Method and apparatus for managing a digital inventory of multimedia files stored across a dynamic distributed network

ABSTRACT

A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority from, and incorporates by reference,U.S. Provisional Patent Application No. 60/891,136, filed on Feb. 22,2007 by Colin Mick et al., and entitled “Video Network Including Methodand Apparatus for High Speed File Download.”

This application is related to, and incorporates by reference in theirentirety, U.S. patent application Ser. No. 12/036,206 filed on Feb. 22,2008 by Colin Mick et al., and entitled “Video Network Including Methodand Apparatus for High Speed Distribution Of Digital Files Over ANetwork”; U.S. patent application Ser. No. 12/036,209 filed on Feb. 22,2008 by Colin Mick et al., and entitled “Digital Multimedia NetworkIncluding Method and Apparatus for High Speed User Download of DigitalFiles”; U.S. patent application Ser. No. 12/036,211 filed on Feb. 22,2008 by Colin Mick et al., and entitled “Method and Apparatus forDistributing A Multimedia File to A Public Kiosk Across a Network”; andU.S. patent application Ser. No. 12/036,214 filed on Feb. 22, 2008 byColin Mick et al., and entitled “Method and Apparatus for ProtectingDigital Rights of Copyright Holders of Publicly Distributed MultimediaFiles”.

This application herein hereby incorporates by reference in theirentirety U.S. patent application Ser. No. 10/426,930 Filed on Apr. 29,2003 by Fjelstad et al., and entitled DIRECT-CONNECT INTEGRATED CIRCUITSIGNALING SYSTEM FOR BYPASSING INTRA-SUBSTRATE PRINTED CIRCUIT SIGNALPATHS; U.S. patent application Ser. No. 10/659,210, filed on Sep. 9,2003 by Fjelstad et al., and entitled, CABLE SIGNALING SYSTEM ANDCOMPONENTS THEREOF; U.S. patent application Ser. No. 10/757,000, filedon Jan. 13, 2004 by Grundy et al., and entitled, MEMORY CHAIN; U.S.patent application Ser. No. 10/756,924, filed on Jan. 13, 2004 byFjelstad, et al., and entitled, SYSTEM FOR MAKING HIGH-SPEED CONNECTIONSTO BOARD-MOUNTED MODULES; U.S. patent application Ser. No. 11/055,578filed on Feb. 9, 2005 by Grundy et al., and entitled, INTERCONNECTSYSTEM WITHOUT THROUGH-HOLES; U.S. patent application Ser. No.10/947,686, filed on Sep. 23, 2004 by Fjelstad et al., and entitled,MULTI-SURFACE IC PACKAGING STRUCTURES AND METHODS FOR THEIR MANUFACTURE;U.S. patent application Ser. No. 10/990,280 filed on Nov. 15, 2004 byGrundy et al., and entitled, STAIR STEP PRINTED CIRCUIT BOARD STRUCTURESFOR HIGH SPEED SIGNAL TRANSMISSIONS; U.S. patent application Ser. No.11/093,266 filed on Mar. 28, 2005 by Yasumura et al., and entitled,ELECTRICAL INTERCONNECTION DEVICES FOR ESTABLISHING REDUNDANT CONTACTPOINTS FOR REDUCING CAPACITIVE STUBS AND IMPROVED SIGNAL INTEGRITY; U.S.patent application Ser. No. 11/055,579 filed on Feb. 9, 2005 by Yasumuraet al., and entitled, HIGH SPEED, DIRECT PATH, STAIR-STEP, ELECTRONICCONNECTORS WITH IMPROVED SIGNAL INTEGRITY CHARACTERISTICS AND METHODSFOR THEIR MANUFACTURE; U.S. patent application Ser. No. 11/097,450 filedon Apr. 1, 2005 by Grundy et al., and entitled, SIGNAL-SEGREGATINGCONNECTOR SYSTEM; U.S. patent application Ser. No. 11/123,863 filed onMay 6, 2005 by Yasumura, and entitled, TORSIONALLY-INDUCED CONTACT-FORCECONDUCTORS FOR ELECTRICAL CONNECTOR SYSTEM; U.S. Pat. No. 7,111,108filed on Apr. 12, 2004 by Grundy et al., and entitled,SIGNAL-SEGREGATING CONNECTOR MEMORY SYSTEM HAVING A MULTIPLEXEDHIGH-SPEED CHANNEL; U.S. Pat. No. 6,366,907 B1 to Fanning et al.,entitled “Real Time Search Engine,” which issued on Apr. 2, 2002; U.S.Pat. No. 7,165,071 to Fanning et al., entitled “Real Time SearchEngine,” which issued on Jan. 16, 2007; U.S. Pat. No. 7,310,629 toMendelson et al., entitled “Method and Apparatus for Controlling FileSharing of Multimedia Files over a Fluid De-Centralized Network,” whichissued on Dec. 18, 2007; and U.S. Patent Publication No. 2002.0087999 toKashima and entitled “Scalable Filtering Table” filed on Aug. 22, 2001.

BACKGROUND OF THE INVENTION

Today, there are several methods for customers to obtain specific videosand movies for viewing at consumers' homes. Video rental and retailstores such as Blockbuster warehouse movies and video files pre-storedon digital storage media such as DVDs. Alternatively, a consumer may payfor cable or satellite subscription services where “videos on demand”(VOD) are available. For satellite customers, true VOD is difficult anuneconomical to support, and has resulted in growing deployment ofdigital video recorders (DVRs). Consumers subscribing to satellite videodelivery services can only obtain the video content which the satellitecompany selects to make available in their satellite network, severelylimiting consumer options. Typically, those options are limited to“first run” movies or current releases. Video games can also bepurchased at stores for performance on personal computers, orspecialized “game boxes.”

Consumer options can be enhanced in cable distribution since old-runmovies may be archived at the cable-head end. Unfortunately, buildingVOD delivery infrastructures is expensive due to the upgrades requiredin both the cable-head end and the user-end decoder boxes. Moreover,this form of distribution typically limits the multimedia filesavailable to consumers to a hand full of digitized feature length films.The availability of archived news clips is limited to links appearing onthe web, and is usually in a low definition “PIP” (picture inside apicture) format. Typically, video games and other multimedia files areeven less available on demand.

Because the digital distribution of cinematic films is a major consumermarket readily appreciated by the average consumer, many specificexamples herein are described in terms of cinematic feature length films(also known as movies). However, the embodiments described herein arefully envisioned to include the widest range of multimedia files,including, but not limited to cinematic feature length films, movietrailers and previews, news broadcasts, sports events, politicalspeeches, and games, and further including, but not limited to distinctdigital files systems within a multimedia file, such as audio files,video files, effect files (such as vibrating, tilting or rotating aplatform or object), and ancillary files (such as time stamps,sub-titles, “director's cut” version of a movie, such as scenes thatwere removed prior to theater distribution, configurable files forediting nudity or profanity from a feature length film, advanced“levels” of a game, or other game options which may be available,including more expensive versions of a game) etc. Accordingly, specificexamples that are directed to a digital file easily appreciated by aconsumer, such as the video file of a feature length film, are offeredfor purposes of brevity, and to enhance reader comprehension byreferring to consumer products most widely recognized by the greatestsegment of the public. These specific are not intended to limit thescope of the appended claims, and should not be construed to limit thescope of the appended claims.

The distribution of multimedia files incorporates a wide variety ofobjectives, some of which are often in conflict according to models usedtoday. For thousands of years, it has been recognized that speed andaccuracy are often in conflict in the transmission of information. Anyconsumer who has had to “uninstall” a software application and confirmthe uninstallation to the software producer through the internet canappreciate that consumer flexibility is often in conflict withprotecting the interests of copyright holders and even patent holdersfor some digital applications. The digitizing of audio and video filesfor storage on digital media have enabled audio and video reproductionthat is essentially impervious to corruption, and substantially errorfree, thereby allowing duplication with no loss of content quality.However, this as enabled, and frequently results in, large scalecopyright violations of digitally copied material, from software tofeature length films. With satellite and cable systems, a certain levelof protection is built-in, as the video content is not provided in aform that hackers can easily copy and pirate for unlawful distributionor personal use. On the other hand, video rental chains, such asBlockbuster, Netflix, etc., are typically unconcerned about contentsecurity. Rather, it is the producers of feature length film that aretypically faced with the enormous problems of copy protection. Toameliorate these copyright violations, a set of encoding schemes havebeen adopted within feature length DVD films. An additional level of DVDprotection is produced by segmenting DVD players into “zones.” DVDsmastered for a particular zone cannot be played on a player set fordifferent zones. Despite these protections, hackers have typicallycircumvented these protections and have continued the unlawful pirating,sale and distribution of copyrighted videos.

SUMMARY OF THE INVENTION

FIG. 1 depicts an overview of an embodiment of a video distributionnetwork 101 including a plurality of video kiosks 105-A, 105-B, 105-C .. . and 105-D in communication with a central server 118 via theinternet. As used herein, the term “kiosk” includes, but is not limitedto island-type structures that might be found in the concourse of ashopping mall. The term “kiosk” further comprehends apparatus asdescribed herein against a wall of a structure, or even disposedpartially within a wall, as is common with automatic teller machines orother dedicated transmission channels and apparatuses. As trafficdemands of the network described herein increase, it is anticipated thatthe network demands described herein compete for limited bandwidth withother internet traffic, phone usage, cable TV, etc. Embodiments areenvisioned wherein a dedicated fiber optic wide area network (WAN) isdeveloped to reduce the dependency of the network on the existinginternet infrastructure. Accordingly, the term “internet” as used hereinencompasses public, private, general access, limited access anddedicated communication infrastructures in any combination.

Each video kiosk is configured to download a video file to a portablehigh-speed digital storage device 131. The portable high-speed digitalstorage device has, at a minimum, sufficient storage capacity for a highdefinition, feature length Hollywood movie. The central server includesa central processor 122, a central data storage member 119 with acentral data base index 120, and a central search engine 121. The videokiosks and central server can be separated by thousands of kilometers,and distributed across a country, or even across the globe. The dottedlines 125 represent communication paths, which can include, but are notlimited to, fiber optical lines, wireless signal transmission paths, andelectrically conductive signal transmission paths. The architecture ofFIG. 1 depicts a “web” interconnection, such as the Internet or theworld wide web, wherein individual kiosks and the central server areinterconnected in a web architecture. Although the descriptions hereinoften refer to internet connections and communication, references to theinternet are intended only as an example. Embodiments are envisioned,which include local area networks (LANs) of various architectures,including web architecture, star-networks, and trunk-line/drop-linenetworks. Embodiments are envisioned that include combinations of weband LAN architectural schemes. FIG. 2 illustrates a LAN (local areanetwork) 203 forming part of the greater video network 101. Returning toFIG. 1, those skilled in the art of network architecture will appreciatethat, although the nodes such as kiosks 105 and the central server 118are depicted in FIG. 1 as “point-to-point” connections, intermediatestations or nodes, such as relays, routers, repeaters, filters andamplifiers, may be interposed between any two members shown in FIG. 1.

Ancillary files and selectable parameters can be stored in conjunctionwith video files. Ancillary files include, but are not limited to,subtitles, one or more audio files, and time stamps for connectingspecific segments of an ancillary file to the video file. Parametersinclude, but are not limited to, parameters controlling alternativevideo scenes related to nudity, profanity, sexual situations, violence,etc. Because parameters are, in many cases, selectable by the user, theterm “selectable parameters” is frequently used throughout thisdisclosure. It is understood, therefore, that some content providers mayupload files in which certain parameters are fixed, and do not providethe user an opportunity to select the parameter setting, such as editingof violent scenes. The term “selectable parameters” is thereforedescriptive, and may, in some instances, include fixed parameters aswell.

In view of the fact that ancillary files and selectable parameters maybe linked to a video file, it will therefore be appreciated that,throughout this disclosure, reference to a video file, or to the digitaltransmission, storage, encryption, watermarking, segmenting, queuing,etc. of a “video file,” should not be construed as to limit theseoperations exclusively to the video portion of a digital file.Transmission, storage, encryption, watermarking, and so forth may beapplied to any of the files linked to, or associated with a video file.

Video Kiosk 105-A includes a video display 107, a user input 109, shown,by way of example, as a keyboard and mouse, a financial transactioninterface 111, shown by way of example as credit-card/debit-card reader,a local data storage member 123 for storing data locally within a kiosk,and a high-speed port 113 for coupling with the portable high-speedmemory device 131 shown in FIG. 1 as being held in the hand of user 103.

Throughout this disclosure, specific details are offered by way ofexample, and not for purposes of limitation. For example, a user inputto a computer or digital computing device may include, but is notlimited to, a keyboard, a mouse, a touch pad, a joy stick, a track ball,“j-mouse,” a wand, a keypad, a microphone operating in conjunction withvoice detecting software, a “touch-screen” video output, and a virtualkeyboard such as laser projection or holographic imaging. Combinationsof these devices, such as “clicking with a mouse,” and “tapping,” or“double-tapping” on a touch screen, may be used to initiate or confirm auser input. To name each of these devices or operations in conjunctionwith each embodiment disclosed herein that utilizes a user input wouldmake the disclosure cumbersome to read, and unnecessarily long. Withinthis disclosure, therefore, many references to user input described onlyone, or a few, of the above input devices, such as a keyboard and mouse.These specific examples are offered to enable the reader to more easilyunderstand the descriptions contained herein, and to make and use thevarious embodiments described herein. These specific examples,therefore, are not intended to limit the appended claims, whichcomprehend alternative embodiments within the spirit and scope of theinvention described herein.

In a similar manner, the financial transaction interface 111 may be inthe form of a card reader for reading credit and debit cards, fingerprint or retinal scan identifier, voice identification, and so forth.Those skilled in the art will further appreciate that credit approvaloften encompasses user input to several different input members, such asa credit card reader for receiving a credit or debit card, and a keypadfor entering a personal identification number (PIN). Again, thesespecific examples are offered for clarity, and should not be construedas limiting.

Similarly, throughout this disclosure, an embodiment of a digitaldownload device is described as a portable high-speed memory device.Embodiments are envisioned, however, where a digital download device maybe a fixed member of a large, or even an immobile apparatus. Such animmobile apparatus may integrate multiple network or user apparatusesdescribed herein. Accordingly, repeated reference to a portablehigh-speed memory device is offered by way of example, and is notintended to limit the appended claims, which comprehend in alternativeembodiments, including large and immobile memory devices.

The portable high-speed digital memory device 131 and high-speed memoryport 113 envisions using high-speed electrically conductive connectionsas described in greater detail conjunction with the United States PatentApplications incorporated by reference herein. The appended claims,however, are not limited to the electrical connections described herein,and comprehend alternative high-speed signal paths and connectors.

An advantage of using high-speed signal conductors in conjunction withthe video network described herein deals with the marketability of thevideo distribution system described herein. Commercial download speedscurrently available are nominally 3 to 6 megabits per second. At thisspeed, download of a high definition feature length film could takeclose to a day. Although compression techniques and other advances mayreduce this time significantly, even if a download were reduced to halfan hour, most consumers will not be willing to wait this length of timeto retrieve a feature length film. As a consequence, technologiescurrently on the market place cannot address these commercialdeficiencies.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 depicts an overview of a video network, including a useraccessing the video kiosk of the video network with a portablehigh-speed digital recording device;

FIG. 2 depicts an architectural embodiment of the network of FIG. 1;

FIG. 3 depicts a personal computer coupled to a video player configuredto mechanically and electrically coupled with a portable high-speeddigital recording device of FIG. 1;

FIG. 4 depicts an embodiment of video screens generated by the videonetwork of FIG. 1, displaying video advertisements;

FIG. 5 depicts of flowchart of a process in which a user accesses thevideo network of FIG. 1;

FIG. 6 depicts a flowchart of a process by which a user downloads avideo file from a video kiosk of FIG. 1 to the portable high-speedmemory device in FIG. 1;

FIG. 7 depicts an embodiment of search parameters displayed on a videodisplay generated, at least in part, by the video network of FIG. 1;

FIG. 8 depicts a video screen display representing an embodiment of asearch result generated by the video network of FIG. 1;

FIG. 9 depicts an embodiment of a response to a search request that issubmitted to the network of FIG. 1;

FIG. 10 depicts an embodiment of a process for populating the videonetwork of FIG. 1 with a particular video file at a sufficient number ofthe network locations necessary to satisfy consumer demands;

FIG. 11 depicts an embodiment of a local inventory management index formanaging the inventory of video files stored within the local videokiosk of FIG. 1;

FIG. 12 depicts an embodiment of a super-cache management algorithm formanaging the inventory of video files distributed throughout the networkof FIG. 1;

FIG. 13 depicts an embodiment of an encryption algorithm for storing anencrypted video file in a portable high-speed memory device;

FIG. 14 depicts a data table for correlating publicly disclosedidentifiers of the various devices of FIGS. 1 and 3 with a uniquedigital device ID that is stored or embedded within various devices andnot discoverable by the user;

FIG. 15 depicts an embodiment of a process by which the portablehigh-speed memory device stores and/or plays a video file;

FIG. 16 describes a process for watermarking video files downloaded intoa portable high-speed memory device;

FIG. 17 depicts an embodiment of a Central Transaction Record forrecording video file downloads by users, including a correlation ofspecific video files and their unique watermark;

FIG. 18 describes a process for Internet download of data relating topirated watermarks from a network storage location to a data storagedevice and a mid-user or an end-user;

FIG. 19 depicts a data table within a network storage location thatstores the watermarks of pirated videos;

FIG. 20 depicts a data table for storing the watermarks of piratedvideos within an user-end device such as a video player or personalcomputer;

FIG. 21 is a data table within a network data storage member for storinginformation relating to the update of user-end apparatuses withinformation relating to pirated watermarks;

FIG. 22 describes a digital rights management process for controllingthe use or display of pirated videos;

FIG. 23 depicts a data table within the central server indexing all ofthe video files available within the network of FIG. 1;

FIG. 24 depicts an embodiment of a multi-station video kiosk for use inconjunction with the video network of FIG. 1;

FIG. 25 describes an embodiment of a process by which a user can selecta video file available on the network of FIG. 1 by means of personalcomputer, and subsequently download the video file from the video kiosk;

FIG. 26 illustrates an interactive screen display for selecting optionalparameters related to a video file prior to the download the video file;

FIG. 27 depicts a data table recording the video file download historyof a portable high-speed memory device;

FIG. 28 depicts an embodiment of a video screen display generated by thevideo network of FIG. 1 immediately after a user has logged in;

FIG. 29 is an embodiment of the video screen display of a blogosphereportal accessible through the video network of FIG. 1;

FIG. 30 depicts a video screen display of the homepage of a bloggerposted on the video network of FIG. 1;

FIG. 31 depicts a video screen display of a “ripper” for piecingtogether segments of a video file to create a “trailer” or “video-short”for display on a user blog within the network of FIG. 1;

FIG. 32 depicts a video screen display of an application forconstructing an HTML page comprising video portions collected from avariety of different HTML pages;

FIG. 33-A depicts a side elevational view of a prior art embodiment of amulti-layer electronic device;

FIG. 33-B depicts a top-plan view of a layer of FIG. 33-A showing a-stubformed by the coupling of a conducive trace to a conductive via in alayered electrical device;

FIG. 34 is an enlarged view of the reflective stub shown in FIG. 33-B;

FIG. 35 depicts a side elevation view of a prior art embodiment of aconductive trace coupled to a conductive via in a layered electricaldevice;

FIG. 36 depicts embodiments of alternative processes for downloading avideo file to a local kiosk and downloading a video file from a localkiosk to a hand-held proprietary high speed memory device;

FIG. 37 depicts a high-performance drive array, including serial andparallel download paths of in incoming video file;

FIG. 38 depicts a portable memory device 131 of FIG. 1, including datastored therein;

FIG. 39A depicts a top plan view of an embodiment of a printed circuitboard constructed with a stair step cavities;

FIG. 39B depicts a perspective view of the printed circuit board ofdepicted in FIG. 39A;

FIG. 40 depicts an embodiment of a stair stepped integrated circuitdecryption package having corresponding stair stepped layers disposedwithin the stair stepped cavity of a printed circuit board;

FIG. 41 depicts another embodiment of a stair stepped integrated circuitdecryption package having corresponding stair stepped layers disposedwithin the stair stepped cavity of a printed circuit board.

DETAILED DESCRIPTION

The network 101 of FIG. 1 depicts video kiosks 105-A, 105-B, 105-C etc.Each kiosk is configured to allow users to download video files. Thenetwork further includes a central server 118 to govern and manageinformation transfer and storage on the network 101. The network mayoptionally include one or more stand-alone memory devices 117. In anembodiment, the stand-alone memory devices do not have the userinterface functionality of a kiosk, or the management and controlcapabilities of the central server. However, in a distributed networkembodiment, stand-alone memory devices may perform certain informationmanagement functions described herein as being performed by the centralserver 118 or a local video kiosk 105. Although many embodimentsdescribed herein ascribe certain functions to the central server 118,and certain functions to a video kiosk, these examples are not intendedto limit the network functions described herein. The elements of thecentral server 118 can be disposed within a central location, ordistributed in alternative architectural schemes. Accordingly, thespecific architecture and distribution of functionality described hereinis offered by way of example only.

A local video kiosk 105 includes network interface 139 shown in FIG. 2as a router, local data storage member 123 for storing video files, auser interface 109 such as a keyboard and mouse, a video display 107,speakers 141, a financial transaction interface 111 such as acredit/debit card reader, one or more processing devices 133 such as aCPU, a high-speed port 113 configured to couple with a portable digitalhigh-speed memory device 131 and for downloading video files (includingany related ancillary files and a selectable parameters) to thehigh-speed memory device 131, and a high-speed signal path 137 from thelocal memory 123 to the high-speed port 113. Each video kiosk 105,includes a unique device ID 115. In an embodiment, the unique device ID115 is a nonvolatile, non-erasable digital value. The device ID 115 maybe stored in the hardware at the IC chip level or printed circuit boardlevel at the time of manufacture. Alternatively, the device ID 115 manystored in PLD or fusible link circuitry, an EPROM, a UV prom, or laserreadable media such as that used in compact disc technology. Asdiscussed in greater detail below in FIG. 13, the unique device ID 115of a video kiosk may be utilized in an encryption or watermarkingprocess when a digital video file is downloaded from a local kiosk 105to a portable high-speed memory device 131 of the user.

In operation, a user 103 couples the portable high-speed digital memorydevice 131 to high-speed memory port 113, and provides relevantinformation, both in the way of a search request, and any financialinformation necessary to complete the transaction. Information may beinput through either the financial transaction input 111, the userinterface 109, or both. The search process for a particular video fileis interactive, and may be refined by successive selections of the user103, as described in greater detail in conjunction with FIGS. 6-8. Theportable high-speed digital memory device 131 may comprise a uniquedevice ID 129. A device ID may also store a the unique device ID 130 ofone or more devices, such as video players 305 or video display devices323 (FIG. 3) thereby “linking” the portable high-speed memory device toone or more video players or video display devices.

