosk interface 302, one of the menus available to them is the destroy menu 310. The user can utilize the destroy menu options 311 to initiate destroy and recycle (option 1), add additional materials to the destroy and recycle process (option 2), initiate destruction of unreadable materials (option 3), and recycle only (option 4). A user utilizing option 1 can initiate the destroy and recycle process via the destruction subsystem. Additionally, one of the options 311 in the destroy menu 310 must be selected prior to initiation of the media acceptance subsystem. Under option 2, a user can continue a destroy and recycle process by adding additional material or media items. Option 3 allows a user to initiate the destruction process for a media item that is known to be unreadable or a media item that is known to be unrecognizable by the verification subsystem, such as bonus media items or copied media. The final option in this menu is the recycle only option. In some instances, the user may want to skip the destruction process and only recycle the media item, this option is an alternative to those media items that could be destroyed under option 3. There is also option 5, in cases where after the kiosk has authenticated and checked the physical damage of the device, a user can also sell their media back to the retailer if it has a resale or secondary market store. Alternatively, if the kiosk is used by retail employees or industry employees option 5 may be removed.
The service menu 320 allows the service technician or administrator to choose from the service options 321. The first option (option 1) allows the service technician or administrator to power down the kiosk system. Option 2 allows the service technician or administrator to trigger a reboot of the kiosk system. Under the third option (option 3) the central database service request option allows the service technician or administrator to request a change to the central database add/delete users, request user reports or a repair based on an error discovered when attempting to process a request. The fourth option (option 4) allows the service technician or administrator to remove the recycle bin from the system for disposal of the recycled and destroyed media items. Option 5 allows the service technician or administrator to perform service to the printer, such as replacing paper, ink or other necessary maintenance. It should be understood that each of these requests can trigger logs or reports that can be stored locally or transmitted to the network operation center.
The kiosk system must be able to generate reports based on the media items it has processed, and the report menu 330 can be chosen from the kiosk interface 302, which has five report menu options 331. Option 1 allows the user to generate a report that provides information on the media that has been destroyed. Under option 2, there is the royalty reimbursement report, allowing the user to generate a report noting the amount of reimbursement requests made to the various studios. Option 3 allows the user to request an accounting report that indicates the amount of reimbursement requests made to each studio, the amount each studio has paid, and any media items that have been processed as sell-through. Option 4 allows the user to generate a report for the studios based on the media items destroyed.
There is also the Firmware menu 340 that allows a service technician to perform several services via the firmware options 341. These services include: current firmware (option 1), check for firmware update (option 2), update firmware (option 3), and revert firmware (option 4). Under option 1, current firmware, the service technician can check the current version of the firmware prior to performing any services to the kiosk system. For option 2 the technician can initiate a check for the latest firmware without initializing an update. This option is very useful in an environment where updates can happen almost daily. Some updates will not be required at specific locations while in other locations, an update is absolutely necessary. Under option 3 the technician can initiate a firmware update if one is available without waiting for a status check. In an exemplary embodiment there would also be a submenu that would allow the technician to lockout the kiosk until firmware update is complete. A dedicated lockout screen can be utilized to show that the kiosk is running an operation and is useable. Alternatively, there can be an option to have the kiosk appear shutdown. Additionally, either of the two previous options can be utilized with an automatic power down at the conclusion of the firmware update. If the power down option was chosen then the Network Operation Center can remotely power up or reboot the kiosk or it could be initiated upon the next opening of the retail location where the kiosk is located. Finally, there is option 4 which would allow the technician to revert the kiosk firmware to a previous version in the event that an undiscovered bug in the latest firmware comes to light after its installation. It should be understood that all of these options and services could also be performed remotely through either the management server, network operation center or the computer network.
One menu that for many users will be the most critical is the live interface portal 350. The live interface portal 350 allows a user to request live support via the live support options 351. Among the live support options 351 are online chat, video chat, and voice chat. The online chat option (option 1) allows the user to interact with live support utilizing the kiosk display and kiosk input device(s). For video and voice chat, a user can utilize the kiosk display and the kiosk camera and microphone to connect with live support through the kiosk interface 302.
