Electronic system for the protection and control of license transactions associated with the alteration of replicated read only media and its bound licensed content

ABSTRACT

Distribution of content stored on read only media, and a system and method by which a consumer who purchased content stored on read only media implements a process in the field by which they alter the storage media. A system and tools are used by the consumer to identify, authenticate, disable, and confirm alteration in exchange for compensation, the acquisition of new usage rights to content, or the ability to restore access to or copy content to new media. The process may be conducted by the consumer in the field without assistance and or visual inspection, or be partially conducted in conjunction with an authorized intermediary. Furthermore, the process may restore access to content stored on new media without the need to transfer copies of content.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/586,443 filed Aug. 15, 2012; which claims the benefit of U.S.Provisional Application No. 61/523,433 filed Aug. 15, 2011; and is acontinuation-in-part of U.S. patent application Ser. No. 13/316,160filed Dec. 9, 2011; which claims the benefit of priority from U.S.Provisional Application No. 61/421,444 filed Dec. 9, 2010. Each of theseprior applications is incorporated herein by reference.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

None.

FIELD

The technology herein relates to content rights protection and moreparticularly to systems and methods that manage and limit the recordingand assignment of licenses from content stored on replicated, read onlystorage media. Still more particularly, the technology herein pertainsto the process of placing as well as detecting the placement of marks orflags which can be used as part of a content management system.

BACKGROUND AND SUMMARY

While being relatively inexpensive to mass produce, content DVD's,Blu-ray discs, and CD's have limitations that have led to the growth ofelectronic distribution methods for content in the form of streamingmedia, downloads of digital files from a networked host and othertechniques. As more content becomes stored and managed in the “cloud”and distributed as electronic files or streaming media, consumers whoown licenses to content stored on physical media such as DVD's, Blu-ray,discs and CD's, seek the means to establish or record their ownership ofthese licenses and perform transactions that can move their rights touse the content to network-residing content and/or a new storage media;or they may seek the means to easily sell, trade-in, or transfer theirlicense to a third party.

Example non-limiting illustrative technology herein provides a systemand method that facilitates controlled licensing transactions forcontent bound to read only media by eliminating the need to physicallydeliver the content and its read only storage media container to therecipient, content owner, or authorized intermediary. Examplenon-limiting methods use digital equipment, digital networking, softwareand tools to identify, mark, optionally destroy and confirm destruction,create an audit trail, and account for any compensation given inexchange for the transaction. The illustrative process can be consumerimplemented in the field at any location the consumer chooses, usingdigital equipment they operate. The illustrative process can becompleted by the consumer without the need to involve a witness or thirdparty to verify or attest to the transaction. Non-limiting examples ofthis equipment may include a suitably equipped personal computer, webtablet, DVD player, Blu-ray player, a portable media player, a suitablyequipped High Definition television set, a home media server, and settop box, among others.

An example non-limiting system that enables the consumer to obtainvaluable rights or compensation in exchange for implementing a processinvolving licensed content stored on physical media should also preventand discourage fraudulent transactions. Without mechanisms to preventfraud, an unscrupulous consumer could use any one of the several millionDVD's or Blu-ray discs in circulation from rental stores, libraries, orfriends and claim ownership of a license and its privileges. Whilemaintaining the convenience of a location-independent andself-administered process, the illustrative non-limiting technologyherein prevents and discourages fraud through the following mechanisms:

Rent/Borrow-Retire-Return: The fraud use case is described as asituation where the consumer has rented or borrowed a replicated DVD,Blu-ray, or Compact disc (CD) and uses it to claim ownership of alicense, retire the disc in exchange for benefits or compensation, andthen returns the disc to the rental store or source. The illustrativenon-limiting method discourages fraud of this use case by marking themedium with a multi-level flag or other marking mechanism, and ifdesired, rendering the content unusable which would implicate the lastholder of the disc thus making it less likely that the borrower orrenter of the disc would attempt fraud. Furthermore, the alteration ofthe media can be made clearly visible to the naked eye and distinctivein its appearance so as not to not be confused with normal wear andtear. Making the disc conspicuously or recognizably marked and/orunusable through the placement of a distinctive and visible alterationof the media would make performing a Rent/Borrow-Retire-Returntransaction unlikely.

Presenting a Copied Original: This fraud use case results from theconsumer attempting to qualify for a licensing transaction by using aread/write or write once disc that stores a copy or image file of areplicated DVD, Blu-ray, or Compact disc (CD). The illustrative systemprevents this type of fraud through the detection of read/write or writeonce media during the initial scanning and identification process. Anymedia detected as read/write or write once media is rejected anddisqualified by the system and no licensing transaction is performed.

Presenting a Previously Retired Disc: This fraud use case results fromthe consumer attempting to qualify for a licensing transaction by usinga previously retired or altered disc. In this example use case thesystem detects the altered media at the initial scanning andidentification process and the media is rejected and disqualified from alicensing transaction.

Circulation of A Retired Disc: This fraud use case results from aretired and altered disc that is distributed to users who own or gainaccess to an unaltered and usable disc of the same content. The alteredand retired disc is used to trick the system that the marking and, insome embodiments, destruction of the consumer's content, identifiedduring the initial scanning process has been performed when in fact ithas not, and in its place the consumer has substituted the previouslyaltered and retired disc. The illustrative system has the capability tocreate a unique signature of the altered media properties and preserve arecord of this signature in a data base. The method by which the uniquesignature is created can include the location of the marking and/ordestruction of the content on the media, the shape of the alternation ofthe media, and/or information interpreted by the system as uniqueinformation from the inspection of the altered media. Prior to approvinga licensing transaction, the system queries the signature database ofretired discs and disqualifies any disc that has been previouslyrecorded in the database. In addition to the measures used that examineand record marked and/or destroyed signatures prior to accepting thedisc for a licensing transaction, the system may query a session recordto determine if the alteration process has been completed within anacceptable time limit to ensure rental or borrowed discs are not scannedto await the future delivery of a retired or altered disc.

Circulation of a Fraud Set of Discs: A fraud set of discs is similar tothe circulation of a retired or altered disc with the exception thatconsumer does not have possession of a usable copy of the content andmedia. Instead the consumer gains access to set of discs where one is ausable copy and the other is a marked and/or destroyed copy of the samecontent. The consumer uses this set of discs to qualify for a licensingtransaction, then circulates the “Fraud Set” to other consumers who dothe same. As described with the circulation of a retired disc use case,the system records a unique signature of the properties of the retireddisc in a data base, and confirms that the same retired disc has notbeen used in a previous licensing transaction prior to approving a newlicensing transaction.

Altered Retired Discs: This fraud use case results from the consumerattempting to reuse a previously retired disc by modifying its previousalteration or destruction pattern so as to create a new unique signatureon the previously retired disc. The illustrative method would preventthis fraud use case through the identification of an invalid shape oralteration pattern, or in the case where alterations are made by apowered mechanism, a lookup of the disc signature from less visibleminute alterations made on the disc media which would indicate the dischad been reused. Less visible and minute alterations of the media aredifficult for the consumer to modify thus significantly lowering therisk of this fraud.

The example non-limiting measures taken by the illustrative non-limitingsystem to prevent fraud are scalable in their robustness and controlledby the online system and its policy management component. Thus thelicensor may adjust the level of fraud protection from none to robustmeasures as warranted by business conditions. The policy managementsystem controls the level of security in accordance with criteria thatmay include a time schedule from initial release of the content, marketvalue of the content, or other criteria.

A non limiting example of content follows: This disclosure describes asystem and method for the recording and management of licenses forcontent stored on replicated, read only, storage media. The term“content” is often but not exclusively used to refer to the recordingsmade of a creative work, performance, or composition so that thecreative work may be replicated, distributed and output on a device formass consumption. Technology is used to capture and record creativeworks for future consumption. Technology may capture and render acreative work as an analog waveform or digitize the creative work into adigital file. Non-limiting examples of creative works may includemovies, musical performances, audio books, television shows or programs,music videos, and photographic images, among others. Content is commonlyreplicated as analog recordings or digital files, bound to a storagemedium, and distributed as packaged goods for retail sale. A fewexamples of these products include Digital Versatile Discs (DVD's),Blu-ray Discs (BD's), Compact Discs (CD's), or audio recordings onRecords or LP's.

DVD's, BD's, CD's, and Records contain analog recordings or digitalfiles of the content that can not be erased or deleted from thesubstrate by playback devices. When content is stored on a substratethat does not have the capability to erase or delete the content, itsstorage media is referred to as Read Only Media or ROM. Since contentfiles bound to read only media can not be overwritten or deleted by themedia playback device, a process by which a consumer seeks to move,retire, lend, trade, or sell content bound to a DVD, BD, CD, or Recorddisc, may require the consumer to deliver or send the DVD, BD, CD, orRecord to the recipient.