Although FIG. 3 depicts the video player 305 as a separate entity fromthe video display device 323, this depiction is intended only as anembodiment. In a preferred embodiment, some or all of the functionalityof a video player 305 described herein can be integral to the videodisplay device 323. This functionality can include, but is not limitedto, a high speed port having high speed contacts 308 configured to matewith a hand held proprietary high speed memory device, a decryptionmodule 341, a unique device ID, an ID register for storing the device IDnumbers of other digital devices, and combinations of suchfunctionality. Accordingly, throughout this disclosure, many specificdetails offered with respect to the video player 305, or componentsthereof comprehend both embodiments wherein a video player is integralto a video display device, and embodiments wherein a video player isphysically distinct from a video display device. Specific details interms of one particular embodiment or the other are therefore offeredfor ease of comprehension, and are not intended to limit the scope ofthe appended claims. As used herein, the term “video display device,”can include, but is not limited to, a computer monitor, TV screen, aprojection display device, or other hardware or software applicationsassociated with displaying a video image.

As will be further appreciated in conjunction with FIGS. 13 through 22,the unique device ID 130 of the video player 305 (FIG. 3), (which, asnoted above, may include, or be distinct from the unique device ID 337of a video display device 323), the unique device ID 129 of a portablehigh-speed memory device 131 (FIGS. 1 and 3), the unique device ID 115of the video kiosk 105, or combinations of these device IDs, may beutilized in the generation on encryption keys and watermarks. Theencryption and watermarking schemes described herein, whether usedseparately, or in conjunction with each other, can substantially reducethe practice of video piracy. Any of the unique device IDs describedherein may comprise a nonvolatile, non-erasable digital value stored atthe transistor level of an IC die or printed circuit board level at thetime of manufacture, or programmed as a non-erasable digital value afterIC die manufacture. Programming and storage techniques may borrow fromvarious storage technologies including, but are not limited to PLD orfusible-link circuitry, EPROM, UV prom, or laser readable media such asthat used in compact disc technology.

In a first embodiment, the unique device ID of one or more video players305 may be stored within a portable high-speed memory device 131. Asnoted above, some or all of the components and functionality of thevideo player may be integral to, or separate from, the video displaydevice. In this embodiment, the unique device ID 130 of a digital playeris first uploaded from the playback device 305 to the proprietaryhigh-speed memory device, and subsequently from the proprietaryhigh-speed memory device to a publicly accessible kiosk. As noted, thestorage of a unique playback device ID within a proprietary high-speedmemory device may be erasable, or non-volatile and non-erasable, therebylinking a portable high-speed memory device to a particular player on atemporary or permanent basis. The device IDs of additional video players305 or video display devices 323 may be stored within a portablehigh-speed memory device through user programming, thereby permitting afunctional coupling between a single portable high-speed memory deviceand alternative, or multiple video players. In this manner, a user coulddownload a movie from a kiosk with the intent of viewing the movie on anew TV, or at a friends house, by storing an identification number ofthe second video player in the memory device, and downloading a movieencrypted according to that new ID number.

After the user selects a video file for download, the kiosk searchengine 133 searches a local data base index 135 to determine whether ornot the requested video file (and any related ancillary files orselectable parameters) are stored within the local data storage member123 of the local video kiosk 105-A. If the video file is stored locally,the video file is downloaded into the video recording device via ahigh-speed signal path 137. If the video file is not stored locally, asearch request is sent to the central server 118. If the requested videofile is stored on the central server, the central server may initiate afile transfer to the requesting kiosk 105-A. Alternatively, the centralserver searches through an index, locating one or more digital memorystorage locations at which the requested video file is stored. Thesestorage locations may be associated with other central servers 118,other video kiosks 105-B, 105-C, 105-D etc 05, or stand alone datastorage members 117. After a storage location with the requested videofile is identified, a file transfer is initiated from one of the storagelocations having the requested video file to the requesting video kiosk105-A. The video file is received and digitally stored by the requestingkiosk. The portable high-speed memory device 131 is coupled with thehigh-speed port 113, and the requested video file, along with ancillaryfiles and selectable parameters, are downloaded from the kiosk to theportable high-speed digital memory device over a high-speed digitalsignal path 137 for subsequent use by the user 103.

Throughout this disclosure, specific examples used herein often depict a“user” in terms of an end-user (such as an individual securing a videofile for home viewing). However, alternative embodiments are envisionedwherein users include commercial or mid-level entities such as movietheaters, which, after downloading a video file, then display the videofor a consumer audience. In conjunction with this, specific examplesthroughout the disclosure refer to the portable high-speed memory device131 depicted in FIGS. 1 and 3. It will readily be appreciated thatcommercial or mid-level entities such a movie theater downloading videosfor subsequent public display may utilize a large, or fixed high-speedmemory device which is not portable. References to the portablehigh-speed memory device or references to individual persons as usersare therefore specialized examples, and should not be construed so as tolimit the scope of the appended claims.

The stand alone memory 117, the local data storage member 123 within akiosk, the central data storage member 119 within the central server,and the portable high-speed digital memory device 131 may comprise, butare not limited to, volatile, non-volatile, magnetic, optical andquantum memory devices. Accordingly, memory types and structures mayvariously include electrically erasable memory devices, opticallyerasable memory devices, magnetic digital storage media such as diskdrive technology, flash memory, optical memory such as DVD, andcombinations thereof.

Because the average consumer is not likely to spend more than a fewminutes waiting for a video download, the video kiosk 105A incorporatesa novel architecture to facilitate the generation, processing andhigh-bandwidth transmission of video files from the kiosk to theportable high-speed memory device 131 in a high-bandwidth data-streamsufficient to make the download of a high definition feature length filecommercially viable. To achieve this, the minimum required download ratewill be in the general range of 5 Gbps-40 Gbps or greater, and downloadrates in the more specific range of 10 Gbps-25 Gbps are probablysufficient to satisfy consumer demands in both costs and download times.The socket (113) uses a high-speed connector capable of supporting datatransfer rates capable of effectively addressing these anticipatedconsumer requirements. In an embodiment, the signal path connectionbetween the portable high-speed memory device and the kiosk is anelectrically conductive connection, and may utilize technology describedin the United States Patents and Patent Applications incorporated hereinby reference. Alternative signal path embodiments are envisioned,however, including optical signal paths between the video kiosk 105 andthe hand-held high-speed memory device 131.

The video kiosk 105 includes multiple processors, or a multi-corehigh-performance processor that can receive, process and exportmulti-channel data streams, preferably in excess of 10 Gbps per channel.The memory 123 is depicted in FIG. 1 as a high performance disk arraycomprising multiple large capacity hard drives which, operating inconcert, are collectively configured to deliver the high bandwidth datastream required to satisfy consumer expectations or requirements. Thecollective capacity of the high-performance drive array is preferablyleast 1 TB.

Because the storage capacity of a video kiosk is limited, file transfersof digital video files including feature length movies may betransmitted via the Internet from one video kiosk 105-B to another videokiosk 105-A, thereby making network movies available at any kiosk atwhich a user requests to download a video file. Because of currentlimitations, however, it may take a day or more to transmit a highdefinition feature length movie over the internet from one video kioskto another. FIG. 2 illustrates a LAN 203 as part of the greater videonetwork 101. By way of illustration, a shopping mall 207 with highconsumer density and volume could have multiple video kiosks 105 on theLAN 203. The LAN pictured in FIG. 2 has its own local server 201 androuter 205 which provide an Internet gateway, thereby providing videokiosks 105-L1 through 105-L4 full access to the entire video network101, while insulating the LAN of burdensome unwanted Internet traffic.Because intra-LAN data traffic is limited to video file transfersbetween kiosks within the shopping mall, the file transfer rate betweenvideo kiosks within the LAN can be many times faster than a filetransfer rates typically experienced over crowded Internet pathways,thereby increasing the speed at which many video files are available tocertain kiosks. The multiple storage members 123 among the LAN videokiosks 105-L provide for a greater number of video files to be storedamong video kiosks 105-L1, 105-L2, 105-L3, 105-L4 within the LAN 203,when compared to a single video kiosk of similar or equal size to thosevideo kiosks within the LAN. Similarly, a stand-alone data storage site117 within the LAN 203 can further enhance the selection of video filesto users at a shopping mall 207. The greater video selection availableto mall shoppers with minimal delay enhances the commercial utility ofthe video network.

FIG. 3 illustrates a system overview of components used to “play”(display) the digital video file on a display screen of a user. HighSpeed connectors 307 of the portable high-speed memory device 131 areinserted into the high-speed port 313 of the video player 305 withcomplementary high-speed connectors 308. The video player may include aunique digital device ID 130 stored on a digital storage medium, orembedded in circuitry within the video player 305. The unique digitaldevice ID 130 of the video player can be read by the portable high-speedmemory device. As noted in FIG. 1, device ID 130 is depicted as beingstored in the portable high-speed memory device 131, thereby “linking,”the portable high-speed memory device to one or more video players. Asdiscussed in greater detail below in conjunction with watermarking andencryption, by linking the unique device ID 130 of the video player orthe device ID 337 of a video display device 323 to one or more portablehigh-speed memory devices 131, video files may be encrypted orwatermarked in such a manner that they can only be viewed onpre-selected video players, thereby enhancing security and digitalrights management, and hampering video piracy.

A visible identifier 330 is a fixed somewhere to the video player. Bythis means, the user can input this value to a computer or kiosk whichwill then access a central database to identify the unique digital IDcorresponding to that visible ID 330, thereby linking the unique digitaldevice ID 130 of the video player to a portable high-speed memory device131 without user knowledge or detection of the actual unique digitaldevice ID 130 of the video player. Such concealment of the actual uniquedevice ID 130 further enhances the security of anti-piracy measuresdescribed herein.

The video player 305 includes a power cord 303 and a variety ofcommunication ports, including serial ports 315, parallel ports 317,optical interface 319, Ethernet 331, and USB ports 329. The enumerationof these specific port types are offered by way of example. Theembodiments described herein can be adapted to any known communicationport, as well as communication ports and protocols developed in thefuture. A decryption module 339, 341 may be located within the videoplayer 305 or video display device 323. A personal computer 321 may becoupled to one of the ports 315 of the video player 305 viacommunication cable 325. In FIG. 3, the personal computer is showncoupled to a video screen 123 on which the video file will be viewed.Alternative embodiments are envisioned in which the video player 305 iscoupled directly to the video screen as illustrated by the dotted line327 representing a communication cable coupled between the video screenand port 319. In a preferred embodiment, however, the decryption moduleis disposed within the video display device and the need for a separatevideo player 305 is eliminated. Functions described herein inconjunction with a video player 305 may be divided between the videodisplay device 323 and a personal computer.

Those skilled in the art will appreciate that it is possible for ahacker to “split” a signal cable, and analyze, record, or process thesignals detected therein. It can therefore be appreciated that, inembodiments wherein the video player 305 and decryption module 341 areseparate from the video display screen 323, an unencrypted signal wouldbe transmitted through a cable connecting the video player 305 and thevideo display device 323. By extracting an unencrypted signal, asophisticated hacker may be able to produce a high quality digital“knock off” of the content transmitted from the video player to thevideo display device. Whether such as knock off is sold through theblack market, or distributed freely as a prank, the profitability of acinematic movie, video game, or other digital commodity can be seriouslyimpacted.

In a preferred embodiment therefore, the decryption module 339 isintegral to a video display device 323, significantly reducing hackeraccess to an unencrypted signal. Embodiments of a decryption moduleinclude software, firmware, hardware, and combinations thereof. Byforming at least part, if not all of a decryption module from hardwareat the transistor level, it would be difficult, if not impossible for apirate or hacker to read the software code and try to reverse engineer adecryption module.

A decryption module formed, at least in part, by proprietary transistorlogic within an IC package could be further enhanced for added securityagainst hackers. To prevent a hacker from accessing video outputterminals of an IC package, additional design features may beincorporated in a decryption device, as illustrated in FIGS. 39A, 39B,40 and 41.

FIGS. 39A and 39B illustrate a top and perspective views of anembodiment of a printed circuit board (PCB) structure 3900 with multiplecircuit layers, 3902 and 3903, on which circuit traces 3906, 3907 areformed. For illustrative purposes, circuit traces on the top layer 3903are represented by solid lines, circuit traces on the middle layer 3902are shown in phantom where covered by the top layer, and circuit traceson the bottom layer 3901 are not visible where covered by the layers3902 and 3903. Concentric apertures 3904, 3905 are formed within layers3902 and 3903 form a stair step cavity for receiving an integratedcircuit package which, in an embodiment described in conjunction withFIGS. 39A-41, is configured to function as decryption module for anencrypted multimedia file. A bottom layer of the PCB, including circuittraces disposed thereon, is visible at the bottom of the stair steppedcavities. The exact number of layers depicted in these figures isoffered only by way of example, and do not represent a limitation on thenumber of stair step layers that can be fabricated in a printed circuitboard.

In FIG. 39A, some of the signal traces 3906, 3907 can be seen to begeometrically arranged almost directly above each other. Advantages ofthis design will be explained momentarily.

Signal traces on the various stair stepped layers extend all the way tothe respective edges of their apertures, forming exposed terminals thatcan electrically couple with the terminals of an integrated circuitpackage such as an encryption module.

FIGS. 40 and 41 illustrate embodiments of a stair stepped integratedcircuit package 4001, 4101, interfaced with the stair step terminals ofa stair stepped PCB. Stair stepped contacts 4004 on IC package 4001 canbe created by stacking lead frames in a common package and which egressfrom its body 4002 for interconnection to the stair stepped PCBterminals. Inside the package, an IC die 4005 is interconnected by wires4003 and the die and wires are encapsulated with a suitable encapsulantmaterial 4050.

FIG. 41 depicts a cross section view of another embodiment of a packageand stair stepped PCB assembly structure 4100 wherein a decryptionmodule in the form of an IC package 4101 comprises an IC die 4105coupled to stair stepped contacts 4104 of a decryption package by wires4103. The stair stepped contacts can be created by laminating metal cladlaminates that allow package circuit traces to accessed from both sidesof the metal at their distal ends to allow stair stepped access forassembly to a stair stepped PCB. By orienting the stair-step terminalsof the encryption package 4101 directly against the stair step terminalsof the PCB, exposure of terminals carrying decrypted signals isminimized, thereby further impeding a hacker from accessing theseterminal to intercept an unencrypted signal.

Within FIGS. 40 and 41, the encapsulant 4050 is limited to be couplingthe IC die to the IC package, and protecting the wires connecting dieterminal to the stair step package terminals. However, epoxy or otherencapsulating agents can be used more lavishly so as to inseparablycouple the encryption package to the PC board, and to more thoroughlyencapsulate the entire IC package. By this design, attempts to accessdecrypted signal carriers by separating the IC package from the PC boardwill result in the destruction of the circuit's functionality.Additionally, as described in conjunction with FIG. 39A, “protective”circuit traces can be used to shield any terminal or circuit tracecarrying a decrypted circuit, such that the decryption package isconfigured to malfunction if discontinuity is experienced in any of theprotective traces. By this design, an attempt by a hacker to accessdecrypted signals by drill through the PC board or the IC decryptionpackage will render the decryption circuit inoperative, therebypreventing unauthorized access to decrypted signals.

In addition to these mechanical safeguards, more sophisticatedsafeguards, such as electronic detection circuitry, may also beincorporated to impede unauthorized access to unencrypted signals. Forexample, an impedance detection circuit can be programmed with anon-erasable circuitry at the time of manufacture. The impedancedetection circuitry in video display device is calibrated to detect anychange in the impedance of a signal path carrying a decrypted signal,and to disable the decryption module if signal path impedance fluctuatesabove a predetermined threshold. If sufficiently accurate, the samecalibration could be universally applied to the impedance detectioncircuitry of identical video display devices. Alternatively, embodimentsare envisioned wherein measurements are made on every video displaydevice at the time of manufacture, and every impedance detection circuitis individually calibrated.

The mechanical and electronic design features described in conjunctionwith FIGS. 39-41 are not intended to be exhaustive, but are offered asexamples to illustrate how various design features can be utilized toenhance the tamper resistance of a decryption circuit. By these andother techniques, hacker access to unencrypted signals can besignificantly impeded.

Still referring to FIGS. 1 and 3, by allowing a user to access the videonetwork via personal computer 321 over the internet, a user can searchfor a video listed on the video network 101 at their leisure from apersonal computer at home or work, and select a video they desire toview. By this embodiment, if the video file selected by a user is notstored in a local video kiosk of the user's preference, a video fileselected by a user (and any ancillary files), can be transferred fromtheir current storage location on the network to a video kiosk 105designated by the user.

In an embodiment, the system can calculate the expected file transfertime and advise the user accordingly. In an embodiment, the videonetwork notifies the user when the file transfer is completed. Thenotification can be sent to the user via any messaging medium,including, but not limited to, e-mail, SMTP, text messaging, “instantmessaging,” voice mail, and auto-dialed voice phone message, “pager”notification, or combinations of these methods. The notification ofcompleted file transfer can also be posted within the video network andaccessed via personal computer. In an embodiment, any user may log ontothe video network to monitor the contents of a particular video kiosk orLAN. A user may also log onto a personal user file within the network bymeans of a password or other identification, and access data relating tofile requests, file downloads, and/or the status of file transferrequests.

Information about various cellular networks, such as the “keystroke”required by a particular cellular network to initiate a “pager” message,or the time delay between keystrokes for certain notices, is also storedwithin the video network. By this means, various notices may moreefficiently be sent to a user. When setting up an account with the videonetwork, the user may simply advise the cellular network used inconjunction with a cell phone number, work phone and extension numbers,and so forth. In setting up the account, the user simply identifies thepreferred data formats for various messages that may be initiated by thenetwork, such as “video now available,” or “video available atalternative kiosk location,” “credit card information not responsive,”etc. When the network generates a message to a user, the particular typeof message may be sent to the user through specific channels or dataformats requested by the user.

Content Provider Access and Support

In existing distribution schemes, such as Netflix or Blockbuster, aphysical inventory must be maintained geographically proximate anypotential user to maintain viable market penetration of a video. Thiscan prevent low budget or “niche” movies from acquiring any marketshare. For example, if a movie is so rarely requested by the public thatonly one out of one hundred rental outlets can expect a request orrental of that movie in any given year, it may not commercially possiblefor distributors to maintain a physical inventory of the DVD that movieat most outlets. It is definitely not commercially viable to maintain aphysical inventory of the DVD at every commercial outlet. As aconsequence, films which do not need a minimal reckless level of publicdemand are not inventory, and become virtually inaccessible to thepublic. Low budget films, silent films from the early years of cinema,and even “first run” or academy award winners more than a few years oldmay become commercially marginalized through a physical inventorysystem. In contrast to current “inventory based” models of videodistribution, in the embodiments described herein, no physical inventoryof DVDs is maintained at a video kiosk or anywhere within the videonetwork 101. But any video file within the network is commerciallyavailable to every kiosk on short notice. A benefit of this feature isthat any content provider has market access, no matter how low thecommercial demand for a movie may be. In the embodiments describedherein, a digital video file need only be stored at one storage locationon the video network. The file can be transferred to any kiosk, and evenmultiplied and distributed among multiple video kiosks within thenetwork on short notice.

In an embodiment, select content providers are required to pay the videonetwork a monthly or annual fee to maintain a specific video file on thenetwork and available for download by users. According to an alternativeembodiment, video files may be maintained on the network without cost tothe content provider. Any user-pay embodiment, royalty payments can beawarded to content providers or other appropriate parties according tothe frequency with which a video file is downloaded by users. By thismeans, the video works of any provider can be made available to thegeneral public in a manner that provides genuine market penetration toany content provider.

Advertising for Content Providers

According to an embodiment, a content provider can produce one or moreadvertisements relating to a video file. The advertisements aredigitally stored within the video network 101 (also referred to hereinby the inclusive term “the system”). In an embodiment, an advertisementis triggered by a match of one or more terms in a search request.According to an alternative embodiment, an advertisement can bedisplayed even without a search match. Various pricing schemes canprovide advertising rights in different formats, different frequency, ordifferent triggers, and so forth. For example, a “still picture”advertisement such as a JPEG, GIF, TIFF or PDF image that is triggeredby a search term might cost one cent per appearance. Alternatively, theJPEG advertisement could be executed a fixed number of times for a fixedmonthly fee paid by the content provider. A “flash” technologyadvertisement, or otherwise dynamic or executable advertisement might beoffered for a higher price than the cost of a still photographicadvertisement, and a still higher price could be required for MPE orMPEG type “movie trailers” or equivalent motion picture advertising. Toavoid pestering a user with annoying or even offensive movie trailers,embodiments are envisioned that include a means by which a user may“turn off” a movie-trailer type advertisement.

FIG. 4-A illustrates a kiosk screen 107 with a user interface field 409for entering a movie title or search term by keystroke, and interfacingthe virtual enter key 411 to execute a search. FIG. 4-B depicts anembodiment of the search screen resulting from the search request ofFIG. 4-A. On the left-hand side of FIG. 4-B is a column of James Bondmovies. Instructions are printed at the bottom of the screen forselecting a particular movie from among that list. The right-hand sideof the screen depicts keys allowing a user to go back to the previousscreen, begin a new search, or go to the home screen of the videonetwork.

Returning to FIG. 4-A, at the top of the screen 107, various screenportions are respectively devoted to a movie trailer advertisement 401,such as might be produced by MP3 or MPEG-4 technology, a text banneradvertisement 403, a still picture advertisement 405 such as a JPEGpicture, and a dynamic “flash” advertisement 407. Different portions ofthe screen 107 may be permanently reserved for specific forms ofadvertising, as illustrated in the example screen on FIG. 4.Alternatively, screen portions may be dynamically selected foradvertising. Audio advertising can also be conducted by a speaker 141(FIG. 1, also see elements 2401, 2403 on FIG. 24) in conjunction with avideo advertisement, or independent from a video advertisement. Thenetwork may charge higher rates for advertisements that include bothaudio and video components. The enumeration of these specificadvertisement forms and options are offered as examples of potentialadvertising formats, however, and are not intended to limit the scope ofthe appended claims.

Embodiments are envisioned wherein the advertisements displayed on apersonal computer may be different from advertisement displayed by avideo kiosk 105. A customer's video file history, including featurelength films that a customer has downloaded, and “trailers” that thecustomer has not “clicked off” by a mouse, but has viewed in total, canbe used to create a customer profile. This profile is recorded withinthe central server in conjunction with the user's PIN. The centralserver analyzes the customer profile to select films and other videofiles likely to appeal to the user.

Targeted advertising to individual customers may then be generatedaccording to the films and videos likely to appeal to a particularcustomer. Targeted advertisements however, are not limited toadvertisements for movies or video files. For example, viewers whocontinually watch movies related to World War II and imperial orNapoleonic Europe, may be statistically good candidates for Europeanvacation if properly motivated. Airlines and/or travel agencies couldproduce advertisements tailored to movie buffs attracted to Europeangenres.

Targeted advertising may include links to URL sites related to aproduct. For example, a commercial airline may target select users withan advertisement of a European vacation. Included in the advertisementis a link on which the user may “click” with a mouse or other userinterface member to gain more information. Accordingly, advertisingrelated to any product or service may be displayed on the video networkto select users. In an embodiment, statistical data may be collected bythe system, and analyzed, or sold to competitive marketing companies,who identify statistically promising correlations between products andnetwork users meeting certain demographic criteria, and who could thensell advertising for market research according to their analysis.

