The present invention relates generally to advertisements and in particular, to a method and apparatus for forcing an application to render an advertisement.
Oftentimes digital content is provided to users containing advertisements. The inclusion of advertisements with the digital content could allow providers to offer the digital content to the user at a reduced price compared to a version of the digital content without advertisements. For example, web sites often provide banners, popup windows, pushed audio and video, . . . etc. to viewers of their web pages. This allows the web site to be provided to the user at a much reduced cost (often for free).
One issue with regards to advertising is the proliferation of devices that can bypass advertising. For several decades, users were able to fast-forward the advertising recorded on VHS machines. Now, with TiVo® and Replay TV® users can even set up the machines to entirely leave off the advertisements from programs, making the job of bypassing advertisement complete and automatic. In the world of the internet, advertising on Web sites is easily bypassed or ignored. Popup windows can be killed by a number of widely available programs. Other programs can filter out audio & video from advertising sources, in addition to filtering email. As a result, advertisers generally do not know how effective their advertising is, as it can be easily programmed out, filtered, or simply ignored. Therefore a need exists for an advertisement and a method and apparatus for rendering an advertisement that greatly increases the chance that the advertisement will be viewed by the user.
To address the above-mentioned need, an advertisement, along with a method and apparatus for rendering the advertisement is provided herein. The advertisement message is typically prepended to the digital content requested by a user (however, the advertisement can appear anywhere, as long as the desired digital content is after the advertisement), and contains a Content Encryption Key (CEK) that is only obtainable after rendering the entire advertisement. The CEK is needed to decrypt the digital content.
Because the CEK can only be obtained by rendering the advertisement, bypassing, skipping, or modifying the advertisement will make it impossible to view the digital content included with the advertisement. Therefore, a user must completely render the advertisement message in order to view the digital content.
Turning now to the drawings, wherein like numerals designate like components,
The file sharing system of
As is evident, user equipment 102 comprises DRM module 111, and rendering module 112. Content provider 101 comprises digital content 103-104 for distribution along with at least one advertisement 105. Logic circuitry 106, which preferably is a microprocessor/controller, serves to format digital content 103-104 and advertisement 105 for transmission to user equipment 111.
When a user wishes to access digital content 103-104, DRM module 111 provides the request to content provider 101. Content provider 101 then prepares file 116 to transfer to DRM module 111 along with rules file 108. File 116 comprises at least one advertisement message 105 prepended to encrypted digital content (e.g., encrypted digital content 109). Rules file 108 comprises instructions needed for properly obtaining the CEK along with other DRM rules (e.g., play once, read only, . . . , etc.). The digital content 103 is encrypted with the CEK to become the encrypted digital content 109. The CEK is “embedded” within the advertisement and derived from properties of the advertisement message 105 that are attainable only when the advertisement message 105 is completely processed (or rendered). Transmission of the file may take place over networks of various forms such as but not limited to a cellular network, a local-area network, a wide-area network, phone line, written media (like a CD), memory card, . . . , etc. For example, user equipment 102 may comprise a standard cellular telephone, with network 107 comprising a cellular network such as a code-division, multiple-access communication system.
Once received by user equipment 111, DRM module 111 analyzes rules file 108 to determine rights available for the digitial content. In order to render the digital content, first, advertisement 105 is rendered in its entirety by DRM module 111 to derive the CEK. The CEK is utilized for decrypting digital content 109. Digital content 109 then sent to rendering module 112 where it is appropriately rendered utilizing display 114 and/or speaker 113.
In an alternative embodiment, no rules document is required. A de facto set of rules governing the entire system are in place. These rules would allow unlimited play of properly licensed files. Even without advanced rules, the present invention allows for the required playing of the advertisement. In this embodiment, all rules are assumed to apply universally across all received content.
It should be noted that there exist several techniques for incorporating the CEK into advertisement 105. For example, the CEK may simply be appended to the end of the advertisement message, or it may be inserted anywhere within the message. However, in the preferred embodiment of the present invention advertisement 105 is hashed to become the CEK. As one of ordinary skill in the art will recognize, hashing is a cryptographic operation that generates a small fingerprint of arbitrary-sized data. A hash algorithm may be unkeyed (e.g. the SHA-1 or the MD5 algorithm) or keyed (e.g. the IEEE P1363 HMAC algorithm). In another embodiment, the hash result is combined with the DRM public key 117 to produce the CEK.
By coupling advertisement 105 with digital content 103, advertisement 105 piggy-backs the same benefits as did digital content 103. For example, rules file 108 may forbid the user from modifying the digital content, which now includes advertisements. In alternate embodiments of the present invention, the DRM rules can contain a special rule, or constraint, explicitly for the rendering of the advertisement. In one embodiment, the rule may state that the advertisement must be rendered to completion (no bypassing, aborting, fast-forwarding, etc.). The state of the advertisement rendering is recorded in an Advertising Bit. This is an indication to the DRM system whether the rule for the advertisement was carried out to completion. In a full-blown example of DRM rules, the user may pay for the digital content package depending on how much advertising is embedded, the more he pays, the less advertising is included. It should be noted that the DRM rules may be optional. The default condition of the trusted rendering module may be to play the content, in which case the advertisement is first rendered to completion before obtaining the CEK to play the digital content. In this instance, metadata may be associated with the content that indicates the size of the required-to-be-rendered advertisement as well as a message to the user that the advertisement must be rendered in order to play the desired content.
So, for example, a user may have a choice to buy a full-price online video, or one at 1/4 price but with the caveat that several advertisements are interspersed in the content, much like a TV show. If the user chooses the latter, then the user is bound by the location of the various CEKs to fully render each advertisement to gain the ability to view the subsequent portion of the desired digitial content. This allows unsophisticated DRM systems (those without advanced rules functionality) to enforce the rendering of advertisements with minimal hardware/software support. Furthermore, the advertiser could potentially derive the benefit of a DRM system's ability to possibly record state information about how many times the digital content, and thus the advertising, has been rendered.
Continuing, at step 309 DRM module 111 utilizes the CEK to decrypt encrypted digital content 109 to get digital content 103. Finally, at step 311, the digital content 103 is passed to rendering module 112 where digital content 103 is rendered. As discussed above, DRM module 111 may also ensure that the advertisement is completely rendered, and report this information back to content provider 101.
While the invention has been particularly shown and described with reference to a particular embodiment, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention. For example, although the above description was given with an advertisement message containing the CEK, one of ordinary skill in the art will recognize that any message that should be viewed may include the CEK as well. For example, it is easily envisioned that messages such as public service announcements, legal warnings, and commercials may be used to derive the CEK and prepended to the digital content. Additionally, the above description had the rules file indicating an advertisement length so that the advertisement can be properly “removed” from the transmitted file. In alternate embodiments, other mechanisms are utilized to determine the length of the advertisement. For example, the advertisement and encrypted digital content may be tagged with an XML tag indicating each section of the content package. In another embodiment, a special “stop hashing” character can be apendend to the advertisement, used to indicate an end of the advertisement. Alternatively, a special “begin” character can tell the application to use the hash of the previous value as a key starting at the next location. It is intended that such changes come within the scope of the following claims.