The term “content owner” should not be in many or most cases confusedwith a consumer who purchases packaged goods such as DVD's or CD's. Asignificant portion of content that is used by consumers is composed ofcopyrighted material that is licensed for the private use of thepurchaser of the packaged goods in which a copy of the content isstored. For example, when a consumer purchases a DVD of a movie, he doesnot purchase the actual content but instead is buying a license to use,play and privately perform the content. Ownership of the content remainswith the content owner, or rights owner, who owns a controlling interestin the content itself. When content is licensed for use, the owner ofthe content is typically referred to as the licensor and the purchaserof the right to use the content is typically referred to as thelicensee. In many cases, when packaged storage media containing contentis sold to a consumer, the content owner is licensing the right for theconsumer to use a single copy of the content stored on physical storagemedia for private, non commercial use. Thus a system that enables theconsumer to cancel, transfer, or sell his license to use the content,should ensure the consumer no longer has use of control, or possessionof any licensed copies of the content prior to completing anytransaction that cancels his license.

Content is commonly replicated as analog recordings or digital files,bound to a storage medium, and distributed as packaged goods for retailsale. Typically these packaged goods are mass produced and replicatedwithout serialization or other means to identify and track each unit ofproduction and record its ownership with the licensee. Thus, licensingtransactions involving the transfer of the licensee's rights to use thecontent to a third party or to new storage or other form of the mediafor use by the same licensee typically requires the licensee tophysically surrender the physical media and stored licensed content to arecipient, service bureau or other trusted depository prior tocompleting the transaction.

Shipping or delivering content stored on DVD's, BD's, CD's or Records toa recipient is a time consuming, tedious and expensive process that manyconsumers would choose to avoid. DVD's, BD's, CD's, and Records do notfit in standard size envelopes so special shipping mailers must be foundand purchased. Alternatively, several discs may be packed in a box andshipped, however; packaging and delivering the content to the shipper isinconvenient. DVD's, BD's, CD's, and Records may be damaged or lost inshipment resulting in a complete loss to the licensee. Furthermore, bothof these methods require someone to pay for the shipment which reducesthe proceeds of the transaction, thus making commerce in content tradingless attractive.

Once shipped, the DVD's, BD's, CD's, and Records must be received andprocessed by the content owner or authorized intermediary. The laborassociated with handling, accounting for, and disposing of returnedDVD's, BD's, CD's, and Records creates significant costs that depletethe residual valuation available to the consumer for the trading orcommerce of their DVD's, BD's, CD's, and Records. Furthermore, theexpense of processing returned DVD's, BD's, CD's, and Records lowersprofit margins for the content owner or their agent, making the businessless attractive and increasing costs to the consumer.

When used in support of a licensing transaction, a retirement of DVD's,BD's, CD's, and Records can be used to offset the purchase price of newrights or licenses. For example, compensation given for the retirementof a license may be used to purchase new content licenses packaged onROM media such as DVD's, BD's, or CD's or content packaged in digitalfiles that are distributed online. Licenses need not be limited to thepurchase of new content or trade ins however; but may be used to allownew privileges for the use of original content. For example, the rightto move the original content to a new storage media or location, createadditional copies of the original content, or the right to convert theoriginal content to higher quality (e.g. SD to HD) or new format (e.g.2D to 3D), are rights that may be purchased that enhance the rightsassociated with the original content. When rights are offered for saleand use of content they are referred to as Rights Offerings or Licenses.

Retirement in one non-limiting example is a process by which a consumerwho purchased content bound to read only storage media, voluntarilydisables the media and its stored content to a level deemed sufficientby the content owner, so that the use of content that was originallystored on media does not remain with consumer, or so it could not beused by another consumer or entity. Retirement allows the consumer tosurrender their ability to access and use the content in its originalphysical form in exchange e.g. for compensation, the transfer of theright to a third party, as a condition of receiving new rights orprivileges by a content owner or their authorized intermediary, or forother purposes.

When used in support of a trade-in transaction, a retirement can be usedto offset the purchase of new rights or licenses. For example,compensation given for the retirement of a license may be used topurchase new content licenses packaged on ROM media such as DVD's, BD's,or CD's or content packaged in digital files that are distributedonline. Licenses need not be limited to the purchase of new content ortrade-in's however; but may be used to allow new privileges for the useof the original content.

The preceding discussion is provided for general background informationand it is not intended to be used to assist in the determination of thescope of the claimed subject matter.

NON LIMITING ILLUSTRATIVE EXAMPLES

In one non-limiting illustrative example, a consumer retires andreceives value for the retirement of a DVD of a movie tide by using aspecial tool, an internet connected device such as a personal computeror media player, and an online account established by the content owneror their authorized intermediary. In this exemplary embodiment, theconsumer creates a secured trading account with the content owner orauthorized intermediary, software is downloaded and installed on theconsumer's device, and a retirement tool is sent to the consumer toassist in the destruction of the DVD. The DVD is placed in the opticaldrive of the consumer's device, scanned for properties, and identifiedas a valid stock keeping unit of a DVD offered in commerce by thecontent owner's online system. The consumer accepts an offer to retirethe DVD, and uses the retirement tool to destroy the content on the DVDat a level to make the DVD valueless, yet still identifiable by thesystem. The destroyed DVD is rescanned, re-identified, and its uniquepost destruction properties are recorded in a database. Once the systemhas confirmed the DVD has been sufficiently destroyed, the online systemrecords the destruction of the DVD, and revokes or records theconsumer's license to use the DVD in a licensing database. At thediscretion of the content owner, the consumer's account may beimmediately credited for the retirement value of the DVD, or creditedfollowing a verification period. The verification period may require theconsumer to place the destroyed DVD back into the optical drive of theirdevice for a rescan at a future date to provide an added level ofassurance that the original DVD was not obtained from a DVD rentalbusiness or other third party. The content owner or their authorizedintermediary maintains a record of the destroyed DVD signature forauditing purposes. The consumer's trade credit that is establishedfollowing the successful completion of the retirement process may beused for a variety of offerings at the discretion of the content owneror their authorized reseller. A partial list of non-limiting examples ofthis use may include credit against the purchase of a digital downloadfile of a different motion picture title, the purchase of a new movietitle on DVD or BD disc, the purchase of a movie rental, credit againsta subscription fee, the purchase of additional copies, or the purchaseof a digital file to a motion picture stored on recordable storagemedia.

In a second illustrative non-limiting example, a consumer uses thesystem and method to support the exchange or sharing of content withanother consumer. In this exemplary example, the original purchaser ofthe content seeks to transfer their usage rights to another individual.The purchaser of the content uses the same system and tools to identify,destroy, and retire their content. However, instead of receiving creditfor the retirement of the content, the license for the use of thecontent is transferred to another individual.

In a third illustrative non-limiting example, a content owner or theirintermediary may not require the destruction of the content, however;they may use the system to automate the identification of content andthe presentation of offers to the holder of the content.

In a fourth illustrative non-limiting example, a consumer uses thesystem and method to virtually move content stored on a read onlyoptical disc media to an internet computer data center or host. Theconsumer uses the system and method to electronically scan and confirmthe original storage media is replicated read only media, and toidentify the content stored on the original read only storage media. Ifacceptable media and content is identified, the consumer is presentedwith an offer to transfer their use of their content from the originalread only storage media to new storage media residing at the internethost. If the consumer accepts the offer, he uses the Field RetirementTool to alter the original storage media to render a significant portionof the content stored on the original storage media unusable. Theoriginal storage media is then rescanned electronically to confirm thealteration of the original storage media has rendered the contentsufficiently unusable, and when this state has been confirmed and anycompensation requirements satisfied, a license record is approved for aright to use content stored on new storage media controlled e.g. by theinternet host.

In a fifth illustrative non-limiting example, a consumer uses the systemand method to virtually move content stored on a read only optical discmedia to an internet or other networked computer data center or host orthe like. The consumer uses the system and method to electronically scanand confirm the original storage media is replicated read only media,and to identify the content stored on the original read only storagemedia. If acceptable media and content is identified, the consumer ispresented with an offer to transfer his use of their content from theoriginal read only storage media to new storage media residing at theinternet host or otherwise on the network. If the consumer accepts theoffer, he uses a powered mechanism to alter the original storage mediato render a significant portion of the content stored on the originalstorage media unusable. The original storage media is then rescannedelectronically to confirm the alteration of the original storage mediahas rendered the content sufficiently unusable, and when this state hasbeen confirmed and any compensation requirements satisfied, a licenserecord is approved for a right to use content stored on new storagemedia e.g. controlled by the internet host.