In addition to the selection of movies, targeted advertising to aparticular user may be formulated by other user data, including, but notlimited to, the ZIP code of video network member, the location(s) of thevideo kiosk(s) from which the user downloads video files relating toEuropean themes, the age of the user, the sex of the user, occupation,education, income, credit history, shopping habits, hobbies, etc. Thismarketing information may include information provided to the networkdirectly by a user, and use information gained indirectly, such asthrough credit history, or other data providers.

System Log on at a Video Kiosk

FIG. 5 discloses a method for a user to log on to the video network. Instep 501, a user inserts a portable high-speed memory device 131 into aninterface port 113 of a video kiosk 105.

In step 502, the kiosk reads a unique device ID 129 associated with theportable high-speed memory device 131, as well as any other uniquedevice IDs (e.g. device ID 130 of a corresponding video player 305) thatmay be stored in a portable high-speed memory device.

In step 503, the video network determines whether there is a PIN on filecorresponding to the unique device ID of a high-speed memory device.

If no PIN is on file, in the step 504, the kiosk requests the user tosubmit a PIN (Personal Identification Number of the user) to beassociated with the high-speed memory device. In Step 505, the usersubmits a PIN. In the step 506, the network stores the PIN inassociation with the unique device ID of the high-speed memory device.

If, in step 503, a PIN is found on the network data base correspondingto the unique device ID, in step 507, the user enters a PIN. In step508, the network confirms whether the PIN matches the PIN on file. Ifthe PIN submitted by the user does not match those listed in thenetwork, in step 513, the network initiates steps to resolve the PINproblem. If, in step 508, the user pin is confirmed, and in step 515,the user is given the opportunity to modify an information. In step 519,the user is invited to add additional PINs to the portable high-speedmemory device. In step 521, the user adds additional PINs.

In step 523, the user is given an opportunity to add restrictions toselect PINs associated with a portable high-speed memory device. As willbe discussed in greater detail herein, this feature allows an entirefamily to use the same portable high-speed memory device, while ensuringthat minors do not download objectionable material. It will therefore beappreciated that, in applications where multiple PINs are stored on thesame portable high-speed memory device, one of the PINs will have to bea primary PIN. A user logged in under the primary PIN will be able torestrict the non-primary PINs in step 511, but a non-primary pin willnot be able to restrict a primary pin.

In step 509, the network searches for payment information on file thatis associated with the user, or the memory device. If no paymentinformation is found on file, in step 510, the user is prompted toprovide payment information.

In step 517 the user submits financial transaction information. Thesubmission may be by way of credit card reader, keyboard input, or both.A question or series of questions may be presented by the kiosk whichthe user is required to answer to confirm his or her right to use afinancial account.

In step 512, the credit or financial transaction information is storedin the network. Credit information may include credit cards, checkingaccount information, or debit accounts such as “Pay Pal,” etc.Throughout this disclosure, specific reference to a credit card or acredit card reader are offered only as an example, and should not beconstrued as to limit the scope of the appended claims.

In step 509, if payment information is on file, than, in step 514, theuser is asked if they want to use one of the financial accounts on file.If multiple accounts are on file, in step 516, the available creditaccounts are displayed. In step 518, the user elects the account bywhich the transaction will be paid. If, in step 514, a user does notwant to use credit information on file, in step 520, the user submitsnew credit information.

Throughout the above process, reference to the input of certaininformation through a video kiosk 105 is offered by way of example. Thesteps of downloading financial information, registering a portablehigh-speed memory device to a particular user, and similar steps, mayalso be done over a personal computer via the Internet.

File Download

FIG. 6 describes an embodiment of a video file search process.Throughout the discussion at FIG. 6, reference is also made to the videoscreen displays of FIGS. 4, 7, and 8. In step 600 the user inputs asearch request. The search request may be entered through the user input109 of a video kiosk, or maybe entered through a personal computer 321communicating with the video network 101 via the Internet. In step 601the video network 101 searches a database for matches to the search.FIG. 4 illustrates a keyword search field that might be used inconjunction with the steps described in FIG. 6. Within keyword field 409of FIG. 4, a search term, such as a film title, film character, actor orproducer is entered by the user. The search is activated by an inputcommand such as “hitting” the enter key 411 which is shown on videoscreen 107 as a virtual key.

Referring briefly to FIG. 7, a video screen display is depictedincluding various navigational type searches that can be used in placeof, or in conjunction with the key-word search of FIG. 4. If a useselects “movies” from pull down menu 701, a second level search willappear, as illustrated by the pull down menus 711, 713, 715, 717, 719,and 721 illustrated in the bottom half of FIG. 7. The pull-down menusare intended only as an example, and can also be navigational links,text fillable fields, or other navigational searching tools. Thepull-down fields illustrated in FIG. 7 include, as examples, categoriesincluding the year of release of the movie 711, Academy awardnominations/awards 713, actors 715, actresses 717, director 719, genre721, etc. The menus may be text fillable and/or activated by pull-downchance at 712, 714, 16, 718 and 720. And “enter” key 727 shown by way ofexample as a virtual key, initiates a search.

Within FIG. 7, the data in the pull-down menus correspond generally tothe 1921 silent film “The Four Horsemen of the Apocalypse” with RudolphValentino. However, “The Four Horsemen of the Apocalypse” was a silentmovie. The user has mistakenly identified the movie as having receivedthe Academy award for best music score in pull-down menu 713. Accordingto an embodiment, if multiple search features are entered, but no exactmatch is found, the search engine will identify those movies or videofiles having the “closest fit.” A simple “closest-fit” algorithm forthis would be to select movies or video files matching the mostcategories defined by the user. A more complex algorithm could assign aweight to the various selectable categories. For example, it is morelikely that someone would miss-define the movie genre than they would anactor. The genre of same the movie may be variously regarded bydifferent persons “action,” “drama,” “spy,” or “romance”. In view of thelikelihood of mismatches within the “genre” category, the searchalgorithm may ascribe more weight to the lead actor than the moviegenre. The algorithm could assign a weight of “5” to an identified actorand a weight of “2” to an identified genre. Embodiments are envisionedwherein artificial intelligence programs monitor the final selection bya user, and adjust the weight ascribed to each category to increase thesearch accuracy. Similarly, artificial intelligence or other dynamicstatistical applications may note that users frequently misidentifyactor “A” as actor “B.” In view of this, search requests directed toactor “B” may generate a listing of movies which include actor “A.”Other movie search criteria can include, but are not limited to thelocation of filming, the name of a character in the story of a movie,the producer, or a keyword or famous quote within a movie.

Searches for video files of sports events can similarly be specified byteam name, city, sport, league, country, player, or even record breakingperformances. In addition to movies and sporting events, othersearchable video categories include, but are not limited to, newsstories, political speeches, television commercials, archived weeklytelevision serials or shows, and “made for TV” movies.

The “text-field fill” embodiment of FIG. 4, and the pull-down menuembodiment depicted in FIG. 7 are offered by way of example, and are notintended to limit searching and navigational techniques that may be usedin conjunction with the embodiments described herein.

Returning again to FIG. 6, in step 602, video files deemed to be a bestmatch are displayed on the kiosk screen (or, on the screen of a personalcomputer if the search is being done via PC). Search “hits” fitting thesearch criteria are listed on an output display by an appropriateidentifier, such as a movie title. In searches resulting in more thanone match, some, or all of the matching titles are all displayed on thescreen. In an embodiment wherein multiple matches are displayed, thedisplay order will preferably be according to a default algorithm. Forfeature-length movies, and example of a default algorithm may operate bygenerating an alphabetical listing by actor, director, title, etc.Another example of a default algorithm can include displaying a list ofexact matches to the search request in order of frequency of consumerdownload, followed by a list of non-exact matches in order of frequencyof consumer download, the closeness of the match, but the combinationthereof. The description of the above search algorithms are offered asan example, and are not intended to limit the scope of the appendedclaims, which envisions alternative algorithms for displaying “matches”to a search request.

Turning briefly to FIG. 8, an example of a video screen display of asearch result depicts a four-column field 800 listing search requestmatches to the search request “James Bond.” Four fields include movietitle 801, actor 803, actress 805, and the date of release 807. Thesefor fields are offered by way of example, and other fields are possible.Fields can be tailored for the type of video file, such as featurelength movies, sports events, TV commercials and so forth.

Using the example of FIG. 8 referencing featuring length James Bondfilms as an example, in an embodiment, the order of the matches listedcan be altered by selecting one of the columns. For example, clicking onthe word “title” in column 801 will organize the matches alphabeticallyby title. Clicking on the word “actor” in column 803 will organize thematches alphabetically by the last name of the lead actor. Clicking onthe word “actress” in column 805 will organize the matchesalphabetically by the last name of the lead actress. And clicking on thephrase “date of release” in column 807 will organize the matcheschronologically by the date the movie was released. Clicking on thevirtual button “display according to likelihood of match” will arrangethe display of movies in FIG. 8 according to the likelihood of userdownload based on download history of the Video Network 101. Any one ofthese arrangements may be used as the default arrangement of the initialscreen display.

Returning to FIG. 6, in the step 603, the user adjusts or alters thedisplay of video files as described above in conjunction with FIG. 8.This is part of a dynamic search process.

In FIG. 604, a user selects a video file. The selection may be byclicking on a movie title with a mouse according to the embodimentdepicted in FIG. 8, or through other input devices in other embodiments.

In step 605, in response to the user selection, the data base issearched to identify any optional parameters or ancillary filesassociated with the selected video file. An example of variableparameters include control of nudity, control of sexually suggestivescenes, control of profanity, scenes with excessive violence, etc.Examples of ancillary files include, but are not limited to, alternativelanguages available for use in the audio portion presented inconjunction with the video file, language of subtitles, inclusion of“director's cut” versions, overlay sound tracks with director'scomments, omitted scenes, interviews with actors, etc.

In step 606, the controllable parameters and selectable ancillary filesare displayed on a screen. Not all ancillary files may be displayed,however. For example, a sound track may be divided into a music track,and a separate voice track. Because a voice track may be selected fromamong multiple languages, these language options may be displayed on thescreen. On the other hand, ancillary files such as the music track ortimestamps are not user selectable, and therefore, will not appear onthe screen. FIG. 26 discussed below, illustrates a video screen exampleof selectable parameters and ancillary files.

In step 607, the user selects from among the available parameters andancillary files. Embodiments are envisioned wherein select parametersare not mutually exclusive. For example, alternative sound tracksincluding, censored and uncensored language can be downloaded, and thespecific parameter can subsequently be selected or controlled for aparticular viewing. According to this feature, parents could watch anunedited version of a movie, and then, from the same downloaded data,allow their children to view an edited version of the movie. Timestamps,flags, and other control elements required for parameter selection canbe selected prior to download, or downloaded automatically with a videofile and selected at time of use. The process of parameter selectiondescribed herein is therefore flexible. Similarly, alternative audioportions in different languages could be downloaded with the video fileautomatically, with language selected at the time of viewing, or,language options could be selected at the time of purchase, allowingguests or relatives from another country to view the video file with theaudio portion in their native language, while the user is able to viewthe video file and listen to the audio portion in his own nativelanguage.

In step 608, the video file is encrypted or watermarked. Steps 601through 607 may be conducted from the personal computer via web access.To reduce the consumption of memory within a video kiosk, the process ofencryption or watermarking in step 608 is preferably executed only aftera portable high-speed memory device 131 has been inserted into thehigh-speed port 113 of the video kiosk. Embodiments are envisionedhowever, where a video file is encrypted or watermarked and then storedwithin the video kiosk until the user arrives to download the file.

In step 609, the video file, and any ancillary files and controllableparameters are downloaded to the portable high-speed memory device 131of the user. According to this process, a true “one-to-one” videodownload process is provided. A video file is not stored on a digitalmedia prior to customer purchase. Rather, a customer purchases a videofile, and an individualized video file is generated in response to therequest of the purchaser, and downloaded to an erasable consumer-usablememory module such as the portable high-speed memory device 131 shown inFIGS. 1 and 3.

Because a digital file can be encrypted in segments, or watermarked insegments, steps 608 and 609 need not be sequential, but maybesimultaneous. Watermarking and encryption are discussed in greaterdetail in conjunction with FIGS. 13-22.

File Transfers

Because of the high and ever-growing number of movies, sports events, TVcommercials and other video files, it is not possible for the localstorage 123 in a local video kiosk 105 to store every possible videofile available through the network. According to an embodiment, videofiles are stored within the local databases 123 of individual kiosks 105located throughout the video network. Individual video kiosks 105, maybe separated by many miles, or even thousands of miles. Video files mayalso be stored in the central server 118, or in stand-alone data storagemembers 117 as shown in FIG. 1. As a consequence of this distributedarchitecture, video files are continually transferred over the internetfrom one storage location to another according to user requests.

FIG. 9 depicts an example of a process for executing a video filetransfer. In step 901, a user accesses the video network 101 and entersa request for particular video file. The request may be from a kioskinterface 109 of a particular video kiosk 105-A, or the request may beentered from a personal computer 305 via Internet connection. If therequest is made from a personal computer however, the user must alsodesignate the local video kiosk 105-A at which he desires to download acopy of the digital file.

In step 902, the local video kiosk 105-A searches its local database 123to determine whether the requested video is currently stored within itsown local database. According to step 903, if the video file is storedwithin the local kiosk, then in step 904, a determination is made as towhether the user is at the video kiosk, or placing the order frompersonal computer. If the user is placing the order from a personalcomputer, then, in step 905, the requested video file is marked forretention in the local memory 123 of the local video kiosk 105-A. Thepurpose of marking a video file for retention and a local memory will bebetter appreciated in conjunction with the discussion of the local andnetwork level inventory management systems as described in conjunctionwith FIGS. 10-12. If, in step 904, the user is at a video kiosk, then,in step 906, the video kiosk commences file download of the requestedvideo file to the portable high-speed memory device 131 of the user.

Returning to step 903, if the requested video file is not a storedwithin the local database 123 of the local video kiosk 105-A, then, instep 907, the local video kiosk 105-A transmits a file transfer requestto the central server 118. File transfers are governed, at least inpart, by the central server 118. In step 908, the central server 118searches the central index 120 (FIGS. 1 and 23) to identify thoselocations at which the requested video file is currently stored.

In the step 909, one of the storage locations that currently stores therequested video file is selected as the file source which will transmita copy of the digital video file to the requesting video kiosk. In anembodiment, the file source selected for transmission is designated bythe central server 118. According to an embodiment, a priority value isassigned to a plurality of potential sources. Criteria for determining apriority value, or for selecting a preferred file source from among aplurality of storage locations may include, but is not limited to thebacklog of file transfer requests in a particular storage location, thefile transfer history and reliability of a particular storage location,and the proximity of the file source to the requesting video kiosk.Proximity may be determined by a simple calculation of distance, or mayinvolve a more complex algorithm determining how circuitous route thetransmitted data is likely to take in light of current Internet trafficpatterns. Reliability of a file source can include such features aserror rate during previous transmissions, average transmission time fora given file size, or the number of times they transmitting kiosk orfile source has been deselected due to transmission problems. Theselection of a source location for a file transfer may be made by thecentral server 118.

In an alternative embodiment shown in step 910, the central server 118transmits a list of potential sources of the requested video file to therequesting kiosk 105-A. The information transmitted to the local kioskincludes file sources, and the priority value associated with eachpotential source. By this means, the kiosk can initiate the filetransfer process, beginning with the highest priority file source. If afile transfer request from the highest priority file source fails, therequesting kiosk can identify the next highest priority file source fromwhich to request file transfer.

In step 911, a request is transmitted to the highest priority filesource to transmit the requested video file to the requesting videokiosk 105-A. The request can be sent from the central server 118, orfrom the requesting kiosk 105-A.

In step 912, an attempt is made to transmit the requested video filefrom the identified storage location for the requesting kiosk 105-A. Inthe step 913, if the file transfer is unsuccessful, then in step 919,the next highest priority file source is identified, and the processreturns to step 912. If, according to step 913, file transfer issuccessful, then according to step 914, the local index 1100 (FIG. 11)of kiosk 105-A is populated with the file identifier of the receivedvideo file. The identifier can be a movie title (as shown in column 1101of FIG. 11, or a less descriptive digital value unrelated to the videotitle, generated by the video network and assigned to a video file whenadded to the network. In step 915, if the user has entered the filetransfer request from a PC via the Internet, then in step 916 the videofile received by transmission is marked for retention. As in step 905,this is because the requesting party is not at the kiosk to download thevideo file. As explained in conjunction with the local and network levelinventory management systems, the file may be retained until the userarrives and downloads it, and then immediately expunged from the localmemory 123 of the video kiosk 105-A. Alternatively, the video file maybe retained in the local memory for a time after the use has downloadeda copy of the video file. For example, because of the limited storagespace of the local memory 123 of the video kiosk, the video file may bemarked for deletion within 48 hours (or some other time frame) if therequesting user never arrives to download a copy of the video file. Thedecision to retain or expunge a specific video file from a local kioskis governed by the local inventory management system described inconjunction with FIGS. 10-12. If, in step 915, the user is at the videokiosk 105-A and has inserted a portable high-speed memory device 131into the high-speed port 113 of the video kiosk, then in step 917, therequested video file is downloaded to the portable high-speed memorydevice of the user.

High Speed Processing and Storage

Because many video files contain massive amounts of data, high speedprocesses are required to upload data from a content provider orproducer to the network, to transmit a video file (and associated files)to a local video kiosk storage member 133, and to subsequently uploadthe video file from the storage member 133 to the high-speed port 113for storage in the portable high-speed memory device 131 of the user.FIG. 36 describes alternative embodiments of a method for data transfer.In step 3601, a producer uploads a video program to the central server.In step 3603, the information being uploaded is processed by the centralserver. Processing decisions may include, but are not limited to,determining whether data transmission and/or storage will be conductedserially or in parallel. In step 3605, the video program file isprocessed in the video file is stored as a stream, or sequence offrames. The term “frame” derives from cellulose movies. As usedthroughout this disclosure with respect to digital video files, the term“frame” is used conceptually, and is not intended to be technicallylimiting. For example, data relating to a single frame of cellulose filmmay correspond to a single packet of digital information. Alternativelydata from a single frame of cellulose film to be distributed acrossmultiple data packets, or digital data representing multiple frames ofcellulose film may be transmitted within a single or common data packet.Digital “motion algorithms” may include, but are not limited to,algorithms comprising a basic video file representing a single cellulosemovie frame, information identifying the portions of that celluloseframe which remain unchanged for one or more subsequent celluloseframes, information describing those portions of the cellulose framewhich change in subsequent frames, and/or extrapolation algorithmsdescribing the motion of subsequent cellulose movie frames. Throughoutthis disclosure, therefore, the term “frame” is used conceptually toidentify discrete aspects of a video file, but is not intended to limita digital file to any one embodiment for depicting video motion.

In step 3607, the video program file is processed and stored inparallel. In an embodiment, a fixed number of parallel data storagemembers are assigned to the video file. For example, a video file may bedistributed among “N” storage members. The value of N may be determinedby the size of the video file, or my network characteristics. Forexample, the network may be configured to store video file among up totwenty distinct memory media. According to the size of the video fileprovided in step 3601, however, the network determines to fragment thevideo file among only 10 distinct memory members in a parallel storageformat.

In an alternative parallel embodiment of step 3607, separate frames ofthe video file may be assigned values 1-N such that a video file isdistributed across all “N” memory media members within a memory device.

In step 3609, the central server 118 receives a request for the videofile from a video kiosk 105. The video file is transmitted from acentral server (or from any other stores location, such as a local kioskat a store the video file) to the requesting kiosk. The transmission maybe over the Internet, or a LAN, and maybe in a serial, parallel, orfragmented format.

According to step 3611, the video file is downloaded by the video kioskin a format supporting serial storage and processing with a synchronizedaudio file.

In step 3615, the video file data stream is stored in a manner such thatsequential packets or frames can be accessed serially. This includes anembodiment wherein sequential data packets, frames, etc are stored onsequential cylinders of a high-performance drive array.

FIG. 37 depicts a digital file 3711 comprising digital frames f1, f2, f3. . . through a fn being loaded onto a high-performance drive array 3701through the agency of a data buffer array 3709. FIG. 37 includesalternative serial 3713 and a parallel 3715 embodiments for loading thedigital file 3711 onto the high-performance drive array.

As discussed above, the use of the term “frame” in reference to f1, f2 .. . fn is not limited to an exact digital equivalent of a celluloseframe of the movie. Rather, the term “frame” is used for ease ofexplanation throughout this disclosure, and may refer to anyfile-portion of a digital video file.

Data buffer array 3709 is shown as including eight data buffers B1-B8.The exact number of data buffers is offered by way of example, and thedata buffer array 3709 may include more or fewer data buffers.

High-performance drive array 3701 includes a plurality of platters3703-1 through 3703-n distributed among one or more drives 3707-1through 3707-m. The use of the value “n” as a termination number ofsequential elements is not intended to show an intrinsic relationshipbetween unrelated members sharing the terminal value “n.” There is aone-to-one correspondence between the number of tracks and the number ofcylinders. However, there is no correspondence between the number oftracks and the number of platters.

In an embodiment, platters within a same drive are configured to rotatein unison. The means by which independent platters rotate together canbe mechanical coupling, pictured in FIG. 37 as a common spindle 3717, orindependently rotatable platters controlled by an exact positioningdevice such as a servo-feedback mechanism. Combinations of mechanicalcoupling with minor position adjustment by an optical or electronicmeans are also envisioned. Similarly, separate drives 3707-1 through3707-m may be configured to rotate simultaneously, either by mechanicalcoupling such as a common spindle 3717, or electronic control such as aservo-feedback, or combinations thereof.

Each individual platter 3703 comprises a digital media capable ofstoring digital information. In an embodiment, the digital media of aplatter is divided into a series of tracks, shown as tracks T1, T2, T3 .. . T ω. Tracks are defined by logical partitions and/or magneticorientations that divide a common recording media. Digital recordingmedia may be divided and subdivided into any number of sections andsubsections. Terms commonly used to denote these sections and subsections include, but are not limited to, “tracks,” and “sectors.” Theuse of the term “track” within this disclosure is not intended to belimited to any particular level of sectioning or sub-sectioning, nor toany particular magnetic orientation, nor to any particular digital ormagnetic means of defining separate sections. Rather, the term isoffered in the most generic sense. In an embodiment, the tracks referredto herein comprise a ring oriented around the geometric center of aplatter, or a portion of such a ring.

According to the embodiment of FIG. 37, each platter 3703-1 through3703-n is divided into identically numbered tracks T1, T2, T3 . . . Tn,which are identically positioned on the respective platters, such that agroup of identically numbered tracks form a logical “cylinder,” C1, C2,C3 . . . Cn. For example, all of the tracks T1 among the variousplatters are logically grouped within cylinder C1.

