Downloading files from approved web site

ABSTRACT

A method and apparatus for insuring that a digital storage device will only be able to download or play files that were obtained from sources deemed by the manufacturer of the device or by an overseeing organization to be acceptable. The files are downloaded in an unencrypted from and then encrypted prior to storage in a memory. The stored encrypted files are unencrypted prior to being transferred from the memory to the digital storage device.

CROSS-REFERENCE TO RELATED APPLICATION AND CLAIM OF PRIORITY

This application makes reference to, incorporates the same herein, andclaims all benefits accruing under 35 U.S.C. §§119 from a provisionalapplication for Approved Web Site MP3 Downloading earlier filed under 35U.S.C. §111(b) in the United States Patent & Trademark Office on theJan. 5, 1999 and there duly assigned Ser. No. 60/114,958.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention generally relates to a process and apparatus forensuring that a digital storage device will only be able to download orplay files that were obtained from sources deemed by the manufacturer ofthe device, or by an overseeing organization, to be acceptable, and,more particularly, to processes and devices able to ensure that thedigital storage device does not download, play or display files thatwere obtained over the Internet from web sites that have not beenpre-approved by either the manufacturer of the device or by anoverseeing organization.

2. Description of the Related Art

With the growing popularity of using the Internet to transfer files in adigital format, there has been increasing concern over the need toprotect the intellectual property rights of individuals andorganizations to copyrighted materials such as books, music, movies andmanuscripts. Once copyrighted materials have been made available indigital format, high quality illegal copies of copyrighted materials canbe quickly and indiscriminately made available to others.

Several web sites currently make available for free distribution,unencrypted files of the contents of copyright materials such as booksand music. Several of these web sites are maintained with the fullconsent of the lawful owners of the copyrighted material, because somecopyright owners see this as a way to help promote and market theirproducts. On the other hand, there are other web sites that makeavailable copyrighted files without the consent of the rightful ownersof the copyright. Generally, it is desirable to allow web sites todistribute lawfully available copies of both unencrypted and encryptedfiles over the Internet to digital devices while concurrently preventingthese digital devices from being able to either play or downloadillegally available files. One technique that is currently used toaddress this problem uses encryption to allow only devices with theappropriate encryption key to decrypt a particular file; therefore, whenan encrypted file is downloaded from a web site, only the devices forwhich the file was intended are able to decrypt that file.

Existing encryption techniques are appropriate in the situation whereonly legal sources have access to specific copyrighted material andprecautions have been made to assure that whoever downloads thatmaterial can not subsequently distribute the material in an unencryptedformat for use, by way of example, on another device able to display,reproduce or play the copyrighted material. I have noticed however, thatexisting encryption methods do not solve the problem of protectingcopyrighted material from unlawful use or reproduction if thecopyrighted material is already available in the hands of those whowould make it available illegally; such is the case with music files,which are already widely distributed in digital format (i.e., compactdiscs, commonly known as “CD's”) making it easy for someone to illegallydistribute the musical content read from the disc over the Internet.

The fact that the digital content of a file, such as music, happens tobe encrypted does not mean that the digital content has been madeavailable with the consent of the rightful owners in the first place;therefore, encryption alone is not sufficient to address this problem ofprotecting copyrightable material.

SUMMARY OF THE INVENTION

It is therefore, one object of the present invention to provide improvedprocesses and apparatus for distribution of files via the Internet.

It is another object to provide processes and apparatus to allow websites to distribute lawfully available copies of both unencrypted andencrypted files over the Internet to digital devices, while concurrentlypreventing these digital devices from being able to either play ordownload files that are available illegally.

It is still another object to provide processes and apparatus that allowweb sites to distribute legally available unencrypted and encryptedfiles over the Internet while simultaneously preventing digital devicesfrom either playing or downloading illegally available files.

It is yet another object to provide a relatively efficient and foolproofsolution that, when incorporated into processes and apparatus during thepractice of the principles of the present invention, remedies theproblem of protecting copyrightable material from unlawful use,reproduction and distribution by ensuring that a digital storage devicewill only be able to download or play those files that were obtainedfrom approved sources.

Due to the open architecture of personal computers and the fact thatpersonal computers are currently not covered under the Digital AudioRecording Devices And Media Act, 17 U.S.C. §1001, et seq., it may bedifficult to restrict a personal computer from downloading illegallyavailable material; however, it is still possible from both a technicaland legal perspective to restrict non-personal computer digital devices(i.e., non-PC's) from downloading illegal material either directly fromthe Internet or from a personal computer. These and other objects may beattained by setting up an approved web site database with a personalcomputer that is equipped with software that encrypts only those filesthat are downloaded from web sites listed on that database. In turn, adigital storage device with a personal computer interface only downloadsthose files that have been appropriately encoded by the personalcomputer; alternatively, the digital storage device can be allowed todownload any file but not be allowed to play or display any downloadedfile. Similarly, non-PC digital devices with direct Internetconnectivity would be able to only download, play and display thosefiles downloaded from web sites on the Approved Website Database. Thepresent invention may therefore, be practiced regardless of whether thefiles that are made available on a web site are either in an encryptedor in an unencrypted format.