In a sixth illustrative non-limiting example, a consumer uses the systemand method to virtually move content stored on a read only optical discmedia to new storage media located anywhere. The consumer uses thesystem and method to electronically scan and confirm the originalstorage media is replicated read only media, and to identify the contentstored on the original read only storage media. If acceptable media andcontent is identified, the consumer is presented with an offer totransfer their use of their content from the original read only storagemedia to new storage media residing at the internet host. If theconsumer accepts the offer, he uses the Field Retirement Tool to alterthe original storage media to render a significant portion of thecontent stored on the original storage media unusable. The originalstorage media is then rescanned electronically to confirm the alterationof the original storage media has rendered the content sufficientlyunusable, and when this state has been confirmed and any compensationrequirements satisfied, a license record is approved for a right to usecontent stored on new storage media controlled by the internet host.

In a seventh illustrative non-limiting example, a consumer uses thesystem and method to virtually move content stored on a read onlyoptical disc media to new storage media located anywhere. The consumeruses the system and method to electronically scan and confirm theoriginal storage media is replicated read only media, and to identifythe content stored on the original read only storage media. Ifacceptable media and content is identified, the consumer is presentedwith an offer to transfer their use of their content from the originalread only storage media to new storage media residing at the internethost. If the consumer accepts the offer, they use a powered mechanism toalter the original storage media to render a significant portion of thecontent stored on the original storage media unusable. The originalstorage media is then rescanned electronically to confirm the alterationof the original storage media has rendered the content sufficientlyunusable, and when this state has been confirmed and any compensationrequirements satisfied, a license record is approved for a right to usecontent stored on new storage media controlled by the internet host.

In an eighth illustrative non limiting example the system and method areused to confirm content stored on replicated read only media has beenrendered sufficiently unusable in support of transactions that do notcompensate the licensee of the content. Non limiting examples includethe recycling or disposal of the media and content license, theconfirmed altering and impairment of storage media to render contentunusable associated with the donation of a license, the confirmedaltering and impairment of storage media to render content unusable toavoid the cost of return shipment of the storage media and content.

In an additional example non-limiting embodiment, an example system andmethod utilizes the alteration of data and/or correcting codes which canbe found in an ECC (error correcting codes) subsystem typically found inmany modern optical disc drives such as DVD, CD, and Blu-ray Discdevices. In this non-limiting embodiment, marks can be placed onto thedisc surface, or into sub-layers below the surface, and in specificlocations so as to alter some or all of the codes of the ECC systemnearby the mark. In this example, the controlled mark placement can bedone in such a way as to alter only a sufficient number of ECC codesand/or content data such that the error correction system can correctfor the alteration while at the same time remains parametricallyidentifiable as a flag on the media. In this embodiment, ECC parametricsense information can be characterized to automatically determine if themedia under test has been duly flagged, or not. Further, in thisembodiment, the media would have been flagged in a non-fully destructivemanner. That is, the alteration of content on the media is such that theECC system and other error tolerant systems such as the content decodersubsystem (e.g. MPEG2), are able to correct for such minor alterations,resulting in such a way that the media remains operable, the contentremains playable in a typical playback device.

In another example non-limiting embodiment, flags can be placed into themedia automatically, by way of automated means which may be found intypical optical disc devices, or by modified means in such devices. As auseful example, this example non-limiting embodiment proposes the use ofa write laser, found in a typical writable DVD drive, to be applied inan unconventional way, to alter data and/or correcting codes toautomatically place one or more flags onto or into the media. As shownin the previous embodiment, the presence or lack thereof regarding sucha flag would be detectable via automated means such as ECC parametriccharacterization.

In these and other embodiments, the flag under consideration could beplaced into what can be called the data area of the media, or to otherareas such as the burst cutting area (BCA) as found on many opticaldiscs. As an example, we can consider the use of data and or errorcorrecting codes (ECC) which can be typically found in the BCA region ofa replicated DVD disc. To further illustrate this example, the DVD BCAsystem as specified in ECMA-267 provides for up to 188 bytes of payloaddata and up to 16 bytes of ECC using 4-way interleave. This examplenon-limiting embodiment alters data and/or ECC codes in the BCA regionas an example of media flagging. In this example, the BCA would bealtered in such a manner that the ECC readback characteristics areuniquely identifiable, signaling the flag of interest. Such signalswould allow the flag characteristics to be separated from noisephenomenon characteristics such as manufacturing defects, normal usescratches, or other marks.

In yet another non-limiting embodiment, we can consider writing newinformation into the BCA region of an optical disc such as DVD orBlu-ray. An example of this embodiment would be the creation of a BCAdata structure where none previously existed. This embodiment offers amethod to write new BCA data, including sync codes and ECC codes, intothe BCA region using an appropriate high power laser.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features and advantages will be better and morecompletely understood by referring to the following detailed descriptionof exemplary non-limiting illustrative embodiments in conjunction withthe drawings of which:

FIG. 1 is a diagram of an example non-limiting electronic system for thefield identification, destruction, retirement, and accounting oflicensed content stored on optical media.

FIG. 1A is a schematic diagram of a non-limiting network-based systemarchitecture.

FIG. 2 shows example non-limiting system components.

FIGS. 3A-3E show an example non-limiting process by which media contentstored on read only optical media is identified, valued, destroyed, andverified in the field to support an electronic commerce transaction.

FIGS. 4A-4P describe an example non-limiting Manual Field RetirementTool for content stored on Read Only Optical Media.

FIG. 5 shows an example non-limiting optical disc signal processing datapath.

FIG. 6 shows an example non-limiting 37,856 byte physical ECC data blockfor DVD (32 KiB user data).

FIG. 7 shows example row-wise PI error correcting.

FIG. 8 shows example column-wise PO error correcting.

FIG. 9 shows an example non-limiting ECC sensor and PI/PO correctioncounts.

FIG. 10 shows an example non-limiting DVD Physical and Logical layout(from ECMA-267).

FIG. 11 shows an example non-limiting DVD Physical Zone Geometry (fromECMA-267).

FIG. 12 shows an example non-limiting PI/PO sensor data via diagnosticport (flagged DVD).

FIG. 13 shows an example non-limiting PI/PO sensor data (non-flaggedDVD).

FIG. 14 shows an example non-limiting DVD Numerical Aperture Lens.

FIG. 15 shows an example non-limiting rewritable disc laser power.

FIG. 16 shows an example non-limiting writing of a Flag on read-onlymedia.

FIG. 17 shows an example non-limiting flag shape and location example #1

FIG. 18 shows an example non-limiting flag shape and location example#2.

FIG. 19 shows an example non-limiting flag shape and location example#3.

FIG. 20 shows an example non-limiting process for capturing serialnumber data (e.g. BD media)

DETAILED DESCRIPTION

FIG. 1: is a diagram of an example non-limiting electronic system forthe field identification, destruction, retirement, and accounting oflicensed content stored on optical media. Process steps described inFIG. 1 are numbered in accordance with an exemplary non-limitingsequence. In Step 1, the process is initiated by placing licensedcontent stored on read only optical media in the form of a Compact Disc(CD), Digital Versatile Disc (DVD) or Blu-ray disc (BD) into the opticaldrive of a network connected digital client device operated by theconsumer. The client system is connected using a digital network to anapplication server operated by the content owner or authorizedintermediary. Step 2: Software, either residing on the client device,the application server, or both, identify the content by scanning datastored on the optical disc, its data structure, watermarks, metadata,and properties that comprise a unique signature of the disc. Once thecontent has been identified, a retirement valuation is calculated and anoffer to retire the content is presented for acceptance by the consumer.Steps 3 and 4: The consumer uses a tool to sufficiently destroy thecontent stored on the disc to a level where it becomes valueless;however sufficient information is retained that is used to identify thecontent and validate its destruction. Step 5: A second scan of thedestroyed disc captures a unique signature of its post destructproperties and data that can be used to identify the destroyed disc ifneeded. This post destruct signature is retained by the network hostsystem in a data base for audit and validation purposes. Step 6:Following an update of licensing records, the consumer's trade accountis credited for the retirement value of the content which may then beused to purchase new content, purchase new usage rights, exchange usagerights with a third party, obtain the same content stored to alternativemedia, or obtain enhanced versions of the same content.

FIG. 1A: shows an example non-limiting system architecture. In theexample shown, a user who wishes to retire a storage medium uses aretirement tool 300 and additional electronic equipment (e.g., aconventional network-connected personal computer or the like including astorage medium reader) to retire a storage medium and report theretirement over a network 14 to a retirement server 16 in a verifiablemanner. The retirement server 16 updates a licensing database 18 basedon the retirement, and can share that verified retirement with a tradingserver 20 either directly or over network 14. Trading server 20 may takevarious actions such as issuing the user a credit via a bank or otherfinancial institution, issuing a store credit for a brick-and-mortarretailer 36, providing an authorization for a content streaming server32 to stream content from a content database 34, authorizing a contentdownload server 24 to download content 26, sending a replacementphysical storage device, etc. The trading server 20 can issue authorizedelivery of the same or further content over network 14 to the same userbut to a different device (e.g., a smart phone 28, tablet computer, orany other appliance), or it may authorize delivery to a different useror group of users 30.