In a download operation, the sequence of frames f1, f2 . . . fn,representing “frames” of digital video file 3711 are loaded into thedata buffer array 3709, one frame per data buffer, and then loaded ontothe high-performance drive array 3701. In an upload operation, frames ofa digital video file are uploaded from the high-performance drive array3701 into the data buffer array 3709. Downloading is performed forpurposes of file storage within the high-performance drive array 3701.Uploading from the high-performance drive array may be performed for thepurpose of loading a video file onto a portable high-speed memory device131, or for the purpose of transferring the video file over the Internet(or a LAN) to another video kiosk 105. The serial and parallel datatransfer operations described below are therefore directed to a downloadoperation only for the purposes of example.

In a serial download embodiment 3713, the data frames f1, f2 . . . fnwithin the data buffer array are loaded from the incoming video file3711 into the data buffer array 3709, and then down-loaded sequentially,one frame at a time, into the to the high-performance drive array 3701.In a serial embodiment, therefore, the data buffer array behaves, insome manner, similarly to a “FIFO” stack. Frames f1 through fn arethereby loaded one at a time onto the high-performance drive array 3701.

Because there is not necessarily a one-to-one correspondence between thedata size of the video frame and the storage size of a track,embodiments are possible wherein a single video file is stored acrossmultiple tracks, or multiple video files are stored on the same track,or wherein a single video frame is optimally stored in a single track.In the examples described herein in conjunction with FIG. 37, however, avideo frame is depicted as having a digital size greater than thestorage capacity of a single track, thereby requiring multiple tracksfor storage.

In a serial embodiment, data is stored on sequential platters 3703-1through 3703-n within a single cylinder before moving to the nextcylinder. In embodiments wherein the drive heads of the respectiveplatters are mechanically coupled, this approach reduces the frequencywith which the drive-heads must be moved. By this approach, when datastorage within a cylinder is completed, drive heads for the respectiveplatters are simultaneously moved to the next cylinder. In an embodimentwherein a single frame requires memory space greater than a singletrack, a single frame is thereby distributed across multiple platters.For example, data buffer B1 begins loading frame f1 onto track 1 ofplatter 3703-1 until no usable storage space remains. Storage of framef1 then commences on track 1 of platter 3703-2. The process continuesdistributing the data within data buffer B1 over successive plattersuntil the storage of frame f1 is completed. Storage of Frame f2 fromdata buffer B2, will commence on the next available track of the samecylinder. When all tracks on cylinder 1 are consumed, writing beginswith track 2 of platter 1.

Alternative embodiments may use different serial frame read/writeprotocols. For example, an expanded embodiment may support fragmentedstorage when the video frame cannot correspond perfectly to sequentialtracks within a cylinder, or successive cylinders. In one embodiment,fragmentation may be achieved by thereby skipping over unavailabletrack(s) and going on to the next available track within the cylinder. Atrack may be unavailable the data is stored thereon, if the media isdamaged, or for other reasons. Embodiments are variously envisionedwherein fragmentation will skip to a “next” platter within a cylinder, anext cylinder, or even skip to another storage drive. In an embodiment,a digital flag will indicate if data storage continues on the next trackwithin the cylinder, or is fragmented to some non-sequential storagelocation. When successive frames of a video file are fragmented intonon-sequential storage locations, digital addressing structures mayutilized to identify a storage location of the next video frame. Byutilizing flags to indicate whether or not storage is fragmented,processing resources for determining a next address are only consumedwhen a digital flag indicates that storage is not commenced at the nextsequential track.

Referring still to FIG. 37, a parallel storage operation 3715 isdepicted by a plurality of lines marked “parallel.” In the first loadcycle, successive frames f1 through f8 are loaded into data buffers DB1through DB8 of data buffer array 3709. Each data buffer is assigned to aspecific platter 3703 for storage of the data temporarily stored in thedata buffer, and the contents of data buffers B1 through B8 aretransmitted to respective platters of a single cylinder, shown, forpurposes of example, as platters 3703-1 through 3703-n. In a “commoncylinder” embodiment of a parallel storage operation, a single storagecycle in will direct individual frames to separate platters within thesame cylinder 3705, such as cylinder C1 for load cycle one.

Assume, for example, a video frame requires three tracks for storage. Inthe first cycle of a parallel data download, the write heads (notpictured) of the various platters 3703 are uniformly disposed abovetrack 1 of their respective platters, thereby aligning in cylinder C1.After usable storage within track 1 of the respective platters isexhausted, the write-heads of the various platters uniformly orientabove track 2 of their respective platters, thereby aligning in cylinderC2. After usable storage within track 2 of the respective platters isexhausted, the write heads of the various platters uniformly orientabove track 3 of their respective platters, thereby aligning in cylinderC3. According to the example, a single video frame may be stored onthree tracks. Accordingly, video frame f1 is now stored across tracks 1,2, and 3 of platter 3703-1, video frame f2 is now stored across tracks1, 2, and 3 of platter 3703-2. Video frame f3 is now stored acrosstracks 1, 2, and 3 of platter 3703-3, and so forth. In the next loadcycle, frames f9 through f16 are downloaded into the data buffer array3709, and stored simultaneously on to respective platters.

In the parallel embodiment described above, the contents of data bufferB1 was always written onto data tracks of platter 3703-1, the contentsof data buffer B2 was always written onto data tracks of platter 3703-2,and so forth. In an alternative parallel embodiment, after the contentsof data buffer B1 has been written across successive tracks of platter3703-1, data buffer B1 is reloaded with another video frame which iswritten on a different platter. This alternative embodiment can beappreciated in an example assuming a five data-buffer array B1 throughB5, and two drives 3707-1, 3707-2, each drive having five platter,respectively defined as platters 3703-1 through 3703-5, and 3703-6through 3703-10. In the first cycle, data buffers B1 through B5 right tosuccessive tracks on respective platters 3703-1 through 3703-5. During asecond download cycle, as the write heads corresponding to platters3703-1 through 3703-5 are physically shifted, the next sequence of videoframes f6 through f10 are loaded into data buffers B1 through B5, andrespectively stored on platters 3703-6 through 3703-10. Again,write-heads respectively assigned to platters 3703-6 through 3703-10simultaneously write to their respective platters within the samecylinder before the write-heads are collectively shifted to the nextcylinder. The write heads continue to shift across successive cylindersuntil the contents of the data buffers has been completely stored.During the third download cycle, data is again written onto platters3703-1 through 3703-5 as the write heads corresponding to platters3703-6 through 3703-10 are repositioned. Other embodiments mayincorporate alternative platter use patterns.

As described in conjunction with serial storage techniques describedabove, parallel storage techniques may similarly skip tracks, platters,or cylinders in the event of a defect. Fragmentation, such as skippingover a corrupted track or a corrupted cylinder, may be accomplished bythe use of flags indicating fragmentation. When a status flag indicatesdata has been fragmented, address structures may be used to direct thewrite controller to the next storage address. Alternatively, the writecontroller (or, when the data is being uploaded, the read-controller)may simply skip to the next available data storage area in the normalread/write sequence.

Returning now to FIG. 36, steps 3613 and 3617 describe a parallelstorage embodiment. The video file is downloaded by a local kiosk 105 ina format supporting parallel storage and processing with synchronizedaudio file. In parallel storage embodiments, video frames (or digital“packets” or some other sub-section of a video file) are stored in amanner whereby multiple frames may be stored or retrievedsimultaneously. As illustrated in FIG. 37, parallel storage may beachieved on a physically separate storage media such as separateplatters of a high-performance drive array. Alternatively, parallelstorage may be accomplished on a common storage media accessible bymultiple read-devices simultaneously. Examples of multiple read devicesaccessing common storage media, including those existing in those yet tobe developed, may include, but are not limited to, multi-ported flashmemory devices, and rotating media with multiple read-heads.

Step 3617 describes an embodiment wherein multiple frames aresimultaneously stored on separate tracks within a cylinder of a highperformance drive array, such as depicted in FIG. 37.

In step 3619, the video kiosk receives a request to load the videoprogram into a hand-held high-speed memory device 131. Steps 3621 and3625 describe an embodiment whereby the video file is seriallytransmitted and/or stored in a hand-held high-speed memory device. Instep 3621, separate frames of the video file are read sequentially andsent to the processing unit is a stream. In step 3625, the processingunit processes of frames is sequentially and passes them over a singlechannel to the hand-held high-speed memory device for storage.

Steps 3623 and 3627 describe a parallel embodiment for transmission fromthe video kiosk to the hand-held high-speed memory device and or storagewithin the hand-held high-speed memory device. In step 3623, multipleframes of the video file are read simultaneously from their respectivestorage locations and loaded into the processing unit in parallelstreams. In step 3627, processing unit simultaneously processes multipleframes in parallel, and transmits them over a multi-channel interface tothe hand-held high-speed memory device for storage.

The alternative serial and parallel processing steps described above mayalso be used for transferring a video file from the hand-held high-speedmemory device 131 to the video player 305 of FIG. 3, and/or the personalcomputer 321 of FIG. 3.

Network Management and File Seeding

FIG. 10 discloses a process by which the video network 101 is seededwith video files. In step 1001, a content provider submits a video fileto the video network 101. Submission includes uploading the video file,ancillary files such as languages in some titles, and controllableparameters which determine whether the movie is shown with or withoutscenes of nudity, sexual situations, profanity, violence and so forth.The submission also entails business prerogatives such as triggersgoverning advertising, the frequency of advertising, the formats ofadvertising, and so forth. A content provider may also designate thenumber of video kiosks in which the file is to be stored. This optioncan be appreciated in view of the fact that video file download of ahigh-definition feature-length movie may be accomplished in a matter ofminutes if the video file is resident within a kiosk, but may take a dayif the video file must be transferred from another kiosk or storage sitevia the Internet. As “next generation kiosks” become available, abusiness prerogative may also include selection of a particular type ofvideo kiosk or storage location having greater or lesser speed andreliability than other storage locations. Contractual agreements with acontent provider may also identify specific or general locations atwhich a copy of the video file must be stored. Depending on the need ofa local kiosk to incorporate various business prerogatives in itsoperation, some contractual business prerogatives may be transferred toa local kiosk, and other contractual business prerogatives may be storedexclusively in the central server 118.

In step 1002, the central server monitors video file requests. In step1003, if a particular video file is subject to frequent requests byusers, then in step 1004, the central server may determine to populatemore kiosks and storage locations with the video file. Alternatively, orin conjunction with step 1004 the central server may determine topopulate faster servers with the video file, according to step 105. Bythe process described in FIG. 10, and video file is seeded throughoutthe video network in a manner that will ensure rapid file transfer tofacilitate file download by users, thereby maintaining a higher level ofcustomer satisfaction.

Local and Network Wide Inventory Management

Video files are stored within distributed storage locations throughoutthe network 101, such as various local video kiosks 105. When a requestis made for a video file at a video kiosk that does not currently storethat specific video file, the file must be transmitted to the requestingkiosk from another storage location. It can readily be appreciated,however, that if no video files were ever purged from the memory of alocal kiosk, each kiosk would have to be equipped with an extraordinary,and ever growing, amount of digital storage space.

The term “cache management” is typically used to refer, at least inpart, to the algorithms and methods for identifying data to be retainedand data to be expunged from a data cache. Because data transmission,even at the speed of light, takes time, the nearer that data is storedto a processing unit, the more quickly the processing unit can processthat data. A “data cache” is typically a small digital storage area,such as one integral to a microprocessor, which eliminates the need toaccess data in a separate memory area, thereby speeding up theprocessing of that data. Various mathematical and logical algorithms areused to estimate the likelihood that a given piece of data will berequired in forthcoming processing activities, and to maintain storageof the highest priority data within a data cache. When the average timefor retrieving data is reduced, processing time is also reduced. Thedecision to keep or expunge data from a cache, introduce new data,and/or prioritize data stored within a cache is typically known as“cache management.” Although the scope and scale of local and networkwide inventory management described herein involves digital storagecapacities many magnitudes greater than commonly associated with theterm “cache,” many of the objectives, concepts, algorithms, variablesand/or considerations commonly associated with “cache management” arerelevant in the inventory management at the local (kiosk) and networklevel. That is, local and network wide inventory management systemscontrol an optimal inventory of multimedia files at individual videokiosks 105 and storage locations 117 throughout the entire video network101. However, the use of the term “cache management” is not intended tolimit inventory management at the local kiosk or general network levelsto existing cache management principles and algorithms. For example,network level inventory management (“super-cache management”) may berequired to maintain a minimum number of identical multimedia filesdistributed among different local kiosks and/or mass storage devices, aproblem one would not expect to find in traditional cache managementapplications. Additionally, many decision-making functions are optimallydelegated to individual kiosks, requiring network level inventorymanagement to consider, as part of its management duties, continuallychanging inventory levels and allocations that were not specificallydirected at the network level. Once again, one would not expect to finda problem of this nature addressed by simpler cash management algorithmscommonly in use.

Accordingly, the embodiments described herein fully comprehend knowncash management algorithms and methods, as well as envisioning newalgorithms and methods uniquely directed to inventory management andallocation of multimedia files within the network described herein.

The local inventory management system identifies video files to beretained and/or video files to be purged from storage within a localvideo kiosk the local memory 123 of a local video kiosk 105. The localinventory management may include local management duties performedwithin a local video kiosk, global local inventory management dutiesperformed within the central server 118, and combinations of both.

FIG. 11 illustrates an example of a Local Video Kiosk Cache ManagementIndex 1100, including examples of various cache management parametersthat might be found within the Local Video Kiosk Cache Management Index1100 in association with specific video files. These cache managementparameters determine the conditions under which a video file is to beretained or expunged from the local memory 123 of a local video kiosk105. Within the example of FIG. 11, the video file of the movie “TheFour Horsemen of the Apocalypse,” the 1921 blockbuster starring RudolphValentino, is not assigned a cache priority. Lack of a cache priorityindicates that it will be scheduled to be expunged from the local memory123 of video kiosk 105-A at some future time, as determined byparameters 1107, 109, and 1111. According to column 1105, “The FourHorsemen of the Apocalypse” has not been downloaded to the local videokiosk yet. It is scheduled for download to video kiosk 1105-A no laterthan 5:45 p.m. for the convenience of the user who ordered this film.According to column 1107, it is guaranteed to be retained within thelocal memory 123 of video kiosk 105-A until at least 8:00 p.m. Accordingto column 1109, download by the user who ordered “The four Horsemen ofthe Apocalypse” will trigger the expunging of this video file from thelocal memory 123 of video kiosk 105-A. This determination is made by thecentral server 118 in view of consumer demand of this video.Alternatively, if the user who ordered this movie does not show up bymidnight, the movie will be expunged at midnight.

If there is a lengthy backlog of file transfer times between videokiosks, a user placing an order and kiosk could be advised to come backat a later time.

Within FIG. 11, the video files of the movie, “Goldfinger,” “TheTerminator”, and “The Matrix,” are not scheduled to be expunged from thelocal memory 123, but have been assigned cache priority values. A cachepriority value may indicate, among other things, the frequency ofdownload of a particular movie. The higher the cache priority value, themore likely the movie will be requested by additional users. If a movieis requested by users more frequently, expunging the movie from thelocal memory 123 would mean that an Internet transfer from anotherstorage location will be required as soon as another user again requeststhat movie from kiosk 105-A. In the example of FIG. 12, letter values A,B, C, D, and E are used for cache priority values, with the letter Abeing the highest priority value, in the letter E being the lowestpriority value. In cache management therefore, the movie “Goldfinger”will be the first to be expunged, if necessary, to free up storage spacein the local memory 123 of video kiosk 105-A for incoming video files.Within FIG. 11, no priority value has been assigned to the four“Horsemen of the Apocalypse” since the cache management of this movie iscontrolled by time driven and event driven parameters, 1107, 1109, 1111,rather than a priority value relative to other movies. In an embodiment,the cache management parameters assigned to a video file are not global,but are dependent upon the geographic location of a video kiosk. Forexample, a film that is highly artistic in nature, but with littleaction, may not even receive a cache priority value at the video kioskof a suburban shopping mall due to the lack of frequency with which itis requested there. It is simply given an expungement time, asillustrated in FIG. 11 with “The Four Horsemen of the Apocalypse.” Onthe other hand, the same highly artistic film may have a greater demandin a more Bohemian geographic locations, such as Cambridge, Mass. orGreenwich Village, N.Y. Accordingly this highly artistic film might begiven a cache priority of “D” in Cambridge, Mass., and the cachepriority of “B” in Greenwich Village, N.Y.

Within FIG. 11, the movie “Modern Times” with Charlie Chaplin has beenassigned a protected cache priority value. This can be used, forexample, to ensure that the movie “Modern Times” is never completelyexpunged from the entire video network 101. The video kiosk associatedwith the cache management Index of FIG. 11 has been designated as apermanent storage location for the movie “Modern Times” by the centralserver 118, thereby accounting for its protected status. Movies that arein low demand may be stored in predetermined storage locations on thenetwork with a protected cache priority status. If Modern Times istransmitted from video kiosk 105-A to video kiosk 105-B, the protectedstatus will not be duplicated in the cache management Index of videokiosk 105-B. Rather, the central server 118 will determine theappropriate cache management parameters for kiosk 105-B based, at leastin part, on the frequency of user requests for this video file at videokiosk 105-B. The video file however will remain in a protected statewithin the sending kiosk.

FIG. 12 illustrates an embodiment of a cache management (inventorymanagement) system. In step 1201, each video kiosk 105 within thenetwork records the outgoing file transfer data relating to filetransfers to and from other kiosks or storage locations 117. Each videokiosk also records file download data relating to the frequency of filedownloads of a particular video file by users. Download data may includebut is not limited to the number of file transfer requests or downloadrequests by users over a given period of time, and the speed with whichthose requests were satisfied.

In step 1202, the video kiosks 105 and stand-alone storage members 117within the network monitor their available storage space and use-limitson storage space for storing data files. Use-limits are determined bythe available memory space, and by cache management parameters assignedto the various files within a video kiosk 105. For example, if a videokiosk has very few movies marked by a high cache priority, and very fewprotected or “time protected” video files, the local storage number 123of the video kiosk 105, has a great deal of potential storage space.Movies having a lower cache priority can be expunged without thelikelihood that they will be re-ordered by a user minutes after theyhave been expunged. On the other hand, a kiosk may have a high number ofvideo files that were ordered by personal computer over the Internet,and which have a guaranteed retention time (“time protected”). Untilthey are downloaded by the user who ordered them, or until theirguaranteed retention time has expired, these video files reduce theavailable storage space for incoming file transfers.

In step 1203, relevant cache management data associated with kiosk105-A, including but not limited to data described in steps 1201 and1202, is sent to the central server 118 for analysis. In step 1204, afile transfer request for video file “Rocky” (also called “Rocky 1” dueto subsequent movies of the same character) is received from kiosk105-A. The central server 118 directs video kiosk 105-B to transmit thevideo file “Rocky” to kiosk 105-A.

By comparing and analyzing local cache management data, the centralcache management system can generate commands to update the cachemanagement parameters associated with Rocky at the sending kiosk, aswell as kiosks not participating in the data transfer, but which store“Rocky.” Update commands may include commands to expunge specific filesfrom specific kiosks. Reports to the central server may be event driven,time driven, or both. An example of an event driver report would be togenerate a cache management report (or request) when the less than 10%of the available memory in the local data storage member was availablefor receiving file transfers. An example of a time driven report (orrequest) would be an hourly report of local cache management data withina local video kiosk.

In step 1205, the central server assigns cache management parameters tothe video file “Rocky” which is being transmitted to the video kiosk105-A. In step 1206, as a result of analysis of cache management data,the central server notifies kiosk 105-B of a change for the cachemanagement parameters of the video file “Rocky”.

An example of a simple cache management algorithm would be to alwaysreplace files having a lower cache priority value with incoming fileshaving a higher cache priority value. For example, referring briefly toFIG. 11, if no storage space remained within the local storage number123, the lowest priority movie, “Goldfinger”, would be expunged tocreate storage space for the incoming video file. This decision could bemade by a local cache management module within the local video kiosk105-A. Notification however would be sent to the central server 118 toensure that the central index 120 was updated.

More complex aspects of a cache management system can be illustrated bythe following example, and still referring to FIG. 11: Statistics withinthe central server have shown that video file that was ordered through apersonal computer over the Internet has only a 5% chance of beingdownloaded by the requester if the download has not occurred by eighto'clock in the evening, a 1% chance of being downloaded after nineo'clock in the evening, and a 0.02% chance of being downloaded after 10o'clock in the evening. Prior to seven o'clock, a movie such as “TheFour Horsemen of the Apocalypse” slated to be expunged as midnight willbe given priority over all other movies. That is, an incoming video willoverwrite the lowest priority video, starting with videos having apriority of E. If no videos of priority E are stored within the localvideo kiosk, and incoming video file will overwrite a stored file ofpriority D. This process will continue on upward to files having apriority of A. From seven o'clock to 8:00 p.m., “The Four Horsemen ofthe Apocalypse” will be given cache management priority above filepriorities E, D, C and B, but not above A. Accordingly, incoming filetransfer requests received between seven o'clock and eight o'clock willfirst seek available file space. If no file spaces available, theincoming video file will seek to overwrite video files having a cachemanagement priority of E. If no such files are available, an incomingvideo file will seek to overwrite files having a cache managementpriority of D. This process will continue up to files having a cachemanagement priority of “B.” Before overwriting a file and the cachemanagement priority of “A,” and incoming video file overwrite “The FourHorsemen of the Apocalypse,” which is scheduled to be expunged atmidnight, and only has a 5% chance that the requesting user will show upto download the video file. Between eight o'clock in the evening andnine o'clock in the evening, the four horsemen of the apocalypse will begiven cache management priority above priorities C, D, and E. Becausethere is now only a 1% chance that the user who ordered “The FourHorsemen of the Apocalypse” will not show up, this movie is no longergiven cache management priority over popular movies having a filepriority of A or B. Between 9:00 p.m. and 10:00 p.m., “The Four Horsemenof the Apocalypse” will be given cache management priority over priorityvalues D and E only. Priority values A, B, and C all have priority over“The four Horsemen of the Apocalypse” by this time. Between 10:00 p.m.and 11:00 p.m., cache management priorities A, B, C, and D are allplaced above “The Four horsemen of the Apocalypse.” Between 11:00 p.m.and 12:00 midnight, the probability of a user showing up to download“The Four Horsemen of the Apocalypse” becomes so low, that cachemanagement priorities A, B, C, D and E are all given priority above “TheFour Horsemen of the Apocalypse.” That is, if no storage space isavailable in kiosk 105-A, after 11:00 p.m., and incoming file willoverwrite “The Four Horsemen of the Apocalypse” rather than overwritingany of the files assigned a priority value. It is more complex cachemanagement example, it can be seen that, as the likelihood of the moviebeing downloaded by a consumer decreases, it is assigned a lowerpriority.

A first goal of a cache management system is to ensure that no videofile is inadvertently expunged entirely from the network. A second goalis to maximize the probability that a user logging onto a local videokiosk will find a requested video file stored locally, therebyeliminating potential Internet delays and consumer annoyance ordissatisfaction. Other important goals may also govern the cachemanagement of video network 101 at the local and network level.