If the user is utilizing the media item destruction and recycle option 408, then after the media item has been accepted and ingested 420 by the kiosk media acceptance subsystem, the media item is then moved to the media verification and documentation process 424. The media verification and documentation process 424 verifies the media item authenticity, as well as records and documents the media item by its title, version and media type. The media item is verified through a process and subsystem that comprises an optical imaging unit, a light emitting unit, and a laser unit. Once the media item has been verified, it is then moved to the destruction process 426. During the destruction process 426, the media item is scanned to determine the specific point of destruction that will render it unusable or unreadable. Once the point is found, the media item is punctured or rendered unusable via another form of destruction at that point. The record and data generation process 428 can begin, during the destruction of the media item, and continue after the destruction of the media item. The destruction of the media item is recorded to provide proof to the studio of the destruction, and in addition, to allow the kiosk system to provide an accounting of the media processed. The accounting process 430, allows the kiosk to report the destruction of the media item to the studio, while also receiving reimbursement for the prepaid royalty on the media item. Once the accounting process 430 has completed or the user has completed their services to the kiosk, a receipt can be printed 432. In alternative embodiments of the present invention, the printer could also print any reports that are generated, on full size letter paper. After the user has completed their task, the kiosk can be returned to its waiting state, through a return 434.
In alternative embodiments, the media item could include classified material that is unreadable due to security measures on the media item. For these media items, a multiple stage destruction process would be used. As an example, the punch or other destruction device may initiate destruction at two, four, or more points along the media item.
While various embodiments in accordance with the principles disclosed herein have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of this disclosure should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with any claims and their equivalents issuing from this disclosure associated with the destruction of all media. Furthermore, the above advantages and features are provided in described embodiments, but shall not limit the application of such issued claims to processes and structures accomplishing any or all of the above advantages.
Additionally, the section headings herein are provided for consistency with the suggestions under 37 C.F.R. 1.77 or otherwise to provide organizational cues. These headings shall not limit or characterize the invention(s) set out in any claims that may issue from this disclosure. Specifically, and by way of example, although the headings refer to a “Field of the Disclosure,” the claims should not be limited by the language chosen under this heading to describe the so-called field. Further, a description of a technology as background information is not to be construed as an admission that certain technology is prior art to any embodiment(s) in this disclosure. Neither is the “Brief Summary” to be considered as a characterization of the embodiment(s) set forth in issued claims. Furthermore, any reference in this disclosure to “invention” in the singular should not be used to argue that there is only a single point of novelty in this disclosure. Multiple embodiments may be set forth according to the limitations of the multiple claims issuing from this disclosure, and such claims accordingly define the embodiment(s), and their equivalents, that are protected thereby. In all instances, the scope of such claims shall be considered on their own merits in light of this disclosure, but should not be constrained by the headings set forth herein.