FIG. 2: is a description of example non-limiting system components. Theillustration describes a networked computing structure where a ConsumerOperated Device (C1), communicates with a Data Center operated by thecontent owner or authorized intermediary (A1), over a digital network(T101). In one non-limiting illustrative example, Consumer OperatedDevice (C1) could for example comprise personal computer 12, smart phone28, or other user device shown in FIG. 1A, and Content Data Center (A1)could comprise, include or consist of Retirement Server 16 with orwithout other components such as Trading Server 20, Content DownloadServer 24, Content Streaming Server 32, etc.

The Consumer Operated Device (C1) automates processes in support ofcontent identification, retirement, valuation, and accounting, under thecontrol and record keeping of the Content Data Center (A1). The digitalnetwork (T101) may be implemented as a Wide Area Network (WAN),Internet, Local Area Network (LAN), Personal Area Network (PAN), or anyother digital network that creates a bi-directional digitalcommunication link. The Consumer Operated Device (C1) may be locatedanywhere; however it would typically be located in the field or at alocation geographically separated from the Content Data Center (A1).Typically multiple Consumer Operated Devices (C1) would interface withthe Content Data Center (A1). The Consumer Operated Device (C1) may beproduced as a variety of products including but not limited to apersonal computer, a laptop computer, a DVD or Blu-ray media player, aportable media player, a web tablet, a television a set top box, adigital video recorder, or personal media server. While the ConsumerOperated Device (C1) would typically be in the possession of theconsumer, it may also be in the possession of a content owner orauthorized intermediary as in the case of a media kiosk, library orpoint of sale terminal in commercial space with public access.

Information and/or content would normally transfer between the ConsumerOperated Device (C1) and the Content Data Center (A1) over the digitalnetwork (T101), however; in certain cases, it may also be physicallydelivered between the Consumer Operated Device (C1) and Content DataCenter (A1) by mail or other terrestrial methods of delivery asindicated by T102, T103, and T104.

Other components illustrated in FIG. 2 of the system are described asfollows:

Content, stored on read only storage media, including but not limited toDVD disc, Blu-ray disc (BD), Compact Disc (CD), recordings on vinyl(Records) are depicted by C2. Content (C2) physically interfaces withthe Consumer Operated Device (C1) where it is read.

External Devices (C4) may be connected to the Consumer Operated Device(C1) for audio/video output, input, and/or control of the system.External Devices (C4) are connected with to the Consumer Operated Device(C1) by a Digital Network (T101) or by a data buss, or cableinterconnect (T105), non-limiting examples of which may include HDMI,Component Video, Universal Serial Bus (USB), DVI, VGA, ESATA, andComposite video cables among others.

The Field Retirement Tool (C3) is a tool used to sufficiently destroycontent files stored on read only media (C2) to render the contentstored therein valueless, while retaining sufficient properties for theConsumer Operated Device (C1) to identify the content following itsdestruction. The Field Retirement Tool may take a variety of formsdepending on the storage media used and recording methods. C3 may be amanual tool used by the consumer or integrated as a component in theConsumer Operated Device (C1), or as a component integrated with anExternal Device C4 that is connected to C1.

The components of an example non-limiting Consumer Operated Device (C1)include the following:

A Communications Interface (C1-1) to manage digital communicationsbetween networked or interconnected devices.

User Interface (C1-2), is software for the control and operation of theConsumer Operated Device. The Consumer Operated Device may include amonitor or screen to output the user interface, or the interface may beoutput on an external device (C4).

Content Scanning Software (C1-3) controls the operation of the MediaRead or Read/Write Hardware (C1-4), executes content scanning protocols,and reduces information captured from the scanning of data and/orstorage media into a digital file that is used by the Content DataCenter (A1) to identify the content and Stock Keeping Unit of the mediaand content.

Following the destruction of the content, the Content Scanning Software(C1-3) creates a file of the unique properties or signature of the postdestruct content and media for audit purposes. Pre and Post destructionproperties of the content and media may include data from a wide rangeof sources including data files, metadata, file structure, extrapolateddata from destroyed regions, embedded watermarks, serial numbers, tags,keys, tables, track lengths and other unique properties of the content,media and organization of the media.

Media Read or Read/Write Hardware (C1-4) is hardware that interfaceswith storage media to read data or recordings of content that are storedon the media. The Media Read or Read Write Hardware may integratetechnologies that destroy content stored on media. Content stored onstorage media may include digital files or analog recordings. Examplesof C1-4 include DVD or BD Read Only, or Read/Write Drives, CD Read orRead/Write Drives, Charge Coupled Devices or CCD's capable of opticalscanning of physical media.

The Components of the Content Owner or Authorized Intermediary DataCenter are described as follows:

Note, for simplicity the components or A1 are depicted as collocatedhowever they may also be distributed and connected with a data bus ordigital network.

A Communications Interface (A1-1) to manage digital communicationsbetween networked or interconnected devices.

Downloader and Installer (A1-2) is software that manages the downloadingand installation of software transferred between the host data center(A1) and the Consumer Operated Device (C1) Downloaded software mayinclude any software or firmware that is required by C1 to perform itsfunction.

Remote Scanning Software (A1-3) is software similar in function to C1-2that operates on the Consumer Operated Device; however, (A1-3)implements the content scanning function remotely from the Data CenterHost (A1) using the Digital Network (T-101).

Content Identification Module (A1-4) is software and an automateddatabase of properties assigned to each merchandisable unit of contentand media offered by content owners in commerce that uniquely identifiesthe content when scanned. Identifying properties and other records areassociated in the database to create a rich profile on eachmerchandisable unit of content. Other information associated withcontent may include release date, stock keeping unit, bar codes, regioncodes, release version, aspect ratios, formatting, resolution,languages, trailers included, audio tracks, and other information usefulin merchandising content.

The Content Identification Module (A1-4) receives identifyinginformation of Content C2 from the Content Scanning Software (C1-2 orA1-3), compares this information against its comprehensive database ofidentifying data and properties from each merchandisable unit of contentin the industry, identifies a set of matching records associated with acontent tide, label or tag to identify Content C2.

The Content Identification Module (A1-4) may also receive informationfrom the scanning of destroyed content and compare this informationagainst its records to identify retired content after it has beendestroyed.

Content Valuation Module (A1-5) is software that automates the processof valuing content, or licenses to content, that is offered for sale orexchange by the licensee. Valuation information may be sourced fromcontent owners or other third parties who are interested in acquiringthe right to use or merchandise the content. The content valuationmodule may accept bids for the purchase of a merchandisable unit ofcontent or license from prospective buyers. The Content Valuation Moduleincludes the capability to alter valuation based on time from a previousvaluation or time from commercial release date of the content offeredfor exchange or sale by the licensee.

Offers Module (A1-10) is software that prepares and presents offers insupport of transactions for the sale, exchange, trade-in, or outrightpurchase of a merchandisable unit of content or licensed rights. In thecase of an outright purchase of content or a license, the offers moduleprepares pricing for purchase transactions for content or licenses whereno content or license is offered in trade for the purchase of newcontent or licenses.

The Offers Module is a merchandising platform of software that automatesthe process of pricing rights transactions or licenses in accordancewith business criteria and market valuations. Market valuations areobtained from the Content Valuation Module (A1-5), business criteria maybe sourced from content owners, authorized intermediaries, or consumerswho have an account relationship. Business criteria may include amongothers, the nature of the transaction in the form of a trade-in oroutright purchase, the time from commercial release date of any contentor license to be purchased, policies for the use of any content orlicense to use content purchased which may include such policies asallowable number or copies that may be created from the content, andrights to exchange or transfer the content or license among others,format or the content or license to be purchased which may includecriteria for resolution, quality, aspect ratio, and required contentprotection technologies among others, geographic region for the sale anduse of the content, trading costs and reseller margins, promotionalpricing information from the content owners, trading relationship(Commercial or retail account), volume of trading activity, and statusof participants in the transaction with respect to membership in asharing community, network, or subscription service. In addition toaccessing valuation records in (A1-5) the Offers Module accessesinformation from the License Policy Module (A1-6), Customer AccountRecords (A1-9), and the License Ownership Data Base (A1-7), and theRecommendation Engine (A1-11) in support of preparing offers.

The Offers Module prepares and sends offers data over T101 to C1 forwhere they are prepared for display by the User Interface C1-2, and thendisplayed on C1, or attached output devices C4.