The Central Index

FIG. 23 discloses an embodiment of the central index 120 shown withinthe central server 118 of FIG. 1. The first column 2301 shows a listingof movies available on the network. The second column 2303 shows thevideo kiosks at which the various digital videos are stored. Column 2305shows the cache priority assigned to the various videos within theirrespective kiosks. To ensure that a video file is never completelyexpunged from the video network 101, it will be noted that there is atleast one protected copy of “Superman I”, “Ben Hur”, “Gone With theWind”, and “Modern Times”, listed within the cache priority column 2005.Because file corruption can take place during the transmission of avideo file, the strategy of permanently storing at least one copy of adigital video file in a protected status within a video kiosk ensuresthat at least one copy of the video file available on the network isuncorrupted.

Column 2307 lists the advertising parameters associated with aparticular movie. “Spiderman” one includes both JPEG (still picture)advertisements, and MPEG trailer (a short movie clip). “Ben Hur” and“Gone With The Wind” have contracted only for JPEG advertising, and donot have MPEG trailers available on the network. “Modern Times” withCharlie Chaplin does not have any advertising available on the network.The data displayed in column 2307 is offered as an example. Inapplication, more extensive information governing advertisement on thevideo network 101 would be associated with each video file. Thisinformation would include, but is not limited to, frequency ofadvertising, size of the video portion of the advertisement, eventstriggering the advertisement, cost of the advertisement, and so forth.

Column 2309 discloses the available languages for each respective videofile. Column 2311 records whether the movie includes profanity, andwhether the profanity is controllable. “Spiderman I” is shown to includeprofanity, but is also shown to be controllable. By selecting thisparameter, parents could download the movie “Spiderman I”, and includewithin the download of this movie a controllable parameter such that themovie could be played on a video player 305 and have any profanityreplaced by more socially acceptable terms, or “bleeped out”. Theparticular controls available for profanity would be determined by thecontent provider. The network however would establish standards toensure uniformity among video files, ancillary files, and controllableparameters. The movie “Ben Hur” is listed as having no profanityoccurring. The movie “Gone With The Wind” is listed as having profanity.However, a copyright holder has the option of including or not includingvarious controllable parameters. Referring still to FIG. 23, in the caseof “Gone With the Wind,” the only “profane” line is the famous line,“Frankly my dear, I don't give a damn.” If a copyright holder determinesthat the profanity is either insignificant, essential to a movie, orboth, the copy right holder does not have to provide an ancillary filewith time stamps configured to replace the word “damn” with some otherword. As a consequence, the option of including an “edited version”(which may simply be flags identifying a phrase for removal with orwithout a substitute phrase on an ancillary file), this parameter is notsubject to user control. The movie “Modern Times” with Charlie Chaplinwas a silent film, and therefore has no profanity. Within FIG. 23,column 2309 is representative of one form of an ancillary file that maybe associated with the movie, and column 2311 is intended only as anexample of the sort of controllable parameters that may be associatedwith a movie. The ancillary file and parameter categories listed inconjunction with the central index 120 a FIG. 23 are therefore offer byway of example, and are not intended to limit the various categoriesthat may be listed within the central index.

Encryption, Watermarking, and Content Protection

Embodiments of the system described herein include various forms of copyprotection, including digital watermarking and digital encryption.Digital values used for digital encryption and/or watermarking can bederived from a variety of sources and method. Accordingly, the listingof sources and methods for generation of watermarks and encryptionsdescribed herein are offered by way of example to enable the reader tomore fully comprehend, make, and use the embodiments described herein.The appended claims are not intended to be limited by these examples,but rather, fully comprehend alternative embodiments utilizingencryption keys and/or watermarks generated or provided from any source,as well as any known means of encrypting or watermarking, includinglossless encryption, and a lossy encryption techniques.

According to an embodiment, watermarks and/or encryption keys may bederived from alternative sources, or any combinations of a unique deviceID and alternative sources. Alternative sources include, but are notlimited to, a time or date such as the time and/or date at which adownload sequence takes place from a local kiosk 105 to the portablehigh-speed digital memory device 131, the unique device ID 115 of alocal kiosk 105, the unique device ID 129 of the proprietary high-speedmemory device 131, from the unique device ID 130 of a playback device,values generated by the central server 118, values generated by thelocal kiosk 105, user IDs assigned to individual users, or anycombination of the above values. Two primary embodiments offeringdistinct copy protection can be derived from these options. Theseprimary alternative embodiments are referred to herein as the“encryption by playback device ID” embodiment, and the “encryption bymemory device ID” embodiment. Each offers unique security features.

Encryption By Playback Device ID

Referring briefly again to FIGS. 1 and 3, embodiments are envisionedwherein encryption or watermarking (or both encryption and watermarking)is based, at least in part, on a unique device ID embedded in a digitaldevice. The term “playback device ID” as used herein refers to anydevice ID in any portion of the playback system, including a videodisplay screen, a decryption module, a personal computer, or a videoplayer physically separate from the video display screen. As noted inconjunction with FIG. 3, the video player 305 is depicted as physicallydistinct from the video display device 323 more effectively enable thereader to make and use the embodiments described herein. Although thevideo player 305 may be separate from the video display device 323, in apreferred embodiment, of encryption by playback device ID, thedecryption module and a connection port are integral to the videodisplay device 323, and the unique playback device ID is non-erasablyembedded in the decryption module within the video display device.

In another preferred embodiment encryption by a playback device ID, theunique playback device ID is inaccessible to users. It cannot be read,and cannot even be upload into a proprietary high-speed memory device,or any other digital probing device. The unique playback device ID maybe permanently and non-erasably stored in a register within a decryptionmodule to 339, 341. A unique publicly disclosed identifier correspondingto the unique playback device ID, is digitally stored in, or written onthe playback device. Upon presenting the publicly disclosed identifierto the network, the network retrieves the unique playback device IDcorresponding thereto from any device ID correlation table. Andencryption key is derived, at least in part, from the unique playbackdevice ID, which is inaccessible to users. Additional data such as dateand time may also be used in the generation of the encryption key. Thevideo file selected by a user is encrypted according to this encryptionkey and downloaded to the user's portable high-speed memory device. Thevideo file is then downloaded to the playback device. Unique device IDwithin the decryption module decrypts the video file during playback.Because the unique playback device ID is only transmitted overproprietary network infrastructure, it is nearly impossible for a hackerto intercept this number. Network security can be even further enhancedby encrypting a unique playback device ID when transmitted from acentral server to a kiosk, and decrypting it within the kiosk, therebyeliminating any transmission of the unique playback device ID. Bydenying a hacker access to any device ID, the execution of unlawfuldistribution is further frustrated.

FIG. 13 depicts an encryption process for use in conjunction with thedistribution of multimedia files wherein a decryption key resides in aplayback device, and more preferably, within a decryption module in avideo display device. Although the following steps are described interms of the preferred embodiments, wherein the actual device ID cannotbe read by a user, or even downloaded to a memory device, wherein thedevice ID is on a recently embedded within the decryption module, andwherein the decryption module is integral to the video display device,these specific features are not essential to the more generalapplication of the steps disclosed in FIG. 13, and should not beconstrued as limiting those of steps to these specific features.

In step 1301, the unique device ID is embedded in a digital device atthe time of manufacture. The unique device ID is preferably stored in anonvolatile, non-erasable format within a decryption module 339 of avideo display device 337, but may be stored in another area of aplayback device. According to a preferred embodiment the unique deviceID is preferably not readable, and is stored in such a manner as toimpede any attempts to detect, read, or download this value. A uniquepublic identifier corresponding to that unique device ID, is also storedwithin that digital device at the time of manufacture.

In step 1303, a user assigns a name to the device in which the uniquedevice ID is stored. This name is stored within a “name register” withinthat device.

In step 1305, a portable high-speed memory device 131, is coupled with aplayback device.

In step 1307, the unique public identifier and the user assigned devicename are uploaded from the playback device to the portable high-speedmemory device. Throughout this disclosure, it is understood that theunique public identifier and the user assigned device name are preferredembodiments, but that the steps described herein can be performeddirectly using the device ID without use of a unique public identifieror of a device name. Last preferred embodiments are also envisionedwherein unique public identifier of a playback device is non-erasablystored in a portable high speed memory device at the time ofmanufacture, thereby linking the portable high speed memory device to aspecific playback device.

In step 1309, one or more additional unique public identifiersrepresenting additional playback devices are uploaded for storage in theportable high-speed memory device, as well as the user assigned devicenames corresponding to those respective unique public identifier. Byallowing a user to store additional unique public identifiers and thecorresponding device names single portable high-speed memory device 131,a user is able to select a specific video player for which a video fileis to be encrypted.

In step 1311, a user downloads the public identifier of a playbackdevice to the network via a user interface. This interface may include,but is not limited to, a personal computer accessing the network via theInternet, and input interface and a network kiosk. This information maybe stored in a user account on the network, or may be limited to asingle encryption.

Because many of the steps within FIG. 13 may be executed from the input109 of a video kiosk 105 or from a personal computer 321 of the user,the order of the steps in FIG. 13 is not fixed, and is offered only asan example of an order in which steps may be arranged. This order ofsteps may be altered in alternative embodiments.

In step 1313, the portable high-speed memory device is coupled to thehigh-speed memory port 113 of the video kiosk 105.

In step 1315, the video kiosk reads the publicly disclose identifier(s)(or device IDs) within the portable high-speed memory device.

In step 1317, the video kiosk displays the names of all publiclydisclosed identifiers within the portable high-speed memory device on adisplay screen, requesting that the user select the playback device forwhich the encryption should take place. This step is optional, and maybe dispensed with if only one publicly disclosed identifier is storedwithin the portable high-speed memory device.

In step 1319, the user selects the playback device for which theencryption should take place.

In step 1321, the user selects a multimedia file for download. Ifselectable parameters (e.g., censorship of nudity, obscenity, etc.)and/or ancillary files (e.g., alternative languages) are available, theuser may also select these options, or may choose to download a defaultform of the multimedia file.

In step 1323, the kiosk transmits the publicly disclose identifier tothe central server and requests the corresponding device ID.

in step 1325, the central server accesses an index correlating eachunique public identifiers to a corresponding unique digital device ID130, and identifies a unique digital device ID requested by the network.An example of a central index is disclosed in FIG. 14.

Referring briefly to FIG. 14, a device correlation table 1400 storedwithin the central server 118. A device type is disclosed in the firstcolumn 1401. The device type may include revision data distinguishingequivalent devices. Device type listed in the first column includeportable high-speed memory devices, video kiosks, and video players. Thesecond and third columns 1403, 1405 of FIG. 14 correlates publiclydisclosed identifiers of a particular device with the unique digitaldevice ID. The unique digital device ID is not publicly disclosed, andis preferably stored or embedded within a piece of hardware in such amanner as to frustrate detection or decoding by would-be hackers andsoftware pirates. The concealing of the unique device IDs 115, 129, 130from public discovery thereby adds an additional layer of security tothe encryption process.

In step 1327, a central server encrypts the unique digital device ID,and transmits the encrypted value to the requesting kiosk.

In step 1329, the network kiosk decrypts unique digital device ID, andgenerates an encryption key there from. As discussed above, theencryption key may be generated from a combination of sources inaddition to the unique digital device ID.

In step 1331, a file segment of the select video file (includingancillary files and selectable parameters) is queued for download fromthe video kiosk 105 to the portable high-speed memory device 131.

In step 1333, a determination is made as to whether the select filesegment is to be encrypted. If the select file segment is selected forencryption, then, in step 1333, a queued segment is encrypted.

In step 1335, the segment is downloaded to the portable high-speedmemory device 131. As noted above, encryption keys may be selected from,but are not limited to a unique device ID 129 of the portable high-speedmemory device, 131, a unique device ID 130 of a particular video player305, a unique device ID of the video kiosk 105 performing the download,the time and date of the download, and combinations thereof.

In step 1337, a determination is made as to whether any file segmentsremain for download. If file segments remain for download, the processreturns to step 1331.

In step 1339, if additional information was used to generate theencryption key, such as the kiosk number, date, time, etc., thisinformation is downloaded to the portable high-speed memory device. Itwould be downloaded in an encrypted or an unencrypted form. In a lesspreferred embodiment, the entire encryption key is downloaded to theportable high-speed memory device. As discussed above, in a preferredembodiment, this step is unnecessary since the unique device IDnecessary for decryption is stored within the decryption module, or someother area of the playback device.

In step 1341, the portable high-speed memory device is withdrawn fromthe high-speed port 113 of the video kiosk 105.

In step 1343, the encrypted file is downloaded into the playback devicefor which it was encrypted. Because the encrypted file can only beplayed on the specified playback device, storage on the encrypted filein multiple storage locations allows a user to protect against theft,loss, or corruption of the encrypted file without jeopardizing theintellectual property rights of the copyright holders.

To decrypt the digital video file, the decryption module must have thedevice ID with which the video file was encrypted. The decryption keycorresponding to a particular encrypted multimedia file is downloadedinto a volatile decryption key register within the decryption moduleprior to viewing the multimedia file. A volatile decryption registerwithin the decryption module affords a high level of resistance againsthackers attempting to identify a device ID or decryption key forunlawful duplication and distribution of copyrighted material.

Embodiments are envisioned for both rental and purchase of a video file.In rental embodiments, a user may be prevented from downloading theencrypted file from the proprietary high-speed memory device to a massstorage device. When purchased, however, and encrypted multimedia filemay be stored within a mass storage device.

Encryption By Memory Device ID

In an alternative preferred embodiment, multimedia files are encryptedaccording to an encryption key derived from the device ID of the handheld high speed video device into which they are downloaded. When theproprietary high-speed memory device is coupled to a publicly accessiblekiosk, the device ID, or a publicly disclosed identifier correlatedthereto, is uploaded to the kiosk. In a memory device ID embodiment,however, the memory device ID must be downloaded to a playback device tofacilitate decryption. An exception to this requirement is one in whicha handheld high-speed memory device is paired with a playback device atthe time of manufacture. And embodiment which included such pairing, andlimited play on a particular playback device however, as the same userlimitations as the “playback device ID” embodiment discussed above. Theuser would be restricted to playing a video file on the paired playbackdevice. Accordingly, the “memory device ID” embodiment discussed hereinwill not include discussion of a publicly disclosed identifier. However,the following discussion envisions embodiments utilizing a publiclydisclosed identifier, as well as embodiments utilizing the memory deviceID, or information derived therefrom.

In a first step, the portable high-speed memory device is coupled with anetwork kiosk.

In the second step, a user selects a movie or multi-media file forviewing, including ancillary files and other options discussed inconjunction with FIG. 13.

In the third step, the memory device ID or information divide there fromis uploaded to the network kiosk.

In a fourth step, the selected multimedia file is encrypted according toan encryption key derived, at least in part, from the value uploaded bythe proprietary high-speed memory device, and the encrypted multimediafile is downloaded to the proprietary high-speed memory device. Asdescribed in conjunction with FIG. 13, the downloading is preferablydone by segments. Encryption may be to select segments, or to allsegments.

In a fifth step, the user withdraws a handheld high-speed memory devicefrom the public kiosk.

In a six step, the user couples a handheld high-speed memory device witha playback device. In rental embodiments, download of the encryptedvideo file into a mass storage device is prevented. In purchaseembodiments, the user can download the encrypted file to a mass storagedevice integral to the playback device, or to any other massive storageunit.

In the seventh step, a user identifies a video file for viewing.

Within the decryption module is a register for storing a decryption key,or value relating thereto. In a preferred embodiment, the decryption keyregister is disposed within the decryption module, and is configured toresist decryption key download by a hacker. In an embodiment, thedecryption key itself is encrypted with a secondary encryption duringdownload to conceal the identity of the decryption key from a hacker. Asecondary decryption key can be exchanged between the playback deviceand the portable memory device during a handshaking process.

In the eighth step, the playback device decrypts the encryption key, andstores it in the decryption key register of the decryption module. Thedecryption key register is preferably a volatile memory area, and ispreferably limited to storing a single decryption key. The decryptionkey, or a value relating thereto, must be downloaded to the volatileregion key registry in order to view or play an encrypted multimediafile corresponding to the decryption key. Download of the decryptionkey, or a value relating thereto, may be loaded into the volatiledecryption key register by coupling the proprietary high-speed memorydevice with a port of the playback device.

In a nine step, the decryption key is expunged from the decryption keyregister within the decryption module. Expungement may be time driven,event driven, or combinations thereof. For example, the event ofdecoupling the proprietary memory device from the playback unit couldinitialize the expungement process. However, the expungement may beinstantaneous or delayed. One can imagine, for example visiting a friendfor Christmas vacation, downloading and encrypted video file, couplingthe proprietary memory device with the playback device in order todownload the necessary decryption key to the playback device, and flyinghome. A delay of one or two days would enable the friend to view themovie after the owner of the proprietary memory device had departed.Alternatively the expungement of the encryption key could be contingenton serial events. The first event is the withdrawal of the proprietarymemory device. The second event can be the act of queuing a differentmovie for playback, viewing the movie which has been temporarilyenabled, downloading a different memory device ID to the playbackdevice, or combinations thereof. These examples of event driven and timedriven expungement of a decryption key from a decryption module are onlyoffered as examples however, and are not intended to limit the spiritand scope of the appended claims, which fully comprehend the expungementof a decryption key by alternative events, delays, and combinationsthereof.

In an alternative embodiment, the decryption key, or a value relatedthereto, including an encrypted version of the encrypted key, may bedownloaded into the playback device or video display device from aplayback wand. A playback wand is a digital device configured todigitally store a digital value representing at least one memory deviceID (or a value derived therefrom), and to transmit that value directlyor indirectly to a playback device. Embodiments of a playback wandinclude an I/O port configured to couple with a port of a playbackdevice, and to receive a digital signal from the playback device. Aplayback wand is preferably paired with one and only one memory deviceID at the time of manufacture such that the memory device ID of thepaired memory device is stored within the digital storage area of theplayback wand in a nonvolatile non-erasable format. A playback wandpreferably includes a first encryption algorithm for confirming aconnection with a playback device through an encrypted handshake. If theplayback wand detects a valid encrypted handshake, it transmits thememory device ID stored therein, or a value derived therefrom. If theplayback wand fails to detect and verify an encrypted handshake, it willeither output a false memory device ID, will not output any signal inits place. By these features, the playback wand is configured tofrustrate attempt bys hackers to identify the memory device ID storedtherein, thereby offering another layer of protection to copyrightholders of multimedia files.

The principal distinctions between a playback wand and its correspondingproprietary handheld high-speed memory device to which it is paired, isthat the playback wand has significantly less digital storage capacity,thereby reducing the cost of the playback wand. Additionally, a playbackwand could be substantially smaller than a handheld high-speed memorydevice. However, any of the features of the hand held high speed memorydevice may be present in the playback wand. Alternatively, a playbackwand may have any number of unique features distinct from the hand heldhigh speed memory device. Because a playback wand need only download adecryption code, and possibly a few hand shake responses, the playbackwand need not be high speed. It can, however, communicate with theplayback device through a proprietary port which may include amechanical interlocking, hardened materials, and other design featuresto prevent detection and reading of the decryption code stored therein.

It can be further appreciated that the unique device ID from which theencryption and decryption keys are derived does not need to be storedwithin a high-speed memory device in embodiments utilizing a playbackwand, further reducing the ability of a hacker to discover the uniquedevice ID from which the encryption and decryption keys are derived. Theunique device ID can be stored exclusively in the playback wand, and ina lookup table of the network. The playback wand can be paired to ahigh-speed download device in a highly visible user friendly manner suchas color schemes, icons, or alphanumeric characters. The high-speeddownload device only needs to store a publicly disclosed identifierwhich can be downloaded to a kiosk to retrieve the corresponding deviceID stored by the network. In this embodiment however, playback of amultimedia file could not be initiated by the high-speed memory device.This feature could create frustration among users seeking to play amulti media file at a friends house. The user would have to bring boththe high-speed memory device in which the video file is stored, and theplayback wand to initiate play of the multimedia file. The additionalsecurity gained by eliminating the unique device ID from the high-speedmemory device must be weighed against a loss of utility and flexibilityfor the user.

Regardless of whether or not unique device ID is stored within thehigh-speed memory device, significant advantages inure to the consumerfrom the playback wand embodiment. A first advantage is the protectionagainst a loss of the proprietary high-speed memory device. Becauseproprietary high-speed memory devices are continually transported topublic areas by a user, they are subject to being misplaced, lost, orstolen. If the portable high-speed memory device were the only means fordownloading the encryption key to the playback device, a loss of thisdevice could represent the loss of any number of encrypted multimediafiles. A playback wand however, could be stored in a permanent locationin, on, or near a playback device, and even tethered to the storagelocation by a lanyard to prevent loss. In a playback wand embodiment,loss or theft of a portable high-speed memory device does not prevent auser from viewing encrypted films, and does not represent catastrophicloss.

Advantages of the playback wand embodiment to the consumer, however, canerode the protection afforded to copyright holders. If both a playbackwand and its corresponding high-speed memory device store the uniquedevice ID, file sharing could occur where in two separate users at twodistinct locations could view to separate video files which had beenencrypted according to the same device ID. Copyright holders andlegislators would have to determine whether this very limited potentialfor file sharing unreasonably erodes the protection that should beafforded to copyright holders.

Throughout this disclosure, specific details of downloading anencryption key to a playback device are offered for the sake of brevityand clarity. The appended claims comprehend embodiments utilizing aplayback wand, and embodiments wherein download an encryption key isdone directly from the portable high-speed playback device.

Embodiments utilizing a “memory device ID” to generate an decryptionkey, as described above, provide consumers with an advantage which isnot available in the embodiments utilizing a “playback device ID” togenerate a decryption key. Specifically, a user can play a multimediafile on any playback device, and is not restricted to a single playbackdevice. However, both the “memory device ID” embodiment and the“playback device ID” embodiment protect the interests of both aconsumer, and a copyright holder. A consumer could, in eitherembodiment, store multiple “backup” copies on an encrypted multimediafile on any number of computers or mass storage devices to protectagainst loss, theft, digital corruption, or device malfunction of astorage device in which multiple encrypted files have been stored. Atthe same time, these embodiments offer maximum protection ofintellectual property rights of the copyright holders.

FIG. 15 discloses a process for playing an encrypted file on a videoplayer 305. In step 1501, the portable high-speed memory device 131 iscoupled to the high-speed port 317 of the video player 305. In step1503, if the file within a portable high-speed memory device isauthorized for storage, then in step 1505, the video file is stored inmemory. The memory can be memory device 335 resident within the videoplayer 305, or may alternatively be an external memory device, such asmemory device 333 within the personal computer 321.

In step 1509, a user selects one of video files stored in memory forplay.

If, in step 1503, the video file stored on the portable high-speedmemory device is a rental, and not authorized for permanent storage bythe user, then, in step 1507, the hand held memory device will refuse todownload the file. The rented video file within the portable high-speedmemory device 131 is authorized only for direct play through the videoplayer 305.

In step 1511, the user initiates the process of playing(displaying/performing) the video files stored within the portablehigh-speed memory device, and the video file is queued for play on thevideo screen 323 as well as outputting the soundtrack to audio Speakers.

Whether a video file is selected for play from the memory 335 of thevideo player 305, the memory 333 of the personal computer 321, ordirectly from the portable high-speed memory device 131, in step 1513,play is commenced when a segment of the video file (and correspondingancillary file segments) are loaded into one or more play queues of thevideo player 305.