Number | Name | Date | Kind |
---|---|---|---|
4910675 | Burns et al. | Mar 1990 | A |
5046305 | Skubic et al. | Sep 1991 | A |
5206814 | Cahlander et al. | Apr 1993 | A |
5210729 | Schmidt et al. | May 1993 | A |
5247407 | Schimidt | Sep 1993 | A |
5265966 | Schmidt | Nov 1993 | A |
5351466 | Lee | Oct 1994 | A |
5415519 | Lee et al. | May 1995 | A |
5421950 | Parrish | Jun 1995 | A |
5542768 | Rother et al. | Aug 1996 | A |
5679944 | Cusey et al. | Oct 1997 | A |
5734629 | Lee et al. | Mar 1998 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5914918 | Lee et al. | Jun 1999 | A |
5946216 | Hollerich | Aug 1999 | A |
6041703 | Salisbury et al. | Mar 2000 | A |
6092105 | Goldman | Jul 2000 | A |
6141298 | Miller | Oct 2000 | A |
6220640 | Jensen et al. | Apr 2001 | B1 |
6226618 | Downs et al. | May 2001 | B1 |
6321649 | Vangen et al. | Nov 2001 | B1 |
6321983 | Katayanagi | Nov 2001 | B1 |
6532201 | Hogan | Mar 2003 | B1 |
6655580 | Ergo et al. | Dec 2003 | B1 |
6748539 | Lotspiech | Jun 2004 | B1 |
6760053 | Rother | Jul 2004 | B2 |
6778201 | Rother | Aug 2004 | B2 |
6827509 | Suden et al. | Dec 2004 | B2 |
6848113 | Klein | Jan 2005 | B2 |
6957746 | Martin et al. | Oct 2005 | B2 |
7014108 | Sorenson et al. | Mar 2006 | B2 |
7092320 | Lee et al. | Aug 2006 | B1 |
7108171 | Ergo | Sep 2006 | B1 |
7127725 | Lee | Oct 2006 | B2 |
7305684 | Klein | Dec 2007 | B2 |
7311367 | Salisbury et al. | Dec 2007 | B2 |
7331521 | Sorenson et al. | Feb 2008 | B2 |
7448051 | Nelson et al. | Nov 2008 | B2 |
7487129 | Doll-Steinberg | Feb 2009 | B2 |
7494048 | Gusler et al. | Feb 2009 | B2 |
7530083 | Benedikt et al. | May 2009 | B2 |
7536324 | Perkowski | May 2009 | B2 |
7748619 | Martin et al. | Jul 2010 | B2 |
7774233 | Barber et al. | Aug 2010 | B2 |
7815071 | Martin et al. | Oct 2010 | B2 |
7860606 | Rudy | Dec 2010 | B2 |
7865432 | Doran et al. | Jan 2011 | B2 |
8024272 | Doran et al. | Sep 2011 | B2 |
8033375 | Doran et al. | Oct 2011 | B2 |
8038059 | Martin et al. | Oct 2011 | B2 |
8095236 | Rudy et al. | Jan 2012 | B2 |
8103586 | Doran et al. | Jan 2012 | B2 |
8162383 | Curtis | Apr 2012 | B2 |
8229851 | Doran et al. | Jul 2012 | B2 |
8332313 | Doran et al. | Dec 2012 | B2 |
8482413 | Martin | Jul 2013 | B2 |
8550294 | Martin | Oct 2013 | B2 |
8682715 | Cedeno | Mar 2014 | B1 |
8726010 | Mathur et al. | May 2014 | B2 |
8760296 | Martin | Jun 2014 | B2 |
8874467 | Yahn et al. | Oct 2014 | B2 |
8935532 | Mittal et al. | Jan 2015 | B2 |
8965570 | Rudy | Feb 2015 | B2 |
9064268 | Larrick et al. | Jun 2015 | B2 |
9227800 | Martin | Jan 2016 | B2 |
9233812 | Martin et al. | Jan 2016 | B2 |
9245310 | Zhao et al. | Jan 2016 | B2 |
9290338 | Martin et al. | Mar 2016 | B2 |
9704127 | Bock | Jul 2017 | B2 |
20010029583 | Palatov et al. | Oct 2001 | A1 |
20020035515 | Moreno | Mar 2002 | A1 |
20020095680 | Davidson | Jul 2002 | A1 |
20030135465 | Lee et al. | Jul 2003 | A1 |
20030177928 | Harris | Sep 2003 | A1 |
20030182156 | Bock | Sep 2003 | A1 |
20040034785 | Tai et al. | Feb 2004 | A1 |
20040254940 | Brush | Dec 2004 | A1 |
20050018216 | Barsness et al. | Jan 2005 | A1 |
20050049931 | Wisnudel et al. | Mar 2005 | A1 |
20050071045 | Clini | Mar 2005 | A1 |
20050076020 | Huntley et al. | Apr 2005 | A1 |
20050096936 | Lambers | May 2005 | A1 |
20050102191 | Heller | May 2005 | A1 |
20050114205 | Nelson et al. | May 2005 | A1 |
20050125355 | Fein | Jun 2005 | A1 |
20050149446 | Le Pannerer et al. | Jul 2005 | A1 |
20050172122 | Risan et al. | Aug 2005 | A1 |
20050213489 | Jensen et al. | Sep 2005 | A1 |