Customer Account Records (A1-9) is an automated database that containscustomer information used to identify and authenticate customers andcomplete transactions. Customer Account Records includes billingrecords, payments, credit card information, credit balances from theretirement of content or licenses, account preferences forcommunications and marketing, content ownership records, customermemberships in trading communities and/or social networks, and recordson interests, demographics, and other attributes useful for themerchandising of content or licenses.

To facilitate the secondary market for the sale and exchange of contentor licenses, Customer Account Records includes records on content orlicenses owned by the customer that are offered for sale or exchange aswell as records on content wanted for purchase or trading. The OffersModule (A1-10) accesses Customer Account Records for content or licensesthat are offered for sale or trade by a customer, matches these recordswith other account records from customer's who seek to obtain the samecontent and prepares offers for the sale and purchase of the content orlicensed rights.

License Ownership Data Base (A1-7) records and maintains the status ofany purchased license owned by the customer. The License OwnershipDatabase (A1-7) records current status and history of any transactionmade by the consumer for any license to a merchandisable unit ofcontent. The License Ownership Database receives transaction informationfrom Customer Account Records (A1-9), following satisfactory completionof a transaction. The License Ownership Database may grant conditionalor time limited licenses pending the satisfactory completion of arequired action by the licensee or a recipient. An example of thegranting of a conditional license may result from the consumer providinginadequate proof of ownership for retired or exchanged content, wherebya license is conditionally granted pending satisfactory completion of aproof of ownership process.

License Policy Module (A1-6) is software and an automated database thatreceives information from content owners on the approved terms andconditions for the use, format, protection, and exchange of content orrights they offer for sale. The License Policy Module (A1-6) suppliesthese terms and conditions to the Offers Module (A1-10) that uses theinformation to create offers.

In addition The License Policy Module A1-6 includes policies that governthe approval of content or license transactions depending on the type ofinformation provided by the consumer to verify their ownership of thecontent or license.

Destroyed Signature Database (A1-8) is an automated database thatrecords the identifying properties or signature of content and itsstorage media that has completed the destruction process. The DestroyedSignature Database A1-8 receives data from the Content Scanning Software(C1-3) residing on the Consumer Operated Device (C1) or the RemoteScanning Software (A1-3) residing on the Content Owner or AuthorizedIntermediary Data Center (A1). The data recorded in A1-8 is used toprovide a record that can used to support auditing of destroyed contentto reduce and reduce risk of fraud. Among other uses, data from theDestroyed Signature Database A1-8 may be used to provide reasonableassurance that one piece of destroyed content is not used to supportmultiple trade-in or sale transactions, and that destroyed contentremains in the possession of a licensee who offered it in exchange forcompensation or trade.

Recommendation Engine (A1-11) is software and an automated crossmarketing database that includes records that classify content bydistinguishing attributes that are useful in relating one piece ofcontent to another piece or group of content. Examples of attributesthat may be assigned to a piece of content may include genre of thecontent, cast members, actors, musicians, artists, year of production,similarity of plot, story, outcomes, situations, emotional responseamong others. Content records classified by attributes is matched withcustomer interest and purchase data stored in the Customer AccountRecords A1-9 to develop personalized recommendations that match contentwith customers interests to facilitate the merchandising of content.Content recommendation information is used by the Offers Module A1-10 tocreate personalized offers for the sale of trading of content. TheRecommendation Engine captures information from browsing history in theUser Interface C1-2, content ownership records from the Customer AccountRecords A1-9, and content titles identified from scanning records in theContent Identification Module A1-4.

FIGS. 3A-3E show an example non-limiting process by which media contentstored on read only optical media is identified, valued, destroyed, andverified in the field to support an electronic commerce transaction.

The process identifies the party responsible for each step in theprocess. Consumer executed processes are identified as process stepsthat fall to the left of the dashed line, while Content Owner orAuthorized Intermediary process steps fall the right of the dashed line.

The process is described as follows:

Step 201: Using their Consumer Operated Device C1, its user interfaceC1-2, and the Digital Network T101, the consumer creates a securedbilling account with the Content Owner or Authorized intermediary A1.The consumer provides information to identify and authenticate sessionsin the form or a unique log in and password. The customer providespayment information in the form of credit card numbers to facilitatefuture payments for content or license transactions. The consumerprovides further account information as needed to facilitate content orlicense transactions including but not limited to address, contactpreferences, names of immediate family members and their ages, marketingpreferences, telephone number, social networks, and interests. Thecustomer then accepts a download and installation of software needed tofacilitate transactions on A1 and C1.

Step 202: Content Owner or Authorized Intermediary Data Center (A1)downloads and installs Content Scanning Software (C1-3) onto C1 usingT101.

Step 203: Content Owner sends a Content Retirement kit to the Consumerusing T102. The Retirement Kit includes the Field Retirement Tool (C3)self addressed mailing labels, and shipping envelopes for content.

Step 204: At the discretion of the consumer, they may elect to sendcontent (C2) they offer for retirement to the content owner orauthorized intermediary for credit, or they may send in proof ofpurchase of their content in the form of proof of purchase labels thatwere attached to content packaging, scans of the packaging, receipts, orother forms of proof. The consumer uses the self addressed mailersprovided in Step 203 and terrestrial shipping (T104) to send content C2or proof of purchase information to the content owner or authorizedintermediaries for processing. C1 may prepare scanning records or otherdata files that are stored on media and sent to the content owner orauthorized intermediary using terrestrial shipping methods as indicatedwith T102. The content owner may also send data files or content storedon media to the consumer for use by C1 using terrestrial shippingmethods as indicated by T103.

Step 205: Once C2 and/or proof of purchase information is received andaccepted by the content owner or authorized intermediary, records arecreated in the Customer's Account Records database in A1-9 recording thereceipt of content and/or proof of purchase information.

Step 206: Consumer's may elect to not return content (C2) they wish toretire for processing and/or may not return proof of purchaseinformation, instead they may choose to use the field retirement processby logging into their account using C1, and connecting directly to A1using the digital network T101. Using the User Interface C1-2, theconsumer requests a content retirement transaction from the onlinesystem.

Step 207: The content owner data center A1, and the user interface C1-2,instructs the consumer to interface their content (C2) with the MediaRead and/or Read Write Hardware C1-4. Interface of C2 with C1-4 may beperformed by placing an optical disc into the Compact Disc (CD) and/orcombination CD and DVD and/or BD disc drive of C1, connecting contentdirectly to a data bus T105 as with USB, Serial ATA Connection or otherdata bus interface, or by using an External Device (C4) to read and/orinspect content C2. Among others, External Devices may use opticalscanners or charge coupled devices (CCD's) to optically inspectrecording tracks of Records.

Step 208: C1 uses the Media Read and or Read/Write Hardware C1-4, andContent Scanning Software C1-3 to scan content C2 for identifying dataand properties of its storage. Data may be extracted from files residingon the disc, metadata stored on the disc, keys, watermarks and otherdata. Properties may include such items as track locations, tracklengths, data structure, file formats, tables, press marks, andmanufacturing artifacts. Analog recordings may be input and digitized tocreate a record that uniquely identifies the content. Content ScanningSoftware C1-3 or A1-3 receives information from C1-4 or C4 and creates ascanning record that identifies properties content C2, this informationis analyzed for matching records by the Content Identification ModuleA1-4 on A1 to identify the content C2.

Step 209: Scanning is conducted until either Content is successfullyidentified, or not within a predetermined time limit. If C2 isidentified a record of the identifying data of C2 is stored by theContent Scanning Software C1-3 in the Customer Account Records A1-9 andthe process continues to step 210. If the content can not be identifiedby the system, the user interface C1-2, instructs the consumer to sendC2 to A1 for processing using T104.

Step 210: Once C2 has been identified, A1 queries License and Ownershiprecords of the License Ownership database (A1-7) and Customer AccountRecords (A1-9) to determine if an ownership record for content C2 hasbeen recorded and associated with the consumer or immediate familymembers of record in A1-9.

Step 211: If ownership records associated with the consumer or theirimmediate family are found in the License Ownership database A1-7 orCustomer Account Records A1-9, for content C2, and there has been noprevious retirement transaction recorded for C2 associated with theconsumer or their immediate family members, then the process continuesto step 216; otherwise it proceeds to step 212.

Step 212: Starts by querying retirement transaction policy records ofthe License Policy Module database of A1-6. A1-6 specifies whetherfurther proof of ownership is required by the content owner on thatparticular date and time. Content Owners may instruct A1-6 to changeProof of ownership criteria depending on the time that has elapsed fromthe market introduction or release date of C2 in any form including thefirst public exhibition date of the content, the first release date onpackaged media, or other date they choose. If no proof of ownershiprequirements are required to complete a content retirement transaction,A1-6 allows the process to proceed to step 216, otherwise it continuesto step 213.