If, in step 1515, the video file has been watermarked or encrypted,then, in step 1517, the a determination is made as to whether thedecryption key associated with the video file has been loaded into thedecryption key buffer of the video player (including decryption keystorage directly within the video display device 323) of FIG. 3. If, instep 1515, the video file has only been watermarked, no action isnecessary in step 1517.

If the decryption key has not been loaded into the decryption key bufferof the playback device, then in step 1519, the decryption key is loadedinto the decryption key buffer. If a file has been watermarked in lieuof, or in addition to encryption, in step 1519, a search is made of aLocal List of Pirated Watermarks to determine if the watermark of thequeued video has been pirated.

In step 1523, the a decryption module 341 within the video player, oralternatively, a decryption module 339 within the video display devicedecrypts the encrypted file segment(s) according to the decryption key.It is recalled that the decryption key may be derived, at least in part,from the unique device ID 337 of the video display device 323, theunique device ID of the video player 305, the unique device ID of theproprietary high speed memory device 131, or the unique device ID of aplayback wand. In watermark embodiments, step 1523 may alternativelyinclude authorizing play of the file segment based upon the validity ofthe watermark.

In step 1521, the decrypted (from step 1523) or unencrypted (from step1515) file segment is loaded into a play queue of the video player.

In step 1525, the video segment is displayed (played) by the videodisplay device 323. Audio and other ancillary files may also be playedat this time.

In step 1527, if no additional file segments remain for play, then, instep 1529, the process ends. If, in step 1527, additional segmentsremain for play, then in step 1531, the video player identifies the nextfile segment (and ancillary file segments) awaiting play. The processreturns to step 1513.

By embedding an decryption algorithm at the transistor level of adecryption module, such as an integrated circuit package of the videoplayer 305, there is no application that can be pirated for reverseengineering. The use of non-erasable and non-readable algorithms willtherefore significantly impair a hacker from “reverse engineering” thedecryption, further impeding unlawful copying and distribution ofcopyrighted material. The decryption process of FIG. 15, however, isintended only as an example. The appended claims comprehend alternativewatermarking and decryption schemes and processes.

FIGS. 16-22 are directed to embodiments utilizing a watermark in placeof, or in conjunction with, an encryption scheme. FIG. 16 is directed tothe process of watermarking a file during the download of a digitalvideo file from a kiosk to a portable high-speed recording device 131.

In step 1601, the portable high-speed memory device 131 is inserted intothe high-speed port 113 of the video kiosk 105.

In step 1603, the user selects a video file for viewing.

In step 1605, the video kiosk generates a unique digital watermark to beincorporated in the download of the digital video file. The watermarkmay be generated, at least in part, from the unique device ID 130 of theportable memory device 131, the unique device ID 129 of a select videoplayer 305, the unique device ID of the video kiosk 105 performing thedownload, the time and date of the download, or combinations of thesevalues. Generation of watermarks, however, are not limited to these datasources. These values and identifiers are offered by way of example, andare not intended to limit the way in which watermarks can be generated.

Steps 1301, 1303, 1305, 1309, 1311, and 1313, described in conjunctionwith FIG. 13 may also be incorporated into the process described in FIG.16.

In step 1607, a segment of the selected video file and/or ancillaryfiles and selectable parameters are placed in a queue for download.

In step 1609, a determination is made as to whether the queue videosegment is designated for watermarking. If the queued segment isdesignated for watermarking, then in step 1611, a watermark is added tothe file segment, and in step 1613, the file segment, the watermark, andany associated ancillary files or selectable parameters are downloadedinto the portable high-speed memory device.

A watermark may be incorporated into a video file in such a manner thatit is visually displayed on one or more “frames” or “scans” of a videopicture. The watermark display may be sufficiently fast that it isunnoticeable to a viewer, and inserted at regular intervals, or evenrandom intervals, into various frames of the video output file. Anadvantage of projecting a watermark as a visible display as describedabove can be appreciated by understanding one of the common video piracytechniques used today. Video pirates will often take a high-definitionhand-held video recorder into a theater, and record the movie as it isprojected on the screen. This “analog” video recording is then combinedwith the soundtrack, and distributed on the black market. Although thequality of such analog recordings is typically far below those which arecopied through direct digital file transfer, as the recording quality ofhand-held “camcorders” continues to improve, the commercial viability ofmovies pirated by “analog” techniques continually increases. It cantherefore be appreciated that, if watermarks can be detected onlythrough a digital examination of a file, video files which have beenpirated through an “analog” process (such as a theater recording asdescribed above) are basically impervious to watermark detection on thedigital level. Accordingly, the ability of international authorities totrack and confiscate black-market videos, may in certain cases, requirea “visible” watermark. As noted above, a visible watermark need not bereadily detectable to a casual viewer. As watermarking becomesincreasingly sophisticated, video piracy will also increase insophistication. In an embodiment, watermarking may include multiplewatermarks, including the invisible watermarks that may only be detecteddigitally, and visible watermarks.

It is understood that the order of steps described in FIG. 16 areoffered by way of example, and are not intended to be fixed. Forexample, a file segment can be downloaded into the portable high-speedmemory device prior to the generation of watermark. Subsequently, awatermark may be generated in downloaded separately. The steps of FIG.16, therefore, are offered simply as illustrations to enable one skilledin the art to make and use the claimed invention. The content in orderof these a specific steps are not intended to limit the scope of theappended claims.

In step 1615, the video kiosk determines if there are any more filesegments remaining for download. Remaining files may include videofiles, ancillary files, selectable parameters, and watermarks. If filesegments remain, the process returns to step 1607.

In step 1617, the watermark is a stored in a Central Transaction RecordFile 1700 (FIG. 17) in a data table along with selected data such as thevideo ID (e.g., the movie title) the user ID of the person who performedthe download, and the device ID 129 of the portable high-speed memorydevice used in the download process. The information of table 1700 isoffered only by way of example, and other information may also becross-linked to the watermark within the Central Transaction RecordFile.

An embodiment of the Central Transaction Record File 1700 is depicted inFIG. 17. The download record in 1700 is depicted as a data table whichincludes column 1701 storing the date of a video download, column 1703storing the watermark of a video download, column 1705 recording thevideo kiosk at which the download occurred, column 1707 recording theunique device ID 129 (FIG. 1) of the portable high-speed memory device131, and column 1709 recording the video file ID which might be depicteddescriptively, such as a movie title. Because multiple “Tarzan” movieshave been stored within the video system 101, within column 1709 of FIG.17 the particular video ID is depicted as “Tarzan 0038”. Because onlyone movie entitled “Goldfinger” is stored within the video network, thevideo file ID of this movie is “Goldfinger 001”. For database purposeshowever, video IDs need not be descriptive, and may simply comprise astring of characters assigned by the central server to optimize storageidentification and retrieval of various video files. The data categoriesdepicted in the embodiment of FIG. 17 are offered by way of example.Other database information can be cross-linked to the General Video FileDownload Record 1700.

Returning now to FIG. 16, in step 1619, the user withdraws the portablehigh-speed memory device from the video kiosk 105. In step 1621, userinserts the portable high-speed memory device into the high-speed port313 of a video player 305. In step 1623, the digital video file, alongwith ancillary files such a the video file identifier, selectableparameters, and the unique digital watermark, are downloaded into thememory 335 of the video player 305, or an external memory 333 such asmight be followed within the personal computer 321 of the user.

A watermark can help identify a mass-pirated video file, such as mightbe distributed through the black market on DVDs. Positive identificationof pirated video files can assist law enforcement authorities insecuring the necessary court orders for rapid confiscation ofblack-market DVDs or other unlawful recordings.

In addition to copyright enforcement, the methods set forth in FIGS. 18through 22 disclose embodiments of a process by which digitalwatermarking may render pirated DVDs virtually useless in themarketplace.

In step 1801, a pirated video file is identified by network security. Instep 1803, the digital watermark of the pirated video file is uploadedto the Central Pirated Watermark Index 1900 (FIG. 19) within the centralserver 118 (FIG. 1).

Referring briefly to the central pirated watermark index 1900 of FIG.19, the first column 1901 includes a listing of all invalid or piratedwatermarks. The second column 1903 of the index includes the video fileID associated with the watermark. Column 1905 of the index designateswhether the watermark is authentic or not. In the example of FIG. 19,both pirated watermarks corresponding to the video file “Spiderman I”are designated as authentic. This means that these files of the movie“Spiderman I” were originally downloaded off the video network accordingto the listed watermarks, but was unlawfully distributed after beingdownloaded. Invalid watermarks can be further distinguished according tothe type of infraction, or the extent of the infraction. For example,the type of unlawful distribution may be identified by type and grade.If video files are being unlawfully duplicated without cost, it would bedesignated as an “unlawful distribution.” If investigation determinesthat a copyrighted video is being distributed for profit, it isdesignated as an “unlawful sale.” Similarly, the extent of unlawfuldistribution can be graded. For example, quantities of seven to twentyfive would be graded “level 1.” Quantities of twenty six to one hundredwould be graded a “level 2,” and so forth. The type of violation and theextent of the copyright violation can be used to determine the actiontaken by the network. A remedial action may begin by notifying a userthat a multimedia file which he downloaded had been copied toofrequently, and will be de-activated if it is copied again. More severeinfractions can result in de-activation of a multi-media file, beingbarred from network use, civil action, or criminal complaint. On theother hand, data within column 1905 discloses that the watermark for“Gone With the Wind” is not authentic. This means that moresophisticated video piracy was involved, wherein the watermarkscorresponding to Gone With the Wind were not created by the network, butrather, were created on the black market. According to the example ofFIG. 19 therefore video pirates distributing “Gone With the Wind” haveattempted to mimic network protocols for watermarking by embedding thebooklet watermark in a digital file of “Gone With the Wind”, and havedistributed, or attempted to distribute this file on the black market.This level of sophistication would be more likely to trigger civil orcriminal action. Column 1907 discloses the download date of the videofiles that were downloaded from the video network. Because “Gone Withthe Wind” was not originally downloaded from the video network 101, ithas not been assigned a download date in column 1907. Column 1909discloses the date that the copyright infringement was discovered.

This date, or an equivalent date, could be used in the process ofupdating local user files with the identity of the invalid watermarks.If a user's last update of the invalid watermarks was Jan. 12, 2008, thenext time that the user logs onto the network 101 and updates the locallisting of invalid watermarks, the system can identify any watermark(2009, FIG. 20) dating from Jan. 12, 2008 onward. By utilizinginformation in column 1909 in this manner, a user update of invalidwatermarks need not include the complete listing of watermarks, but needonly include invalid watermarks added to the index since the last userupdate. The data columns of FIG. 19 are offered by way of example, andare not intended to limit the appended claims. Other data columns may beinclude within or cross linked to the index 1900 of FIG. 19. Forexample, the index may include the user ID of the person who downloadeda video that was later pirated, the country in which unlawfulduplication or distribution is believed to have originated, thegovernmental entities assisting in the policing of the infringed videofile, etc. The listing of specific data columns in conjunction with FIG.19, therefore, is offered by way of example, and should not be construedso as to limit the scope of the appended claims.

The network can become alerted to unlawful distribution in a variety ofways. According to one embodiment, a proprietary high speed memorydevice may retain a count of how many times it has downloaded awatermark into a playback device or storage device. To prevent bypassingof a proprietary high speed memory device by simply duplicating amultimedia file by computer, embodiments are envisioned wherein theproprietary high speed memory device comprises a proprietary port thatwill not couple with a personal computer, and wherein all storage andplayback devices are also proprietary, and not able to interface with astandard computer. Whenever the proprietary high speed memory device islinked to the network, it updates the network as to the number ofdownloads performed.

According to an alternative embodiment, a proprietary high speed memorydevice may, when coupled to a playback device, query a playback devicefor its “local watermark index” of stored files. Subsequently, whencoupled to the network, the proprietary high speed memory device willautomatically upload the local watermark index to the network, andidentify the playback device on which the files are stored. Bymaintaining a record of all watermarks within the central server, thenetwork is able to monitor and track unlawful distribution of a videofile. It can readily be appreciated that, even apart from encryption,the watermarking tracking system described herein, by monitoringcopyright infringement and taking appropriate action could reasonablyprotect the intellectual property rights of various interests. When thewatermarking and encryption processes described herein are combined,intellectual property rights for multimedia files receive unparalleledprotection.

Returning to FIG. 18, in step 1805, an “auto update” module within thevideo player 305 or the personal computer 321, accesses the videonetwork via the Internet. For brevity and clarity, the followingexamples will largely reference Internet communications is beinginitiated by the video player 305, and data storage and data retrievalas taking place within the local memory 335 of the video player 305.These details are offered by way of example only, and are not intendedto limit the scope of the appended claims. Many of the functionsattributed to the video player 305 in the following examples, can, inalternative embodiments, be conducted by other devices, such as thepersonal computer 321 of FIG. 3 FIG. 3, and its component parts, such asthe disk drive storage 333.

In step 1807, once communication has been established with the videonetwork 101 (FIG. 1), the auto update module initiates a “PiratedWatermark Update Request”. The request can also include informationneeded to verify the authenticity and integrity of the requesting videoplayer 305 and its contents. The information sent by a video player 305to the central server 118 in the request may include, but is not limitedto, the unique device ID of the video player or computer initiating therequest, the date and time of the last update of pirated watermarks, andthe authentication certificate issued by the central server 118 duringthe last update. The requesting video player may also send the “last”watermark it received, or a sequential number identifying the lastwatermark correlated with the last watermark, to assist the centralserver in determining where the last update stopped, and where to beginthe new update to the local list of pirated video files 2000 (FIG. 20).

Because step 1809 discloses a comparison between data in FIG. 20 anddata in FIG. 21, the contents of these data tables is discussed inconjunction with step 1809. Referring briefly to FIG. 20, the “LocalPirated Watermark Index” 2000 depicts an embodiment of a data tablestored within the memory of a user device such as memory 335 of videoplayer 305, or the memory 333 of personal computer 321. The LocalPirated Watermark Index 2000 includes a data table 2009 comprising alist of pirated watermarks 2011 and have been disclosed to the userdevice, along with their corresponding video file IDs 2013. The index2000 also includes a time and/or date field 2001 for storing the timeand/or date on which the list of pirated watermarks 2011 was lastupdated by the video network 101, a time and/or date field 2003depicting the current time and/or date, a digital value 2005representing the authentication certificate issued by the central serverat the time of the last update, and the sequential number 2025 of the“last” watermark received during that update.

The Central Pirated Watermark Update Index 2100 within the centralserver 118 contains some or all of the information in FIG. 20corresponding to every video player 305 that has been purchased by aconsumer, or that has accessed the video network 101. The update index2100 is illustrated by way of example is including a first column 101for storing the unique device ID of those video players that have beenpurchased by consumers, or those that have accessed the network at sometime. The second column 2103 lists the last update time and/or date ofthe user device (e.g., the video player 305) corresponding to thereferenced video ID of column 2101. The third column 2105 lists asequential number or timestamp corresponding to the “last” pirated awatermark with which the corresponding video player was updated. Thefourth column 2107 lists the last authentication certificates issued tothe respective video players.

Returning to FIG. 18, in step 1809, the video network compares the datareceived from the requesting user device (such as video player 305) asdiscussed in conjunction with FIG. 20, with data stored in the CentralPirated Watermark Update Index 2100 of the central server 118, asdiscussed in conjunction with FIG. 21. If, in step 1811, the datareceived in the update request does not match the data corresponding tothe requesting video player which is stored within the Central PiratedWatermark Update Index 2100, user device requesting the watermark updatedemonstrates evidence of tampering, and in Step 1812, various securitymeasures may be taken in conjunction with this evidence. The securitymeasures of step 1812 may include, at the very least, refusal to issue anew update time 2001 and/or authentication certificate 2005 requestingdevice. As will be appreciated in conjunction with FIG. 22, this refusalwill, in certain embodiments, eventually disable a user device such asvideo player 305 from playing video files stored therein. Additionalsecurity steps within step 1812, may include, but not limited to,immediately disabling the video player 305 by means of a digital signal(or disabling within a personal computer evidencing tampering anapplication or module used for video playback), flagging the identity ofa user whose video rentals have been played by (or stored in) the deviceshowing evidence of tampering, notifying a user of the discoveredtampering, restricting the functionality a portable high-speed memorydevice linked to the video player, notifying civil authorities, orcombinations of the above actions.

The confirmation of a user device as depicted in steps 1809 and 8011,(involving a comparison of data in FIGS. 20 and 21), is offered by wayof example. Other tests may also be conducted to confirm theauthenticity of the video player and the integrity of the list ofpirated watermarks within that video player in conjunction with, or inplace of, step 1809. For example, the central server requests that thevideo player identify all watermarks it currently contains for piratedcopies of a particular movie, such as “Butch Cassidy and the SundanceKid,” that were added to the Local List of Pirated Video Files 2000(FIG. 20) during or prior to the last update. If a hacker had expungedthese watermarks from the Local List of Pirated Watermarks within thevideo player, such an inquiry by the central server would discover thisform of tampering. None of these examples relating to steps 1809 and1811, however, is intended to be limiting. From the above steps, it canreadily be appreciated that a wide variety of handshakes, pings,cyclical redundancy checks, file inquiries, search engines, and thelike, can be incorporated in place of, or in conjunction with the abovesteps in ensuring that a video player 305 or computer 321 has not beentampered with.

If, in step 1811, the central server 118 confirms the integrity of therequesting video player 305 (and the data stored therein), then thecentral server continues the update process. This begins in step 1813,wherein the central server identifies, within the Central PiratedWatermark Index 1900, those watermarks that have been added since thelast update time 2001 of the requesting user device. As noted, theupdate time and date 2001 of that last update, or a sequentialidentifier or timestamp 2025 associated with the “last watermark” may beused to identify the “new” watermarks within the Central piratedwatermark Index.

In step 1815, the updated list containing the most recently piratedwatermarks, the file identifiers (movie titles etc.), and the timestampsor sequential numbers associated with the respective watermarks, aredownloaded to the requesting video player 305, and stored in the LocalList of Pirated Video Files 2000. The central server 118 generates a newtimestamp for the update time, and a new authentication certificatecorresponding to the timestamp. These are also sent to the video player305 (or a computer) and stored in their respective fields 2001, 2005(FIG. 20).

FIG. 22 illustrates a process by which intellectual property rights ofcopyright holders and content providers are protected through thewatermark system described above. In step 2201, a user selects a storedvideo file for viewing through video player 305. The selected video filemay be stored in any user controlled digital memory area, such asdigital memory 335 of the video player 305, or in the data storagemember 333 of a personal computer 321.

In step 2203, the video player compares its last watermark update timeand/or date (shown in field 2001 of FIG. 20) to the present time anddate (shown in field 2005 a FIG. 20). Those skilled in the art willappreciate that a false time may be programmed into a digital devicesuch as the video player, thereby frustrating the time comparison.Various security modules and safeguards can be incorporated to preventabuse of the time lapse comparison described herein, such as a dedicatedclock that is separate from the system clock of the computer, and thatis inaccessible to hackers.

If, in step 2204, a determination is made that data into video playershows evidence of tampering, then appropriate action is taken. Anexample of such action is illustrated in step 2206, where the videoplayer is digitally disabled.

If, in step 2204, data within the video player does not show evidence oftampering, then, in step 2205, a determination is made as to whether toomuch time has elapsed since the last update. If the elapsed time sincethe last update exceeds the allowable time, then in step 2207, the videoplayer 305 (or application module within user computer 321) will bedisabled from playing movies or video files digitally stored therein.

In the step 2209, the user is notified that video files stored withinthe memory of a specified user device can no longer be played until thewatermark list is updated through an internet connection. Notificationcan take any known format, such as a text message on an LCD display, anoutput to a video display, or even a simple light on the video playerwith a physical notification of the update requirement printed proximatethe light. In an embodiment, notification described in step 1809 may bedone prior to an invalid attempt to access a video file within thememory. For example, an LED or LCD may continually display the amount oftime that has passed since the last watermarked update, or the remainingtime before a watermark update is required.

If, in step 2205, the last update time 2001 (FIG. 20) is within therequired time period for watermark update, then, in step 2214, the videoplayer 203 compares the watermark of the video file selected for playwith the watermarks stored in column 2011 of the Local List of PiratedVideo Files 2000 (FIG. 20).

In the step 2215, if the watermark of the selected file matches awatermark in column 2011, indicating that the selected file is anunlawful or pirated video file, then, in step 2216, the user device suchas video player 305 or computer 321 digitally corrupts the pirated videofile. In step 2217, the user advised that the file was unlawfullydistributed, and has been destroyed.

If, in step 2215, the watermark of the selected video file does notmatch any watermark in the list of unlawful or pirated video files,then, in step 2219, the video player 305 commences play of the selectedvideo file.

By the process described above, a video player 2003 must access theinternet on a regular basis, according to a predetermined time frame, inorder to maintain the capacity to present stored video files forplayback on a video player 305. Because the video player 305 is aproprietary device, security measures built into the video player 305can be more easily designed to frustrate would-be hackers. However,applications stored on a personal computer can be safeguarded in avariety of ways. Parity checks, cyclical redundancy checks, selfexecuting modules, limited user access, and other techniques can helpensure that pirated watermarks are not expunged or altered by the user.

In an embodiment that may be used in conjunction with, or in place ofthe process described in FIG. 22, the updated list of pirated videofiles to be downloaded to the portable high-speed memory device 131every time the memory device is inserted in the kiosk. The updateprocess is completed prior to the loading of any new video file onto theportable high-speed memory device, thereby ensuring that the portablehigh-speed memory device cannot be withdrawn from the kiosk afterreceiving a video file but prior to update. The same safeguardsdescribed in conjunction with FIGS. 20 and 22 to be used in conjunctionwith a portable high-speed memory device. The date and time of the lastupdate 2001 the present date and time 2003, the last pirated watermarkreceived 2025, and the last authentication certificate 2005, could beloaded into the portable high-speed memory device. If the portablehigh-speed memory device showed evidence of tampering, the local kioskcould digitally disable the portable high-speed memory device, and togenerate appropriate reports for storage, processing, and action byadministrators of the video network.

It will be recalled that multiple hand-held high-speed memory devicesmay be used in conjunction with a single video player. In embodiments inwhich an updated list of pirated watermarks is downloaded into theportable high-speed memory device, a synchronization process may beconducted between a portable high-speed memory device and a video player305. During synchronization, a determination is made as to whether thevideo player or the portable high-speed memory device has the mostrecently updated with a listing of pirated videos. The device with themost recent information acts as a data source for updating the piratedwatermark list of the other device. The date and authenticationcertificates could also be transferred along with the device ID, therebyidentifying the source of the last watermarked update.