20050213491 | Nelson et al. | Sep 2005 | A1 |
20050213492 | Jensen et al. | Sep 2005 | A1 |
20050213493 | Nelson et al. | Sep 2005 | A1 |
20050213494 | Nelson et al. | Sep 2005 | A1 |
20050227773 | Lu et al. | Oct 2005 | A1 |
20060011716 | Perkowski | Jan 2006 | A1 |
20060028398 | Willmore | Feb 2006 | A1 |
20060036549 | Wu | Feb 2006 | A1 |
20060074679 | Pifer et al. | Apr 2006 | A1 |
20060235755 | Meuller | Oct 2006 | A1 |
20060235864 | Hotelling et al. | Oct 2006 | A1 |
20060259426 | Blama | Nov 2006 | A1 |
20070067340 | Lakamp et al. | Mar 2007 | A1 |
20070214369 | Roberts et al. | Sep 2007 | A1 |
20070228162 | Phillips | Oct 2007 | A1 |
20070260640 | Hamilton, II | Nov 2007 | A1 |
20070282747 | Shen et al. | Dec 2007 | A1 |
20080005025 | Legere et al. | Jan 2008 | A1 |
20080005802 | Fierstein et al. | Jan 2008 | A1 |
20080046122 | Manzo et al. | Feb 2008 | A1 |
20080071587 | Granucci et al. | Mar 2008 | A1 |
20080082688 | Yi et al. | Apr 2008 | A1 |
20080103974 | Fridhendler et al. | May 2008 | A1 |
20080189390 | Heller et al. | Aug 2008 | A1 |
20080201386 | Maharajh et al. | Aug 2008 | A1 |
20080250120 | Mick | Oct 2008 | A1 |
20080255901 | Carroll et al. | Oct 2008 | A1 |
20090070122 | Hauck et al. | Mar 2009 | A1 |
20090117846 | Mavrakakis | May 2009 | A1 |
20090154899 | Barrett et al. | Jun 2009 | A1 |
20090193153 | Thanos | Jul 2009 | A1 |
20090204855 | Peters | Aug 2009 | A1 |
20090276087 | Murray et al. | Nov 2009 | A1 |
20090325602 | Higgins et al. | Dec 2009 | A1 |
20100057563 | Rauber | Mar 2010 | A1 |
20100070610 | Buttars | Mar 2010 | A1 |
20100088192 | Bowles et al. | Apr 2010 | A1 |
20100169652 | Butler | Jul 2010 | A1 |
20100198726 | Doran | Aug 2010 | A1 |
20100221938 | Liu | Sep 2010 | A1 |
20100250347 | Rainier et al. | Sep 2010 | A1 |
20110015934 | Rowe et al. | Jan 2011 | A1 |
20110093622 | Hahn et al. | Apr 2011 | A1 |
20110099104 | Nybom | Apr 2011 | A1 |
20110161409 | Nair et al. | Jun 2011 | A1 |
20110231273 | Buchheit | Sep 2011 | A1 |
20110314153 | Bathiche et al. | Dec 2011 | A1 |
20120004770 | Ooyen et al. | Jan 2012 | A1 |
20120011540 | Pullford | Jan 2012 | A1 |
20120033537 | Hassler et al. | Feb 2012 | A1 |
20120109787 | Larrick et al. | May 2012 | A1 |
20120150343 | Baric | Jun 2012 | A1 |
20120330152 | Reisinger et al. | Dec 2012 | A1 |
20130091055 | Doran et al. | Apr 2013 | A1 |
20130191170 | Jarrett | Jul 2013 | A1 |
20130297431 | Deubell et al. | Nov 2013 | A1 |
20140136351 | Lennon | May 2014 | A1 |
20140208122 | Mathur et al. | Jul 2014 | A1 |
20150278801 | Friedlander | Oct 2015 | A1 |
20150294318 | Hui et al. | Oct 2015 | A1 |
20150317619 | Curtis | Nov 2015 | A1 |
20160155208 | Zhao et al. | Jun 2016 | A1 |
Number | Date | Country |
---|---|---|
101207782 | Jun 2008 | CN |
2008140215 | Jun 2008 | CN |
2012100239 | Jul 2012 | WO |
Entry |
---|
SEMSHRED, Information Destruction Resource Guide, 12 pages, Westborough, MA. |
Kalediescape Conductor, Feb. 8, 2008; www.kaleidescape.com. |
Brad Stone, “Software That Copies DVDs Is On Trial”, Apr. 24, 2009; http://www.nytimes.com/2009-04-24technology/2...html?_r=2&partner=rss&emc=rss&pagewanted=print. |
“Kaleidescape 1080p Player, KPLAYER-6000”; Apr. 13, 2009. |
Chris Albrecht, “MOD Systems Sees Video delivery Via SD Cards”, Jan. 8, 2009. |
Mod Systems Corporate Backgrounder, Jan. 2009. |
Object Storae: A Dell Point of View; Dell Inc., Round Rock, Texas, USA, Dec. 9, 2010; 11 pp. |
VCAS Verimatrix Content Security Manager; Verimatrix, Inc.; San Diego, CA, USA; Aug. 29, 2010; 2 pp. |
VCAS Verimatrix ViewRight STB for IPTV; Verimatrix, Inc.; San Diego, CA, USA; Aug. 29, 2010; 2 pp. |
Panasonic Ideas for Life, http://www2.panasonic.com/consumer-electronics/shop/Video/Blu-ray-Disc-Players/model . . . . |
Number | Date | Country | |
---|---|---|---|
20180341929 A1 | Nov 2018 | US |