Step 213: Policies set within the License Policy Module A1-6, mayrequire proof of ownership processes to be completed before allowing thesystem to proceed to step 216, or policies may be set to conditionallyallow the retirement transaction to proceed pending an agreement by theconsumer to satisfy proof of ownership requirements by a future date andtime. The method by which proof of ownership requirements may becompleted at a future date or time is called Conditional Approval. TheLicense Policy Module A1-6, queries license policy records to determineif Conditional Approval is allowed or not for content C2, and if it isallowed, the process continues to step 214. If Conditional Approval isnot allowed, the process does not continue to step 216 until proof ofownership requirements are met by the consumer in Step 215.

Step 214: In the case where Conditional Approval is allowed by thecontent owner, the user interface C1-2, informs the consumer on theterms of Conditional Approval. If the consumer accepts the terms ofConditional Approval the process continues to Step 216. If the consumerdeclines to accept the terms of Conditional Approval, the process forretiring and valuing content C2 is aborted, however A1 may prepare andpresent offers in the user interface C1-2, for content or rightsofferings that do not include the retirement of C2 in Step 217.

Step 215: Proof of ownership requirements are determined by the contentowner, however; as a means to expedite the process or completing acontent retirement transaction that requires proof of ownership, Step215 supports automated processes that are executable in the field thatlower the risk of fraud. Any combination of the following may be used instep 213 to satisfy content proof of ownership requirements from thefield location:

The consumer may be required to select a button in the user interfaceC1-2 that attests to their ownership of the content.

The user interface C1-2 may inform the consumer that an auditable recordof the destroyed content will be created and retained by the system.

Using the Consumer Operated Device C1, the user interface C1-2, and insome cases an External Device connected to C1 through T101 or T105, theconsumer may be required to input identifying information of C2 using akeypad, optical scanner, or other device that would indicate theconsumer has possession of C2 and its retail packaging.

The consumer may be required to retain and rescan the destroyed contentat a future date. Information collected by C1-3 from the rescanning ofthe destroyed content C2 is compared with the destroyed contentsignature data residing in A1-8 to confirm the consumer has retainedpossession of the destroyed content C2.

The License Policy Module A1-6 software executes any automated proof ofownership processes and records their completion in the Customer AccountRecords database A1-9, and License Ownership Records A1-7.

Step 216: Now with the content identified, and proof of ownershiprequirements satisfied, the Content Valuation Module A1-5 proceeds tovalue content C2 or licenses for its residual value at that moment intime. The Content Valuation Module A1-5 collects and records retirementvaluation information from content owners and records this informationinto a valuation database. Content owners may change valuations at anytime in accordance with market conditions or specify a valuation formulathat calculates the valuation based on market criteria and/or time fromcontent C2 release date. In addition to valuations assigned by contentowners, A1-5 collects and maintains separate records of bids offered forthe purchase of content C2 from third parties or individuals. TheContent Valuation Module A1-5 retrieves both content owner and secondarymarket valuations for content C2 and passes this information to theOffers Module A1-10.

Step 217: The Offers Module A1-10 may increase or reduce the retirementvalue provided by the Content Valuation Module A1-5 for Content C2 for avariety of reasons. The Offers Module A1-10 is capable of receiving andintegrating promotional pricing instructions from content owners thatmay increase C2 valuation. The Offers Module A1-10 may reduce retirementvalue to cover trading costs or commissions. The Offers Module A1-10 mayadd exchange license fees for content transactions between individualsin the secondary market for the content or rights. The Offers ModuleA1-10 may change retirement valuation of C2 depending on the how theresidual valuation of C2 is to be used. For example, if C2 is to be usedin trade in for new release content it may command a different trade invaluation than when applied to library content or general accountcredit. When preparing offers, the Offers Module uses contentrecommendations provided by the Recommendation Engine A1-11 to createoffers that are tailored for the consumer's interests.

Step 218: The Offers Module A1-10 prices offers for a variety of contentor license transaction scenarios, transfers the offers to C1 using T101,and presents these offers in the user interface C1-2. C1-2 may bedisplayed on an External Device C4 or displayed by C1.

Step 219: The consumer reviews the offers and either accepts or rejectsan offer. If the consumer rejects the offers, the process ends and theconsumer does not retire Content C2, if the consumer accepts an offer,the accepted offer is recorded in A1-9 and the process continues to step220.

Step 220: In this step the content C2 is destroyed to a level to renderit valueless. If the destroy tool is integrated within the Media Read orRead/Write Hardware C1-4, the consumer interfaces Content C2 with theMedia Read or Read/Write Hardware C1-4, and the Media Read or Read/WriteHardware implements the destruction of C2 content, if a Manual FieldRetirement Tool C3 is used, the user interface C1-2, instructs theconsumer on how to destroy content C2 by using C3.

Step 221: Once the content destruction process is finished, the contentC2 is rescanned to confirm it has been adequately destroyed. If theManual Field Retirement Tool C3 was used, the consumer interfacesContent C2 with the Media Read or Read/Write Hardware C1-4 to conductthe scanning of C2. If the destruction process was done by C1-4, C1-4automatically starts the rescanning process once content destruction isfinished.

Step 222: The Media Read or Read/Write Hardware C1-4 reads data andproperties of the post destruct content and media C2 and passes thisinformation to the Content Scanning Software C1-3. The Content ScanningSoftware C1-3 uses software to control the Media Read or Read/WriteHardware C1-4 to ensure the Media Read or Read/Write Hardware adequatelyscans the media regardless of the destroyed regions on the C2 storagemedia. The Content Scanning Software C1-3 reduces scanning informationto a post destruct signature file that uniquely identifies the postdestruct properties of the destroyed content and media C2. Thissignature data is compared to the pre-destruct data and signature of C2on file in the Customer Account records A1-9, to determine if sufficientcontent has been destroyed to make C2 unusable. The Content ScanningSoftware C1-3 fetches policy records in the License Policy Module A1-6for content destruction acceptance criteria in assessing the degree bywhich content must be destroyed. The Content Scanning Software C1-3 alsoconfirms the post destruct content signature of C2 sufficiently matchesthe pre-destruct signature fetched from the Customer Account recordsA1-9 of the content and media of C2, to conclude with high certaintythat the two signatures originated from the same source. If the ContentScanning Software determines the content has been sufficiently destroyedthe process continues to step 223, otherwise the consumer is instructedto perform additional destruction and the process returns to step 220.

Step 223: Once the Content Scanning Software C1-3 determines Content C2has been adequately destroyed, the post destruct signature of C2 isstored in the Destroyed Signature Database A1-8 on A1 for futurereference and auditing purposes. The process continues to Step 224.

Step 224: The Content Scanning Software C1-3 sends a record certifyingthe successful destruction of C2 to A1 using T101. The record is storedin the Customer Account Records database A1-9. The process thencontinues to Step 225.

Step 225: Customer Account Records A1-9 updates the License OwnershipDatabase A1-7 to terminate any license to use C2 associated with theconsumer or their immediate family members. A record is retained in theLicense Ownership Database A1-7 of the retirement of C2 by the consumer.The process then continues to step 226.

Step 226: The retirement value of C2 that the consumer approved in Step219 is fetched from the pending transaction record stored in theCustomer Account Records database A1-9, and that amount is added to thecustomer trading account that is stored in the Customer Account RecordsA1-9. If the offer approved in step 219 is a trade-in of content C2 fornew content or rights, A1 completes the transaction and applies tradingcredit to offset the purchase price of the new content.

Step 227: The License Module A1-6 confirms if proof of ownershiprequirements have been satisfied within the grace period. If theconsumer fails to meet proof of ownership requirements within the graceperiod accepted in step 214, the system reverses any payment orcompensation made for the residual value of the retired content inCustomer Account Records A1-9 and notification of the transaction issent to the consumer.

FIG. 4A-4P describes the design, components, assembly, and operation ofa Field Retirement Tool 300 for content stored on Read Only OpticalMedia. The Field Retirement Tool 300 for Optical Media mars the opticalstorage media 302 with a groove 304 that alters the storage media andsufficiently disables the stored content to content owner requirements.One example non-limiting tool 300 is designed to use a DVD carrier case306 as its base and its center hub 308 to stabilize the tool inoperation. The following describes the drawings:

FIG. 4A shows an example non-limiting ISO standard DVD, CD, or Blu-rayoptical disc. The tool 300 is used to alter media on these discs.

FIG. 4B shows a region 310 of media alteration. The tool 300 willdisturb the storage media of the disc 302 while preserving the lead inand lead out areas of the disc. The region of media alteration createdby the tool 300 is anywhere between 53 and 110 mm centered diameter ofthe optical disc.

FIG. 4C describes an example non-limiting pattern of media alteration.The pattern is an 81.5 mm circle that has a center offset 14.25 mm fromthe center of the optical disc.