According to a preferred embodiment, the watermark of every filedownloaded by the network is unique, thereby allowing individuallypirated video files to be listed in a central index of piratedwatermarks. At the same time, a subset of the data within everywatermark allows each watermark to be correlated with a particularunique device ID. The advantage of this can be appreciated by thefollowing example. A user has purchased over one thousand encryptedvideo files, such as games, high definition DVDs, etc., representing asignificant investment of money, as well as the labor to establish thecollection. If the unique device ID used in encryption is associatedwith a playback enabling device such as a hand held high speed memorydevice or playback wand, and the device were lost, the entire set ofencrypted files could become inaccessible. Against his contingency, thenetwork may protect the interests of the user the following twoembodiments. In a first embodiment, the user is able to purchase aplayback device with the original device ID, thereby granting the useraccess to the full collection of encrypted files. In a secondembodiment, the user purchases a playback device with a new device ID,and files a report about the lost playback enabling device. The networkgenerates a list of all of the digital files originally encrypted by thelost device, and linking that list of digital files to the new deviceID, such that the user may replace the entire collection for free, or asubstantially reduced cost, being encrypted according to the new deviceID.

If every watermark allows for identification of the device ID used inwatermarking, unlawful file sharing could easily be identified in eitherof the above embodiments. As discussed previously, each time awatermarked video is replayed, time and date of that reply is stored ina local table of the playback device, and the network is regularlyupdated with this information, either through internet connection withthe playback device, or through a hand held high speed memory device. Inthe first embodiment, if two videos and then decrypted and playedsimultaneously at two different locations, the network could determinethat unlawful file sharing or distribution has occurred. In the secondembodiment, if encrypted file according to the first device ID is everagain play back, the “lost” playback enablement device has either beenfound, or was falsely reported as being lost in the first place.Copyright policing is easier in the second embodiment, because nocalculations of travel distance and exact playback times are required topositively identify unlawful usage.

When the determination of unlawful file sharing or unlawful distributionhas been made, the network has the option of them sending a letter tothe user regarding unauthorized file sharing, billing the client forunauthorized use of video files, initiating criminal or civil action forunlawful distribution of copyrighted material, or adding to the CentralIndex of Pirated Watermarks the watermark portion correlating to theplayback enabling device associated with the unlawful file sharing. Asthat watermark portion gradually populates the Local Indexes of PiratedWatermarks, all playback devices will gradually become disabled fromfurther playback of those video files. From this example, a highlyflexible and responsive means of enforcing copyrights and protecting theinterests of copyright holders can be achieved through a watermarkingsystem wherein each watermark is uniquely distinct, but whereinwatermarks associated with a common device ID can be commonly identifiedby a portion of the watermark.

By encrypting movies on a “one to one” basis according to a uniquedevice ID, unlawful file sharing among casual users can be curtailed.Through the use of tamper resistant decryption modules located within avideo display device, sophisticated hackers will be frustrated in theirattempts intercept unencrypted video signals which could be used togenerated unencrypted black market DVDs. Finally, even if a hacker wereable to generate an unencrypted copy of an encrypted movie or videogame, the watermarking techniques described within this disclosure wouldremain embedded within the video file, thereby providing an avenue fortracing pirated movies and professional hackers, policing publicperformances of pirated watermarked movies, and electronically hamperingthe display or use of decrypted watermarked movies.

The Multi-Station Video Kiosk

FIG. 24 illustrates an embodiment of a “multi-station video kiosk” 2400including a first user station 2425, a second user station 2427, aplurality of high-speed ports 113-A through 113-H, and an acousticbarrier 2430. The first user station 2425 includes a directional speaker2403, a display screen 2405 a keyboard input 2413 and a card reader CR1.The second user station 2427 has a directional speaker 2401, a videodisplay screen 2407, a keyboard input 2415 and a card reader CR2. Themulti-station video kiosk includes a request index 2430 within a memoryportion of the multi-station video kiosk, the operation of which isdescribed in conjunction with FIG. 25.

The directional speaker 2403 is configured such that it directs an audiooutput to a user standing at keyboard 109A with minimal distraction to auser standing at keyboard 109B. Similarly, the directional speaker 2401is configured such that it directs an audio output to a user standing ata keyboard 109A with minimal distraction to a user standing at keyboard109B. The directional effects of each of the speakers can be achieved bya variety of methods and apparatuses, including the position of aspeaker, a primary direction in which a speaker is pointed, the volumeat which a speaker operates, the distances separating user stations2425, 2427, the size, shape, and position of the acoustic barrier 2430separating adjacent user stations, the material from which the acousticbarrier is comprised, and noise cancellation features. In an embodiment,noise cancellation is achieved by microphones M1 and M2, and noisecancellation circuits NC1 and NC2. Microphone M1 is positioned to pickup the acoustic output of speaker 2401, and provide this information tonoise cancellation circuitry NC1, which is configured to produce anacoustic output on speaker 2403 that will cancel, at least in part,sound from speaker 2401 bleeding over into user station 2425. Similarly,microphone M2 is positioned to pick up the acoustic output of speaker2403, and to provide this information to noise cancellation circuitryNC2, which is configured to produce an acoustic output on speaker 2401that will cancel, at least in part, sound produced by speaker 2403bleeding over into user station 2427. Other noise cancellation methods,apparatuses, and systems may also be incorporated, and the specificnoise cancellation devices described herein are offered only asexamples.

Multiple high-speed ports 113-A through 113-H allow a plurality of usersto download video files even while other users are occupying one or evenall of the user stations 2425, 2427. A request index 2430 can be used tostore multiple pending requests, and associate them with respectiveportable high-speed memory devices 131 that may be inserted into any oneof the plurality of high-speed ports 113-A through 113-F. FIG. 25illustrates a method by which multiple users may download video filesfrom a multi-port kiosk such as depicted in FIG. 24.

In step 2501, a user selects a video by means of a personal computer viathe Internet.

In step 2503, if a user PIN is designated for more than one portablehigh-speed memory devices, the user specifies an identification of theportable high-speed memory device that will be used for the filedownload.

In step 2505, the user selects a video kiosk, or a kiosk in group(communicating over a LAN) from which to download the requested videofile.

In step 2507, the video network stores the user request in a requestindex within the designated kiosk, or within a request index within thedesignated LAN. An example of a request index 2430 is depicted in FIG.24.

In step 2509, the user inserts a portable high-speed memory device intoa high-speed port of a multi-port kiosk, or a video kiosk within a LAN.

In step 2511, the selected high-speed port within the video kiosk readsthe unique device idea of the portable high-speed memory device.

In step 2513, the video kiosk searches its request index for a matchingdevice ID to that of a portable high-speed memory device list of 2509.That video kiosk is part of a LAN, to kiosk searches the request indexof the LAN for a matching device ID.

In step 2515, the video kiosk determines whether or not a matchingdevice ID is stored within its request index, or within the requestindex of an associated LAN.

If, in step 2515, a matching device ID is found, then, in step 2517, thevideo kiosk identifies the video file requested in association with thedevice ID.

In step 2519, the video file is downloaded to the portable high-speedmemory device.

By the above-described process of FIG. 25, it will be appreciated thatthe user does not need to access the keyboard of a video kiosk in orderto receive a video file download. By ordering a video file over theInternet, the request can be stored within the request index 2430 of thevideo kiosk or a local area network. Video download can be achievedthrough simple insertion of a portable high-speed memory device into ahigh-speed port of the kiosk or LAN. To eliminate the need forindividual monitors 107-A, 107-B for each high-speed port, embodimentsare envisioned wherein status indicators, such as LEDs, can indicate thestatus of a video download. Examples of download statuses can include,but are not limited to, retrieving user request data, download inprocess, download completed, requested video not yet available,requested video is at another kiosk, and user request not found. Arequested video may be in a different video kiosk because of user error,or because of limited storage space at the video kiosk originallydesignated in the user request. Because of the inconvenience andpotential annoyance which might be associated with arriving at a kiosk,and learning that a requested video has been delivered to a differentkiosk, embodiments are envisioned wherein such alternate kiosk downloadis accompanied by a text message, automated voice message, pager, orother user notification means. The user notification means willpreferably be selected by the user, and stored within the video networksystem.

The Portable High-Speed Memory Device

In an embodiment, the functionality of the portable high-speed memorydevice may be incorporated into a common physical structure with acellular telephone, a PDA (Pocket Digital Assistant), portable computingdevice, portable music players such as the iPod, portable cameras, orcombinations thereof. By this “combined functionality” embodiment, theusefulness of the video network described herein is greatly enhanced.For example, it is unlikely that most users would carry a “singlefunction” portable high-speed memory device on their person the majorityof the time. As a consequence, if a user ordered a video file such as afeature-length movie from their office computer, the user could nottypically download the video on the way home from work. Rather, the userwould have to go home, pick up his or her portable high-speed memorydevice, and then walk or drive to a video kiosk. Most individuals,however own a portable computing device such as a cell phone or musicplayer which they carry them most of the time. Through a multifunctionalembodiment, however, a user in possession of an integrated device (suchas a portable high-speed memory device integrated with a cell phone),would typically be able to stop at a video kiosk on the way home fromwork and download a movie. No additional trip home would be required inorder to pick up a memory device, and no special planning would berequired to bring the memory device to work that day.

According to an embodiment, a memory element within the portablehigh-speed memory device 131 is removable, thereby facilitating upgradesto higher density memories. In a similar manner, embodiments of thehigh-speed memory device 131 are envisioned having auxiliary memoryports for receiving additional memory modules, thereby allowing a userto flexibly upgrade the available memory within a portable high-speedmemory device. The memory modules, and the auxiliary memory ports willpreferably include high-speed electrical connectors as described orreferenced herein.

High Speed Download Technology

Although microprocessor speeds have continued to increase, theadvantages of these increased speeds have not always been realized.Microprocessors are often coupled with adjacent elements which transmitssignals originating from the microprocessor. The physical coupling ofdistinct electrical complements cannot normally be accomplished to theexacting size and scale found within a microprocessor. These “macroconnections” and a signal paths extending outward from a microprocessoroften degrade signal quality by a variety of problems includingparasitic capacitance, signal reflections and a signal skew.

Signal reflections or “signal bounce” are often induced at the junctureof signal trace lines and conductive vias. FIGS. 33A through 33C depicta printed circuit board including multiple laminate layers 3305, and acopper signal trace 3303 coupled between conductive via 3309 andconductive via 3301, thereby establishing a signal path between thesetwo conductive vias. Due to limitations in current manufacturingtechniques, the point at which a signal trace 3303 coupled with aconductive via 3301 often results in a conductive stub 3307 extendedbeyond the signal path. In signal transmission, an open circuit willresult in signal reflection or signal bounce. Although the conductivevia 3301 affords a path for signal conductivity, stub 3307 neverthelessacts as a separate signal Path terminating in an open circuit, therebyinducing signal reflection. At lower frequencies, of up to 100megahertz, the signal degradation induced by these reflections isusually modest. However, as transmission frequencies increase, signaldegradation and interference becomes progressively greater as a resultof these the reflections. For a high-speed video download of afeature-length, and particularly a high-definition feature-length filmto gain wide consumer acceptance, however, download speeds willpreferably be in excess of 3 gigabits per second, more preferably inexcess of 5 gigabits per second, even more preferably in excess of 8gigabits per second, and even more preferably in excess of gigabits persecond. In an embodiment, download speeds in excess of 15 gigabits persecond and particularly in excess of 20 gigabytes per second will beutilized to significantly reduce the amount of time the consumer mustwait at a video kiosk to receive a video download. However, if the videodownloads were attempted at these speeds in conjunction with the priorart technology as illustrated in FIG. 33, signal reflections emanatingfrom stub D would render the entire download process unworkable.

A second and related problem inherent in prior art technology is that ofsignal skew. When signals generated simultaneously within amicroprocessor are transmitted down separate signal traces of a printedcircuit board, signal traces having different lengths will result in atime differential in the time the respective signals reach theirdestination points. As the clock speeds of microprocessors increase,however, the time between successive signals decreases, and the physicaldistance between successive signals on a single path also decreases.Slight differences of, perhaps, a millimeter, have little impact atslower clock speeds. However, as clock speeds increase, signal skew aspotential of resulting in simultaneous reception along separate signalpaths of digital signals originating during different clock cycles.Digital signaling becomes fundamentally unworkable at this point.

To keep pace with the demand for ever faster signaling rates, integratedcircuit (IC) packaging has evolved from relatively band-limitedtechnologies such as wire-bonded packages to the prior-art flip-chippackage 3400 illustrated in FIG. 34. The flip-chip package 3400 includesan integrated circuit die 3403 mounted pad-side down on a multi-layersubstrate 3405 and enclosed within a non-conductive housing 3401. Signalrouting structures 3410 are disposed within the multi-layer substrate3405 to redistribute signals from the relatively dense arrangement ofdie pads 3407 to a more dispersed ball grid array (BGA) 3409 on theunderside of the package. The individual contact balls of the BGA 3409may then be soldered to counterpart landings on a printed circuit board.

While generally providing better performance than wire-bonded packages,the flip-chip package 3400 presents a number challenges to systemdesigners as signaling rates progress deeper into the gigahertz range.For example, the number of layers needed in substrate 3405 for signalredistribution has steadily increased in response to increased numbersof die pads 3407, making the flip-chip package 3400 more complex andcostly. Also, through-hole vias 3410 (i.e., vias that extend all the waythrough the multi-layer substrate) are often used to route signalsthrough the substrate. Unfortunately, unused portions of the vias (e.g.,region 3412) constitute stubs that add parasitic capacitance and producesignal reflections, both of which degrade signal quality, as illustratedin conjunction with FIGS. 33A through 33C. Although back-drilling andother techniques may be used to reduce the stub portions of the vias,such efforts further increase manufacturing costs and may not besuitable or possible for some package substrate constructions.

Another challenge presented by signal redistribution within themulti-layer substrate 3405 is that differences in routing distances tendto introduce timing skew between simultaneously transmitted signals.That is, signals output simultaneously from the die 3403 arrive at theBGA contacts 3409 at different times, reducing the collective data-validinterval of the signals. In many systems, a single control signal, suchas a clock or strobe, is used within a signal receiving device totrigger sampling of multiple simultaneously transmitted signals.Consequently, compression of the collective data-valid interval due tosignal skew ultimately limits the maximum signaling rate that can beachieved in such systems without violating receiver setup or hold-timeconstraints. To avoid such skew-related problems, intricate routingschemes are often employed within the multi-layer substrate 3405 toequalize the die-to-contact path lengths, further increasing thecomplexity and cost of the integrated circuit package 3400.

FIG. 35 illustrates a prior art signaling system 3520 that includes twoflip-chip packages 3500A and 3500B coupled to one another via signalrouting structures disposed within a multi-layer printed circuit board(PCB) 3521. From a high-speed signaling perspective, many of theproblems resulting from signal redistribution in the integrated circuitpackages 3400 also result from the multi-layer signal routing within thePCB 3521. For example, through-hole vias 3523 are often used to conductsignals between PCB layers, presenting stub capacitance and signalreflection problems. Also, the lengths of the signal paths routedbetween the integrated circuit packages 3300A and 3500B tend to bedifferent due to different PCB ingress and egress points and differentPCB submergence depths of the various traces 3526, thereby introducingtiming skew. As with the integrated circuit packages 3400 themselves, anumber of techniques may be used to reduce via stubs, and routingstrategies may be used to equalize path lengths, but these solutionstend to increase system complexity and cost. These, and other limitingfactors inherent in present technological applications are addressed bythe United States Patents and Patent Applications incorporated herein byreference at the beginning of this application. These high speedtechnologies may be used to form high speed connections and high speedsignaling paths for use in conjunction with the portable high-speedmemory device 131 of FIGS. 1 and 3, the high speed port 113 of FIGS. 1and 24, and the high speed port 313 of FIG. 3. The stair step technologypresented in conjunction with FIGS. 39A-42 and discussed earlier alsoeliminates connection stubs, and is useful in reducing or eliminatingsignal skew, signal bounce, or introducing unwanted impedance into asignal path.

Multiple Video Parameter Download

As discussed above, video files can be stored with selectableparameters, allowing a user to delete, “bleep out,” or censor variousscenes or dialogue, examples of which include nudity, sexual situations,profanity, explicit sexual dialogue, and violence. In an embodiment,selectable parameters are flexibly defined, rather than limited to afixed set of definitions. For example, a documentary on the Holocaustmay include scenes which, though not technically “violent,” may beprofoundly troubling or disturbing. Such scenes could be time stamped bya content provider according to the same standards that othercontrollable parameters would be time stamped. However, intuitive termscould be assigned by the content provider to such scenes, e.g., “GraphicHolocaust Scenes.” By including fixed terms, such as “nudity” or“profanity,” as well as allowing for flexible terminology by contentproviders, greater system utility can be achieved for both contentproviders and system users. Controllable parameters will be divided intoat least two general categories, categories using audio timestamps, andcategories using video timestamps. Circumstances are envisioned whereinalternative parameter designations may be desirable. For example,parents may desire to view in an un-edited version of the movie, whilecensoring certain portions for their children's viewing. In anembodiment, alternative parameters can be selected for download inconjunction with a video file, with user selection of the alternativeparameters required prior to viewing.

Within FIG. 26, the movie title “Drug Deal Gone Bad” has been selectedby the user, and is displayed on the video screen 107 of a video kiosk105. A first set of selectable parameters 2607 listed includesprofanity, violence, nudity, sexual situations, and “other.” Asdiscussed above, specific name for the selectable parameter designatedas “other” may be chosen by a content provider, and need not be limitedto the generic term “other.” A row of boxes 2603 designated as “editedversion” maybe check marked by a “mouse-click” or some other action viauser interface. A row of boxes 2605 designated “an edited version” mayalso be check marked by a mouse-click or equivalent action. A user mayselect both edited and unedited versions at the time of download from avideo kiosk, thereby allowing the user to play either version asdesired. If edited and unedited versions are both selected, a fillabletext box 2609, the user may enter the password necessary to view theunedited version. When a user attempts to view this video any subsequenttime, the video player 305 or related software would request a passwordfor viewing the unedited version. The viewer would have the option ofentering the password in a text box, or selecting the option “Viewedited version,” and continue with the viewing of the video file. Bythis or equivalent embodiments, parents can enjoy the unedited versionsof movies, while ensuring that their children would not have access toobjectionable material.

The embodiments are also envisioned wherein multiple user PINs (personalidentification numbers) and/or passwords are stored in a single portablehigh-speed memory device 131. A parent can assign a password to each ofthe children, thereby allowing them to download video files to theportable high-speed memory device. The portable memory device 131 couldthen be programmed in a manner similar to be embodiment of FIG. 26,designating which user passwords may download unedited video files, andwhich user passwords may download only edited video files.

In the example of FIG. 26, notation appears indicating that an editedversion censoring “violence” is not available, and a large defaultcheckmark appears in the box for the unedited version, alerting theviewer to the fact that the movie will contain graphic violence. Thelack of an unedited version regarding violence may be due to a varietyof reasons. For example, the content provider may have believed that thecosts involved in producing a version edited for violence in compliancewith the digital standards set forth for the system would not beretrieved through increased rentals or sales. Alternatively, the contentprovider may have regarded the violent scenes as essential to the movie,and therefore, not available in an edited format.

Still referring to FIG. 26, five different languages are available forthe audio portion of the movie, but no subtitles available in anylanguage. Parameter selection and need not be exclusive. As noted,parents may choose to view an unedited version of a movie, whileallowing their children to watch an edited version. Timestamps, controlcommands, and other appropriate digital markers may be downloaded duringthe video selection and download process according to any categoriesselected by the user. According to an embodiment, a higher fee may beassessed for downloading multiple languages. Another controllableparameter illustrated in FIG. 26 is the option to store the video fileon the hard drive. A notice is posted directly below this a selectableparameter, notifying a user that an additional $1.75 will be charged fordownloading a version that may be stored on a permanent storage membersuch as memory device 335 within the video player 305. Embodiments areenvisioned for permanent storage locations may include a hard drive of auser's computer, or other user storage devices unrelated to the videoplayer 305.

FIG. 27 illustrates an example of a download history stored within theportable high-speed memory device 131. The history shows that Dad hasdownloaded a sequence of video files, from “Dirty Harry” on Jul. 1, 2008to “The Guns of Navarone” on Apr. 15, 2010. The letter designation (M)indicates a feature-length movie. The download history shows that momhas downloaded a sequence of video files from “Terms of Endearment” onJul. 5, 2008 to “Steel Magnolias” on Apr. 17, 2010. Emily has downloadeda sequence of movies from “Legally Blonde” at Sep. 9, 2008 to “LegallyBlonde 2” on Dec. 10, 2010. The download history shows that Jeffdownloaded the movie “Dogs of War” on Aug. 22, 2008, the video game“Space Invaders 2” on Jan. 31, 2009, and the video game “Dungeons andDragons” on Mar. 4, 2010. On Apr. 17, 2010, Jeff downloaded a “Triple X”movie. Because the download history is recorded within the portablehigh-speed memory device 131, Jeff's parents are able to discover hisviewing of inappropriate movies, and take appropriate action. Thedownload history of FIG. 27 includes only the ID of the party performinga download, the nature of the video file (i.e., movie, game, etc.) thetitle or name of the game or movie, and the date of the download. Thesecategories are offered as examples, and are not intended to limit adownload history. Other categories could be included in downloadhistory, including by way of example, but not limited to the cost ofeach download, the credit card on which each charge was applied, whethera video file was downloaded for permanent storage or one-time viewing,the time required for the video download to complete, the user IDs ofanyone who viewed the video file by direct play from the digital filewithin the portable high-speed memory device 131, etc.

Gaming

The portable high-speed memory device 131, and video player 305, maystore and/or play video files such as feature-length films in standardand high-definition, television shows or TV commercials, as well asvideo games. Selectable parameters such as those exhibited in FIG. 26may be adapted to video games. As noted in FIG. 26, the category “other”could be filled by any term a content provider thought was appropriatefor a controllable parameter. In a similar manner, controllableparameters many tailored for individual video games. Because theexecutable options associated with the video game are more complex thansimply skipping over a nude scene in a movie, standards may have to beoccasionally upgraded to accommodate the options and parameters of thevideo games. For example, games may be configured to operate at acertain speed, accommodate single or multiple players, allow for membersto be on opposing teams, or confront the player with various challengesor “levels of play.” In an embodiment, a parameter selection module isstored within the firmware of the portable high-speed video device 131,thereby facilitating device upgrades through firmware updates. Upgradesmay also be done at the application level, or hardware level. Consideredas an example, a video game comprising the parameters described above.In addition to these parameters, however, a video game developer hasdeveloped a game which allows three or more teams competesimultaneously. If this possibility had not been envisioned, orfacilitated by the existing parameter selection module, a revisedparameter section module would have to be developed and downloaded intothe portable high-speed memory device 131. These upgrades will be ableto address industry advances within cinema, computer gaming, and othervideo industries. Embodiments are also envisioned, where a parameterselection module is embedded in a video player 305, and/or downloaded toa personal computer 321. Parameter control modules can variously besoftware applications, firmware, or even hardware and fixed circuitrymembers.