FIGS. 4D-4F describe the components of the Field Retirement Tool 300.Three components comprise an example tool. FIG. 4D shows the base 300 aof the tool, FIG. 4E describes the Arm 300 b of the tool and FIG. 4Fdescribes the Scribe 300 c. The exemplary illustrative non-limiting tool300 is easy to assemble and disassemble in order to provide compactnessand ease of transportation. For example, the particular non-limitingimplementation shown can be shipped in a very compact form in itsdisassembled kit form, and the user can be instructed to assemble thecomponents into a tool 300.

In the example shown, the scribe 300 c comprises a cylindrical posthaving a section 350 of reduced circumference terminating in a sharp352. The sharp 352, which may comprise a pointed element of metal orother hard substance, is used to scribe a groove in an optical disk asdescribed below. The remainder of tool 300 is used to guide the sharp352 to follow a predetermined trajectory on the surface of a disk 302 tointentionally destroy content areas without destroying other diskportions that can be read by conventional disk reading drives tonevertheless positively identify certain disk characteristics such asfor example volume ID, title, manufacturer, first or other short (e.g.,10 seconds) of content, etc.

In the example shown, the scribe 300 c reduced circumference section 350is dimensioned to be insertable into a receptacle portion 354 of arm 300b. The receptacle portion 354 has a through hole that both snuglyretains the scribe's reduced circumferential section 350 whilepermitting the scribe's sharp 352 to protrude through and contact thesurface of disk 302. At the other end of arm 300 b, a pin 356 protrudesdownwards. This pin 356 is dimensioned to be accepted by a hole 358disposed on a triangular projecting portion 360 of tool base 300 a. Toolbase 300 a comprises a planer member having hole 358 there through aswell as a further hole 362 that is dimensioned to accept and pivotaround the projecting hub 308 of a conventional standard disk case 306.Tool base 300 a further provides a projecting thumb member 364 having adepression 366 therein dimensioned to accept a human thumb.

FIG. 4G shows an exploded view of how the components of the tool 300 areassembled. The scribe 300 c fits into the arm 300 b with sufficientclearance for the scribe to rotate in the arm fitting. The arm 300 bsnap fits into the base 300 a with sufficient clearance for the arm torotate in the base fitting.

FIG. 4H shows the completed assembly of the tool 300.

FIGS. 4I, 4I-1 and 4I-2 show placement of a DVD, CD or Blu-ray disc 302into a standard carrying case 306 with its data side facing up.

FIGS. 4J-1, 4J-2 and 4J-3 show installation of the tool 300 onto the DVDcase 306 with the center hole 308 of the case securing the retirementtool 300 mechanism.

FIG. 4K describes the operation of the field retirement tool 300. Thethumb of one hand is used to hold the tool 300 in place while the otherhand is used to reset the scribe 300 c until it is resting against aside of the tool base 300 a.

FIG. 4L describes the operation of the tool 300 to alter the storagemedia of the DVD, CD or Blu-ray disc. While still applying downwardpressure with the thumb of one hand on the outside edge of the tool 300,the second hand is used to grasp and rotate the scribe handle 300 c withslight downward pressure to create a circular scratch of predeterminedtrajectory that permanently and irreversibly alters the media on thedata side of the disc. During this operation, the base portion 300 a isheld in a stationary position by downward thumb pressure and retentionby hub 308, and arm 300 b with attached scribe 300 c rotates about thebase hole 358. This operation causes scribe sharp 352 to scribe onlyselected portions of the surface of disk 302 in a predeterminedrepeatable way in a circular or other path that is located eccentricallyrelative to the center of the disk but which intersects substantiallyall information tracks the disk defines except at the disk periphery.Conventional disk reading technology will thus be able to automaticallyelectronically read the volume ID and first few tracks on the disk butthen fail to read the remaining (majority) of information tracks,thereby destroying the disk for playback use. The groove that scribesharp 352 traces in this example intersects most disk information tracksat least twice, making it difficult or impossible for datareconstruction algorithms to reconstruct a playback stream from theremaining data without significant degradation of quality andeffectively destroying most of the disk surface for useful contentplayback by most commercially available consumer playback devices.

FIG. 4M describes the completion of the media alteration of the disc.

FIG. 4N describes how the scribe arm 300 b is moved to facilitate theremoval of the tool 300 from the center hole ejection mechanism.

FIG. 4O describes the removal of the tool 300 from the center hold ofthe DVD or Blu-ray disc case 306.

FIG. 4p describes the removal of the altered DVD, CD, or Blu-ray disc302 from the case 306.

Example Non-Limiting Alteration

FIG. 5 depicts an example non-limiting signal path for reading data onan optical disc such as CD, DVD, BD. For this embodiment, the ECCprocessing engine [51] is highlighted.

FIG. 6 depicts several example non-limiting format details found withinthe prior art of the 32 KiB ECC block of an example DVD. Highlighted forthis particular example are the error correcting parity codes which arearranged in both row (PI) and column (PO) directions. The rows andcolumns of the ECC block are built with ECC symbols. Each symbolcomprises one byte of code data. ECC code data comprises both payload(2048 bytes user data per frame) and error correcting codes and otheroverhead data.

FIG. 7 shows an example of how inner parity (PI) is used within the ECCprocessing engine of the prior art to correct for row symbol errors. Ifa particular row is correctable, then there will be no PI failure forthat row. In the event that a row incurs a PI failure due to too manysymbol errors in the row, it is then passed on to the outer parityengine for further processing.

The FIG. 8 diagram shows an example from the prior art of how the outerparity engine (PO) is used for correction in the event that one or morerows in the ECC block were not correctable (PI event).

FIG. 9 illustrates an example processor for sensing and monitoringcorrected PI/PO event counts via a diagnostic software port [92]. Thisdiagram shows the diagnostic portal providing real-time parametric datafrom a PI/PO sensor module [91] associated with the ECC processingengine [51] during various disc playback modes, where user data isprocessed, and placed into a data buffer [52].

FIG. 10 shows an example from the prior art of how data can be processedduring playback from various locations on an optical disc. A DVD isshown in the example diagram as depicted in ECMA-267. A host device canaddress data on the optical device using a logical block address (LBA,not shown). Each 2 KiB data sector is assigned a logical address that ismapped to a physical sector number as shown in the diagram. The actionof sensing ECC parametric data can be done while a host device isperforming a playback operation in any of the various data zones on adisc. For example, the drawing shows a Data Zone, Lead-out Zone, Lead-inZone. In addition there may be other zones depending on the specificlayout of the disc, such as the Middle Zone of a dual layer DVD (notshown).

FIG. 11 shows a prior art example of how, in addition to reading backdata from any of the information zones, a burst cutting area can be usedas an alternate zone from which data can be read. For the particularembodiment shown in these several diagrams, an ECC engine will beprocessing data codes during playback and can therefore be monitored asa data sensor for that zone.

FIG. 12 shows example non-limiting actual PI/PO data [121] taken from aDVD drive during a readback operation in an LBA area of a DVD which hasbeen ‘flagged’ or marked for automatic detection. For this example, theflag is a micro sized scratch-like inclusion [181] placed at aparticular radius on a DVD disc. The inclusion partially perturbs thereadback data nearby the flag. Since a small portion of data will havebeen made inaccessible, or partially ‘destroyed’ nearby the flag, we canconsider the partial destruction to be possibly corrected fully by theECC engine[51]. The flag then appears in the data set as a once-per-revblip pattern of PI/PO correction events [121] associated with the ECCblocks affected by the flag. In between the correction events arepassages of ECC blocks requiring relatively little or no errorcorrection [131]. All ECC blocks shown exhibit the full user data setbeing recovered in any event. That is, the ECC engine [51] is able tocorrect for any naturally occurring errors (user damage) as well as anyinherent errors due to possible manufacturing defects, and also for thepermanent flag of this embodiment, and its related data which may bepartially destroyed to at least some fully recoverable extent. Theonce-per-rev pattern [121] has discernible characteristics which allowit to be distinguished from other noise-like patterns which may occurdue to other phenomenon such as scratches or disc mastering defects fromthe disc replication manufacturing process.

FIG. 13 shows an example non-limiting pattern of zero (or relativelylow) PI/PO error correction counts [131] over an area of a DVD discwhich has not been flagged with a license transaction mark. In thisdepiction one can clearly see the hallmark signs showing the presence ofa mark as shown in FIG. 12, or the lack of a mark as shown by therelatively lower PI/PO counts in FIG. 13. The signal detection algorithmwhich is looking for the presence of a license transaction flag can usecertain hallmark signs of a purposefully placed flag as shown in thisexample. A few hallmark signaling examples are presented here: 1).Once-per-rev PI/PO blip pattern [121]. 2). Pattern is located only atcertain LBA address ranges [122] and not at others. 3). An apriori knownnumber of flag marks may be required in certain logical or physicallocations [101] in order to claim positive detection of a flagged DVD.

It should be noted in the example embodiment that a flagged disc isfully playable, just as would be a non-flagged disc. Only the proposedsignal detection algorithm will take notice of the ECC correctionparametric events affected by the transaction flag. For other purposes(like normal playback of the disc in a player device) the flagging of adisc in this embodiment comprises a non-destructive event. The user willnot know that her disc has been flagged since she can still watch hermovie normally.

FIG. 14 shows background detail for example non-limiting numericalaperture optics found in a typical DVD device. A DVD red laser [141] isfocused to a target spot [145] by way of a lens [142] to the media layer[144] of an optical read-only disc [143]. Data is written into the medialayer [144] by way of placing pits and lands in a replication stampingprocess (not shown).

FIG. 15 also shows background detail for an example non-limiting methodused in re-writable DVD devices to write data into the Recording layer[151] of re-writable DVD media. Re-writable methods typically may uselaser power levels for writing data which may be higher than the powerapplied during the data readback process. This diagram depicts 15 mW asan example for the maximum laser power. The maximum power would bedependent on a number of considerations, comprising rotational speed,and recording media material, among other considerations.

FIG. 16 offers a suggested example non-limiting embodiment for anautomated flag writing process. As an example, the DVD writing laser[141] can be applied to the media layer [144] of a read-only disc toraise the local temperature of the media layer material (e.g. Aluminum)to a point that approaches the media material's melting point or beyond.In this embodiment, the DVD drive is momentarily instructed to bypasswrite-protect mechanisms for read-only media. In this example the flagwriting process aims to affect the reflectivity of the media layer onlyto an extent such that when read back, the corresponding ECC block datawill require PI/PO corrections which can be sensed via an ECC blockparametric sensor, or diagnostic port [92]. Such an automated processmay use laser power levels [162] beyond the normal levels which might beapplied to re-writable media. For this purpose, we can consider powerlevels higher than 15 mW, and even perhaps higher than 100 mW. Certainhigh speed rewritable DVD devices are known to use laser power levelswell above 100 mW for example when writing to recordable media atrelatively high rates of spindle rotation speeds. For the purpose ofthis embodiment we can consider using a relatively high power writelaser and/or relatively slower spindle rotational speeds to achieve thegoal of altering the read-only media's reflectivity characteristics inorder to induce purposefully placed, correctable error inclusionpatterns [171, 181, 191] to the ECC blocks of the pre-recorded medialayer [144] of replicated read-only discs. As shown in this and otherdiagrams, one or more license transaction flags can be placed at certainknown locations [101], where their presence, or lack thereof, can bereliably detected using the diagnostic port [92] of the ECC processingengine[91]. As shown, a mark pattern can be written using a relativelyhigh power burst of laser energy [161], burst onto the media layer foronly a relatively short period of time (shown in the diagram as ‘T’),with the intended purpose to alter only as much media material as isrequired in order to place a transaction flag, but in this embodimentnot so much as to render the media fully inoperable.

FIG. 17 shows an example non-limiting size, shape and location of alicense transaction flag [171]. In this drawing is shown a preferredembodiment mark location, written in a ‘safe’ zone—that is, outside ofthe data zone [172] (where the transport stream data of an audio-visualwork may be located) but nonetheless in a region where data patternswould be written together with their associated error correcting codedata. The example mark is shown to be several tracks in width to enablethe once-per-rev PI/PO pattern [121] previously mentioned whenmonitoring several revolutions of readback data nearby the expected marklocation. In addition, the example mark is depicted as spanning one ormore rows in a physical data frame, along the circumferential directionof a spiral track. In this embodiment, an example DVD row of 182 byteswill span a distance of approximately 0.4 mm along the arc of a spiraltrack. For illustration it can also be noted that a DVD track pitch istypically 0.74 microns. For illustration purposes only, the suggestedflag in this embodiment diagram might have the dimensions ofapproximately 1 mm in length [174] (spanning one or more rows), andseveral microns in width [175] (spanning one or more spiral tracks[176]).

FIG. 18 shows another example non-limiting embodiment providing anexample non-limiting transaction flag in the shape of a dot, or circle,located in the data zone of an optical disc [181]. Since the transactionflag is purposefully made to be a non-destructive mark, this exampleshows that placing the flag within a data zone [172] containingtransport stream user data can be a workable location for the proposedflag, while still maintaining full playback capability due to theaforementioned ECC PI/PO correction apparatus. For this embodiment, thespindle speed when writing the flag can be considered to operate at ornear zero rotational velocity, in which case the focused laser wouldcreate a beam shape in the form of a dot, or circle [181] on the medialayer.

FIG. 19 shows another example non-limiting embodiment where thetransaction flag is designed to span the width of only a single spiraltrack [191], located in a lead-out or middle zone [173]. For thisembodiment the writing laser is focused to a very narrow point [145]such that the localized heat dissipates readily, prior to the heattransferring to a neighboring data track while the spindle rotates,causing a narrow, line shaped mark pattern [191].

FIG. 20 shows another example non-limiting embodiment in which anupgrade transaction is processed and associated with a previouslyserialized media disc [201]. The serial number may be found for examplein the burst cutting area (as shown in the figure near the innerdiameter of the disc [202]). Once the consumer agrees to pay an upgradefee, a centralized server [203] is used to associate the serialized discwith the upgraded status, licensed to the consumer's account [204].

While the technology herein has been described in connection withexemplary illustrative non-limiting embodiments, the invention is not tobe limited by the disclosure. The invention is intended to be defined bythe claims and to cover all corresponding and equivalent arrangementswhether or not specifically disclosed herein.

We claim:
 1. A method for supporting a controlled transaction associatedwith content stored on replicated, read only, optical media comprisingelectronically identifying content stored on an original industrystandard replicated physical optical storage medium; electronicallydetermining if an owner or authorized intermediary of the identifiedcontent has authorized the content for a transaction; electronicallyinspecting the physical medium and identified content to confirm it isan original replicated read only optical media product and not a copy;electronically inspecting the original physical medium to detect thepresence of transaction flag(s) on the medium; electronically retrievingat least one policy governing the transaction including a pattern ofmedia alterations, the number of media alterations, and location ofmedia alterations to be placed onto the physical medium; if required bythe at least one policy, automatically disabling by placing mediumalterations into specific locations of the original physical medium thatdisable content stored on the original physical medium comprisingirreversibly obliterating at least part of a data portion of theoriginal physical medium, thereby disabling content stored on theoriginal physical medium; automatically, electronically verifying thecontent has been disabled; confirming that the disabled content isassociated with the original physical medium, and based on electronicverification and confirmation that at least a portion of the contentstored on the disc has been disabled, electronically engaging in atransaction associated with the content stored on the original,physical, optical storage medium from the owner of the identifiedcontent or an authorized intermediary thereof.
 2. The method of claim 1wherein verifying comprises verifying disablement by software inspectionof the medium.
 3. The method of claim 1 further including performingfurther disablement using a hand held tool.
 4. The method of claim 1wherein disabling is performed by physically scribing the medium torender at least a portion of the content is unusable.
 5. The method ofclaim 1 wherein disabling comprises using a powered device tosufficiently alter the medium to render a portion of the contentunusable.
 6. The method of claim 1 further including using softwarecommands to alter the function of an industry standard optical discdrive hardware thereby creating a new optical disc drive machine.
 7. Themethod of claim 1 further including altering media and disabling contentat any location on the storage medium including data and non datalocations by software command, irrespective of those locations beingdata tracks, sectors or any location that is accessible by the writinglaser.
 8. A method for supporting a controlled transaction associatedwith content stored on replicated optical storage media comprising:electronically identifying content stored on an original replicatedindustry standard physical optical storage medium; electronicallydetermining if an owner or authorized intermediary of the identifiedcontent has authorized the content for a transaction; electronicallyinspecting the physical medium and stored content to confirm it is anoriginal replicated optical medium product and not a copy;electronically inspecting the original physical medium to detect thepresence of transaction flags; electronically retrieving policiesgoverning the transaction including, but not limited to the pattern,number, and location of media alterations to be placed into the physicalmedium; if required by policy, electronically enabling the placement ofmedia alterations(s) onto the original physical medium comprising apowered fixture and writing mechanism to irreversibly alter dataportions of the original physical medium thereby permanently disablingcontent stored on the medium; automatically, electronically verifyingthe presence of disabled content and confirming the disabled content isassociated with the original physical medium; and based on electronicverification and confirmation, electronically engaging in a transactionassociated with the content stored on the original replicated opticalmedia product from the content owner or their authorized intermediary.