Interconnected Blogosphere

FIGS. 28-30 illustrate an embodiment of a “blogosphere” that can beincorporated within the video network 101 described herein. FIG. 28illustrates the contents of a video screen 107 immediately after a userhas logged in. The contents of the screen are offered only as anillustration of a URL site after login. The URL site depicted in FIG. 28includes search fields for searching for video files. Fillable text box2801 allows a user to keystroke the title of a feature-length movie, andthe approximate titles of sporting events, political speeches, etc.Fillable text box 2003 as a pull-down tab 2803 that allows a user tosearch for a feature-length film, athletic event, political speech, TVserial, TV commercial etc. by genre. Fillable text box 2805 includes apull-down tab which allows a user to search for a performer such as anactor, actress, athlete, film director, coach or political figurefeatured in the requested video file. Embodiments of elements 2001,2003, and 2005 were also described in conjunction with FIG. 7.

The video screen 107 of FIG. 28 also includes links, or other Internetdevices by which a user can search for “blogs” on the video network.Element 2807 depicts a pull-down menu 2807 including links to thefavorite blog sites of the user. The pulldown list 2807 of FIG. 28 maybe limited to a predetermined number of favorite blog links, or maybeopen-ended in the number of links in may contain. The user may navigate,via Internet connection, to a selected blog by “clicking” on one of thelinks in the pulldown list.

The search field 2809 depicts an alternative means by which a user cansearch for other user blogs on the video network entering the “networkname” or “blogger ID” of a blog link the user desires to visit. In anembodiment, only intra-network blogs may be searched by Internet searchelements 2807 and 2809, thereby allowing the video network to exercise ameasure of control over the blogs which are easily accessible to thevideo network. Because it is understood that sophisticated computerusers will almost always find a way of circumventing network controls,and posting pornographic or otherwise objectionable material onintra-network blogs, according to an embodiment, blog searches may onlybe conducted via personal computer, and not at video kiosks. By thislimitation, the video network can further control the content of networkvideo screens publicly displayed at video kiosks 105.

FIG. 29 depicts an example of video screen 107 that includes pull-downmenu 2905 for displaying the most frequently visited blog sites on thevideo network, pull-down menu 2907 for displaying the blogger IDs ofnetwork members who have visited the user's blog, and a date field 2909which allows the user to narrow the members listed in field 2907 to aparticular month. (A blogger is a member of the video network who hasprepared a portal, such as an HTML page, that is accessible to othermembers of the video network 101.) In addition to narrowing searches bytimeframe, as is specifically illustrated in FIG. 29, embodiments areenvisioned for narrowing searches by other categories, such as filmgenre (science fiction, “Western”, etc.) film director “Stanley Kubrick,Woody Allen, etc.), blogger personality (analytical, sarcastic, funny,politically incorrect, etc.) A user may define themselves according tothese various categories by a biographical sketch that is filled out andsubmitted in conjunction with the user's blog. Blogs may be integratedwith e-mail, text messaging, or other communication means, includingintra-network communication means by which individuals having similarinterests may meet. For example, a user could effectively ask “who hasvisited my own blog within the last month” and receive an answer to thatquestion by accessing pull-down tabs 2907 and 2909.

Text box 2913 allows a user to enter the name of a video file such as afeature-length movie or sporting event, from which the user would liketo “rip” a scene, or portions of multiple scenes, for display on theuser's blog. “Ripping” is a term commonly associated with copying videoor audio files, typically in a compressed form. Network limitations (aswell as limitations by specific content providers) could determine themaximum number of seconds a feature-length film, sporting event, orother video file that may be “ripped” for display on a user's blog.

FIG. 30 depicts an example of a blog posted on the video network. Thebanner 3001 identifies it as the blog of a network member going by thename of “The Raven”. The extent to which an individual member maypersonally post, or privately disclose his actual name, or otherpersonal information is determined by network policy. Policies may rangefrom the very liberal, wherein the user is allowed to post his full nameand contact information on the “homepage” 3000 of his cinema blog, thevery strict, wherein the exchange of personal information is strictlyprohibited, and blog postings are screened to enforce this policy. Theupper right-hand portion 3005 of The Raven's homepage 3000 is a “link”activating an MP3 video ripped from various movies, sporting events,political speeches, and other video files on the video network. Theupper left-hand portion 3003 of FIG. 30 includes a text commentary byThe Raven, discussing the feature-length movie “Soldier of Fortune,” orcomments on multiple movies or subjects. The lower left-hand section3007 of FIG. 30 includes a JPEG photograph of The Raven. The JPEGphotograph may also act as a link, which, when clicked-on by a mouse,stylus, or other user interface device, may access other postings by TheRaven such as a photo gallery or personal contact information, or mayform a navigational link to another URL site. Fields, 3003, 3005, and3007, are “read only”. That is to say, a network member viewing TheRaven's blog may view the text commentary 3003, photograph 3007, orvideo “trailer” produced by The Raven. A visitor however, may not alterthe contents of these three fields. In contrast, field 3009 is a“read/write” field, wherein network members 103 may post comments and/orpictures or videos, thereby interacting with The Raven's presentationand commentary.

The links, displays, executable programs, and other entities displayedor described in conjunction with FIG. 30 are offered only as an exampleof some of the web-based concepts that may be incorporated into a user'sblog. These examples are not intended to limit the scope of theintra-network blogosphere described herein, and in the appended claims,which comprehend the full scope of web-based processes, programs,activities, and so forth. Embodiments of the blogosphere describedherein, include “closed,” “open,” and “semi-open,” architectures. Aclose architecture would prohibit users from posting links to URLaddresses outside of the video network 101. A semi-open architecturewould allow user's blogs to include links to URL addresses outside ofthe video network, but would not allow non-members (including memberswho have not signed in) to access the intra-network blogosphere. An openarchitecture would allow users to post blogs which include links to URLsites outside of the video network 101, and also allow nonmembers(including members who are not signed in) to access the video network,and/or the intra-network blogosphere. Nuances of these variousarchitectures are also envisioned to ensure that the video network 101and the intra-network blogosphere remain wholesome and fit for use bythe general public, including minors. Various filters and screeningdevices could be incorporated to this end.

FIG. 31 illustrates an embodiment of a user interface screen 3100allowing a user to access and operate a “ripper module” that may beutilized in conjunction with the video network 101 described herein. Theuser interface screen 3100 includes a “picture within a picture” 3101 onwhich the movie “Soldier of Fortune” is displayed in MPEG-1, MPEG-2,MPEG-4, or some other digitized format. Throughout this disclosure,references to MPEG (“Motion Picture Experts Group) or MP3” (the audiolayer of MPEG-1, layer III) technologies are offered solely for example,and are not intended to limit embodiments of compressed or uncompressedvideo and audio file and display formats that may be used in conjunctionwith the embodiments described herein. The various user interfaceelements 3103, 3105, 3107, 3109, 3111 and 3019, described in greaterdetail below, may be activated by any known means, includingcursor-and-mouse, or touch screen.

In an embodiment, DVD or high-definition files on feature-length moviesstored on the video network are processed at the time they are added tothe network, thereby forming a compressed version of the same videofile. When a user prepares a “movie trailer” for display on a networkblog, “rips” are taken from the compressed video format, therebyproviding faster Internet access, file searching, and file transfers.Uncompressed video files, however, and even high definition video filesmay be displayed within field 3101.

A slide bar 3103 beneath field 3101 allows a user to fast-forward orfast reverse the video file to a particular section. Time-stamps withinthe video file are used to generate a time display 3105, correspondingto a particular scene of the video file visible within field 3101. Othervirtual controls 3107, such as reverse, fast reverse, forward,fast-forward, stop, and pause, may also be included for controlling thevideo display within 3101. When a user “ripping” a video file hasarrived at a particular scene he desires to rip, selectable interfacebutton 3109 is engaged, thereby indicating the beginning point of a rip.The user may advance the video to an ending point of the rip by means ofa slide bar 3103 or control buttons 3107. By activating “button” 3111“select as ending point for rip,” the user completes a rip which isadded to listing 3113.

Elements 3113 of FIG. 31 depict the number of sections which the userhas “ripped” from the selected movie. The duration of each section isalso listed. Element 3117 displays the total time used by the combinedripped sections 3113. Element 3117 displays the total time remaining,according to network restrictions of how much time a user may “rip” froma video file for display on the user's intra-network blog. According tothe example of FIG. 31, the user has been limited to a 15 second ripfrom the movie “Soldier of Fortune.” Time limitations may be imposed bythe network, by the content providers, or cooperatively by both. After auser has completed the construction of a “custom-trailer” (thevideo-short composed by the network member, as described by the table3113), the user may engage button 3119, thereby posting the“custom-trailer” on his or her blog.

Content Providers may digitally identify “no copy zones” which areexempted from ripping through the video network and applications runningthereon. For example, the NFL may determine that the touchdown pass fromJoe Montana to Dwight Clark against the Dallas Cowboys in Jan. 10, 1982is of historic significance and worthy of digital protection. As aconsequence, the video file of that January 10^(th) game stored on thevideo network will include a no copy zone digitally bracketing the JoeMontana throw and Dwight Clark catch, thereby preserving themarketability of this video portion for the NFL.

Under Title 17 of the United States Code §103, “derivative works” whichare lawfully produced are copyrighted when “fixed in any tangible mediumof expression, now known or later developed, from which they can beperceived, reproduced, or otherwise communicated . . . ” under the termsof Title 17 of the United States Code §102. The video network asdescribed herein therefore provides gifted individuals a forum toshowcase their talents to various content providers such as the NFL orHollywood. By including a “favorites” list, or multiple “favorites”lists according to the athletic event or film genre, video network 101described herein provides a showcase of talent to content producersseeking individuals gifted in film editing.

The elements described in FIGS. 28-31 are offered only by way ofexample. Other features which may be incorporated into the blogosphereof the video network 101 described herein may include, but are notlimited to, intra-network e-mail between video members, a means forattaching data files to intra-network e-mailings, such as data filescontaining the custom trailers described in conjunction with FIG. 31,means for forwarding intra-network e-mailings to other network members,means for blocking intra-network e-mail from identified network members,means by which a first network member may block a second network memberfrom writing on a read/write portion of the first network member's blog,means for a network member to create and post a blog on the network, anda means for attaching hyperlinks to specific text portions or datafiles, such as a list of hyperlinks to a user's 103 “favorite blogs” onthe network 101.

Configurable Screens

FIG. 32 depicts an application by which a user (a network member) canconstruct a “homepage” (or “interior” pages) according to his or her ownpreferences. The outer border of FIG. 32 represents the border of avideo screen such as screens 107 and 323 of FIGS. 1 and 3. The “screenswithin a screen” 3201, 3203 are displayed in vertical orientation toeach other. The orientation depicted in FIG. 32 is offered by way ofexample. Alternative embodiments include, but are not limited to, ahorizontal orientation, and a “tiled” or overlapping orientation.

The upper “screen within a screen” 3201 at the top of FIG. 32 depictsthe “source screen” from which various images and links may be drawn inthe construction of the custom homepage 3203 depicted as the bottom“screen within a screen.” According to the example in FIG. 32, userMarty Feldstein is currently using The Raven's homepage 3201 as thecurrent source page.

The dark arrow 3211 near the center of the upper screen within a screen3001 represents a mouse operated “click-and-drag” tool for selecting aportion of the display within the upper screen 3201, and for draggingthat selected portion to the lower pages section 3203 underconstruction. The field bordered by dotted line 3233 represents thetarget area into which field 3005 (the ripped MP3 link of “Soldiers ofFortune”) will be deposited. The banner “Homepage, Marty Feldstein” 3231has already been placed on the lower page under construction 3203. Toolpalette 3221 includes a variety of tools offered as examples ofconstruction tools that might be used in constructing a user homepage.The tool palette includes, by way of example, a drag text-frame tool3223 including a bold arrow-icon, a text cut tool 3224, and paste tool3225, a “size” tool 3227, etc.

Beneath the source screen 3201 is URL address field 3219 with activationbutton. The user is able to navigate to different URL addresses for useas the “source” page 3201 by entering a URL address within this field3217, and clicking on okay 3219 or hitting the “enter” key of a computerkeyboard.

Safeguards are envisioned, whereby a user is prohibited from placing anyvideo or audio file on a custom homepage or blog, if the video or audiofile has not been ripped from within the video network. By thissafeguard, the video network could prevent a user from posting racist,pornographic or otherwise offensive video and audio files.

In addition to, or in place of the homepage construction tools depictedin FIG. 32, embodiments are envisioned whereby a user could utilizeexisting website construction software within the context of the videonetwork while remaining subject to the safeguards described above. Thisincludes embedded modules of existing webpage construction applications.A user-fee could be charged for use of such an application in theconstruction of a user's webpage or blog win in the video network. Thisuser-fee could be a flat fee, such as a specific cost for each pagegenerated, or cost charged against the total number of minutes used inwebpage construction. Alternatively, software producers seeking to gainmarket exposure could provide embedded webpage construction modules tothe video network 101 for free, or even pay a fee to the video networkin exchange for the right to embed such a Web construction module. Byembedding a limited use module of a commercial webpage applicationwithin video network 101, a software producer could gain marketrecognition, and establish a user familiarity with of their product. Theadvertising value and market presence represented by this embodimentcould be of great value to a software company. Safeguards could beprogrammed into the commercial webpage development application module toensure that it could not be used outside of the environment of the videonetwork 101, thereby preventing unauthorized use of a commercial webdevelopment application, and preserving the potential consumer base forsales of such an application.

FIG. 38 depicts an embodiment of a portable memory device 131 as shownin FIGS. 1 and 3. The portable memory device includes high-speedconnectors 307 for interfacing with complimentary high-speed connectors308 on a video player 305 or video display device 323 of a user, or ahigh speed download port of a video kiosk 105. The portable memorydevice of FIG. 38 also includes a low-speed port 3819. It will beappreciated that, in commercial applications, a high speed connectionsuch as facilitated by high-speed connectors 307 will be necessary toallow consumers to download a video file in a public kiosk in a veryshort period. However, in viewing the video file, the necessary downloadrate from the hand-held high-speed memory device 131 to a video player305 or a personal computer 321 may not be as critical as download speedsin a public kiosk. As long as a download speed exceeded the naturalplaying speed of a video file, a consumer could view a video filethrough a connection to low-speed port 3819. An embodiment of the highspeed electrical contacts 3821 visible on the high-speed connector strip307 are discussed in the patents and patent applications which areincorporated herein by reference. However, the high-speed connector isnot limited to electrical connection. Other high-speed conductiveinterface is are envisioned, including, but not limited to, optical,infrared, and RF. Similarly, the low-speed connection port 3819 may beelectrical, optical, infrared, RF, or any other known means of signalpropagation.

An important consumer advantage inures from manufacturing video displaydevices which include a download port of high speed connectors 308configured to couple with a hand held proprietary high speed memorydevice 131. As electronic devices multiply, an ever increasing number of“boxes” as stacked above, beneath, behind, or next to many TVs. Theseboxes include cable TV devices, digital memory and playback devices, DVDplayers, CD players, VHS and Betamax tape players, game boxes, AM/FMtuners and amplifiers, and even an occasional turntable for purists whoprefer to listen to vinyl LP recordings. Many consumers cringe at theprospect of adding yet another “box” to the tangled web of electronicsthat sits atop their TV. In embodiments wherein a video display screenis equipped with a high speed port for receiving a high speed hand heldmemory device, a consumer may store encrypted video recordings on acomputer or external “drive,” and load a single digital video file(including related ancillary files, as would correspond to a featurelength movie) onto the hand held proprietary high speed memory device.In this way, a consumer would have the option of viewing a cinematicmovie distributed through methods or apparatuses described hereinwithout adding yet another “box” astride their TV set.

A microprocessor 3817 processes data stored within the hand-heldhigh-speed memory device 131. As discussed below, the various datastorage areas include the necessary hardware, bus access, firmware, andapplication data necessary to utilize the data stored therein. Firmwareand application data may be updatable as standards are upgraded, therebyupgrading the hand-held high-speed memory device 131. In an embodiment,firmware and application upgrades are automatically made when a userinserts their hand-held high-speed memory device into a video kiosk 105.In an alternative embodiment, if firmware and application upgrades areavailable, during kiosk insertion, the user is prompted by video oraudio output in a kiosk, and asked if the user would like to upgradespecific firmware or application data at that time. In conjunction withthe notice, the user is provided an estimated download time or costs forthe upgrade. The user then has an option to select which upgrades theydesire, to postpone, or to reject application and firmware upgrade.

Data storage area 3823 is configured to store firmware and/orapplication data for upgrading firmware and applications within a videoplayer 305 or computer 321 of the user. A video or audio prompt from akiosk may describe the nature of the available upgrades, and give a useran option of downloading or rejecting the upgrades. It will beappreciated that, if the user accepts application or firmware upgradesfor a video player 305 computer 321 be stored in the hand-heldhigh-speed memory device, when the hand-held high-speed memory device iscoupled to the video player and/or the computer 321 of the user, suchapplication and firmware upgrades may be automatically downloaded, orcontrolled by the user according to a prompt reminding the user of theupgrades available on the hand-held high-speed memory device.

Data storage area 3801 is designated for storing a video file in variousformats, including DVD and high-definition, synchronizing codes,embedded watermarks, and encryption algorithms and data. Data storagearea 3803 is configured to store audio files (including multiplelanguages linked to a single video file), various timestamps andsynchronizing codes to synchronize audio data and video data stored indata storage area 3801. Data storage area 3805 is configured to storetext captions linked to various video files, including text captions inmultiple languages linked to the same video file. Data storage area 3807provides storage area for user download and transaction history. Datastorage area 3809 provide storage area for historical network data suchas a general listing of pirated watermarks. Data storage area 3811provide storage for access controls, including primary and secondaryuser IDs, wherein a primary user may designate access limits forsecondary users.

Data storage area 3813 provides storage for program headers. Datastorage area 3815 stores the unique device ID of the proprietary highspeed memory device, thereby distinguishing and identifying eachproprietary high speed memory device sold. The unique device ID may beembedded at the chip-level during fabrication, or programmed into anon-erasable digital medium. A device ID may include, but is not limitedto revision data, assembly location, batch number, date of manufacture,and the retail “brand” identifying a name of a company marketing theproprietary high speed memory device.

The foregoing description has offered many specific details for thepurpose of enabling one skilled in the art to make and use theinvention. For example, is used throughout disclosure, the term“Internet” is not intended to limit applications to any known specificInternet protocol. Additionally, the term “Internet” is not intended tobe limited to any specific transmission channel. Embodiments areenvisioned where in greater or lesser portions of the operationsdescribed herein is performed via the Internet, are conducted on anintranet, local area network (LAN) wide area network (WAN), limitedaccess communication paths such as a privately owed fiber-optic network,and combinations of these network types. Moreover, the term “Internet”includes, but does not limit the embodiments described herein tocurrently known transmission techniques such as electrically conductivepaths, fiber optic channels, and wireless signal routing including butnot limited to radio, microwave, line of sight laser transmissions.Rather, transmission formats which are currently undiscovered, or notcurrently used in Internet communications, are fully comprehended withinthe scope of the term “Internet.” Similarly, the term “kiosk” is notlimited to an island-type structure. Embodiments are envisioned whereinkiosks for distributing video files are constructed in a manner similarto an automatic teller machine (ATM) mounted within the wall of afinancial institution. Accordingly, these and other specific details areintended to be enabling and descriptive, and are not intended to limitthe scope of the appended claims.

1. An automated inventory management system for managing an inventory ofdigital multimedia files, the system comprising: a network with aplurality of digital storage units for storing digital multimedia files,including first and second digital storage units; a first plurality ofdigital multimedia files distributed among the plurality of digitalstorage units, including a first digital multimedia file stored in bothfirst and second digital storage units; a first cache management indexcomprising i) a list of identifiers corresponding to a plurality ofmultimedia files stored within the first digital storage unit, ii) aplurality of status designators, each status designator designating astatus of a corresponding digital multimedia file within the firstdigital storage unit, including a first and second unprotected statusdesignator designating the status of corresponding first and seconddigital multimedia files, and a first time-sensitive protected statusdesignator designating the status of a third digital multimedia file,iii) a first time stamp associated with the first time-sensitiveprotected status designator; and, a first cache management algorithmconfigured to a) update the status designator of the third digitalmultimedia file to an unprotected status designator when a clock time isgreater than or equal to the first time stamp; and b) selectively purgeunprotected digital multimedia files from the first digital storageunit.
 2. The automated inventory management system of claim 1, whereinthe first digital storage location is geographically separated from thesecond digital storage location by at least 10 kilometers.
 3. Theautomated inventory management system of claim 1, wherein the first andsecond unprotected status designators comprise distinct first and secondrelative priority values, and wherein the cache management algorithm isconfigured to select for purging from among a plurality of filesidentified by relative priority values, a digital multimedia file havinga lowest relative priority value.
 4. The automated inventory managementsystem of claim 1, the first cache management algorithm furtherconfigured to update the status designator of the third digitalmultimedia file to an unprotected status designator upon a download ofthe third multimedia file from the first digital storage unit to aportable digital memory device.
 5. The automated inventory managementsystem of claim 1, wherein the first cache management algorithm isfurther configured to evaluate an amount of available storage spacewithin said first storage unit prior to a determination to selectivelypurge an unprotected digital multimedia file from the first digitalstorage unit.
 6. The automated inventory management system of claim 1,wherein the first cache management algorithm is further configured toevaluate a volume of data scheduled for upload into the first storageunit prior to a determination to selectively purge unprotected digitalmultimedia files from the first digital storage unit.
 7. The automatedinventory management system of claim 4, wherein the portable digitalmemory device is associated with a predetermined digital ID stored inthe first cache management index and corresponding to the thirdmultimedia file.
 8. The automated inventory management system of claim1, wherein first cache management index is digitally stored within tenmeters of the first storage unit.
 9. The automated inventory managementsystem of claim 1, further comprising a central server in communicationwith the plurality of digital storage units.
 10. The automated inventorymanagement system of claim 9, wherein the first cache managementalgorithm is configured to update a status designator of a multimediafile according to a command received from the central server.
 11. Theautomated inventory management system of claim 9, wherein the firstcache management algorithm is configured to digitally store a multimediafile in the first storage unit in response to a command from the centralserver.
 12. The automated inventory management system of claim 9,wherein the first cache management algorithm is configured to erase amultimedia file from the first storage unit in response to a command acommand from the central server.
 13. The automated inventory managementsystem of claim 9, wherein the central server further comprises acentral cache management index, said central cache management indexincluding a list of identifiers representing respective multimedia filesstored within the network, the central cache management index furthercorrelating each identifier to one or more digital storage units inwhich a corresponding multimedia file is stored.
 14. The automatedinventory management system of claim 13, wherein the central cachemanagement index defines a minimal number of digital storage units inwhich the corresponding multimedia digital file is stored.
 15. Theautomated inventory management system of claim 13, wherein the centralcache management index defines a total number of digital storage unitsin which a copy of a digital file is stored at a particular moment intime.
 16. The automated inventory management system of claim 13, whereinthe central cache management index is further configured to designate atleast one digital storage location in which the third multimedia file isstored with a protected status that is not time sensitive.
 17. Theautomated inventory management system of claim 1, the first digitalstorage unit further including a fourth digital multimedia fileidentified by a fourth digital identifier and having a protected statusthat is not time sensitive.
 18. The automated inventory managementsystem of claim 1, wherein the first cache management index identifiesdigital multimedia files stored within the first digital storage unit,and wherein the second storage unit has a second cache management indexidentifying digital multimedia files stored within the second storageunit.