In the practice of this invention with unencrypted files, digitaldevices are only able to download files that were made available inunencrypted format with the permission of the rightful owners of thecopyrighted content of the material. The only action that is required bythe managers of web sites will be to submit their web site to anindustry committee as a legitimate source of files containingcopyrighted material. This web site is in turn placed on the ApprovedWeb Site Database and can be monitored for compliance with copyrightprotection laws. Those web sites that make available files without theconsent of the rightful owners of the copyrighted material in thosefiles would be denied listing on the Approved Website Database by theindustry committee.

When practiced with an encrypted file during downloading, the practiceof this invention ensures that web sites provide encrypted copyrightedmaterial with the consent of the rightful owners of that material. Thefact that a website happens to have the software necessary to encryptthe copyrighted material does not, by itself, necessarily mean that theweb site is making those files available over the Internet legally inthe first place. Proper maintenance of the Approved Web Site Databasecan serve as a way to ensure that digital devices are only able todownload encrypted files that were made available with the consent ofthe rightful owners of the material.

BRIEF DESCRIPTION OF THE DRAWINGS

A more complete appreciation of the invention, and many of the attendantadvantages thereof, will be readily apparent as the same becomes betterunderstood by reference to the following detailed description whenconsidered in conjunction with the accompanying drawings in which likereference symbols indicate the same or similar components, wherein:

FIG. 1 is a diagram that illustrates the components of one system thatmay be used in the

FIG. 2 is a flowchart of several of the steps that may be followed inorder to launch a software program on a personal computer by usingstandard web browser;

FIG. 3 is a flowchart of several of the steps that may be used in orderto encrypt music files that have been downloaded from a web Approved WebSite Database; and

FIG. 4 is a flowchart of one method for a digital storage device todownload, play and display encrypted files from a personal computer.practice of the principles of the present invention;

DETAILED DESCRIPTION OF TH INVENTION

Turning now to the drawings, FIG. 1 illustrates one system constructedas an Approved Web Site MP3 for downloading protectable material duringthe practice of the principles of the present invention. A centralserver 100 operationally coupled to transmit and receive communicationson the Internet 112, contains an Approved Web Site Database, which is alist of web sites maintained by a personal computer 114 that is deemedto be one of a plurality of acceptable sources that are authorized todownload via the modem 118 of computer 114, a file of a certain typefrom a server 116 to non-PC digital devices, such as digital storagedevice 120. Digital storage device 120 would, in turn, enable a consumerto use the downloaded material as, by way of example, listening to audiosounds and music and viewing video images that are contained within thedownloaded file, with speakers or earphones (not shown) and the videomonitor 122 of personal computer 114. Keyboard 124 enables the consumerto control personal computer 114 as well as to access the Internet 112via modem 118.

Digital storage device 120 contains a PC interface (not separatelyshown) that permits control and data communication between computer 114and device 120. Computer 114 loads from either an internal memory suchas its hard disk, or from an external source, software that is adherentto the specifications described in the following paragraphs, to maintaincopyright protection during and after the transfer of digital materialto non-PC Internet enabled digital storage devices 120, as well as todigital storage devices that are able to download copyrightable materialfrom the Internet 112 without the assistance of a PC 114.

Turning now to FIG. 2, before a user begins to download selected filesfrom Internet 112 onto a digital storage device 120 with a PC interfacevia a personal computer 114, the user first needs to load a softwareprogram (hereinafter sometimes referred to as the “Software Program”that is adherent to the specifications of this invention) from a memory130 onto the operating system of computer 114. The Software Programloaded from memory 130 can contain either its own web browser program orthe Software Program can be used in conjunction with another web browseralready stored in computer 114. If the Software Program is to be usedwith another web browser, the Software Program can either be stored in aplug-in module that works with the web browser or the Software Programcan configure the web browser so that the Software Program is thedefault executable program that is run whenever a user opens a file ofthe type that this system will be protecting (e.g., MP3).

As illustrated by FIG. 2, to implementing the latter approach, afterstarting the Software Program in step 200, in step 204 the user clicks amouse selector button (not shown) or a keyboard designator to select awebsite link, and to select and to download specific files desired bythe user. The Software Program gives the user an option in step 206 toeither save or to open the selected downloaded file. Designation by theuser of an election to save the selected file, triggers the SoftwareProgram to download the selected file from server 116 without firstencrypting the selected file. Alternatively, designation by the user ofan election to open the selected file triggers the Software Program toopen the downloaded file and, in step 210, launch a program for playingthe contents of the opened file. As illustrated in the FIG. 2, theSoftware Program may be implemented with either a plug-in or proprietaryweb browser, in much the same way. Accordingly, the Figures use a webbrowser as an illustrative example of an implementation of theprinciples of the present invention.

FIGS. 2 and 3 illustrate the steps of the process for downloading aselected file from server 116. The web browser launches the program instep 210 when a user is using the web browser on personal computer 114to visit a web site (e.g., a web site maintained by a server 116) thateither accesses another server (not shown) or itself contains files thatthe user wishes to selectively download. In step 204, the userdesignates a file that he has selected by clicking (i.e., selecting viaeither a mouse selector button or a designated key of keyboard 124) onthe file that the user wishes to download and then, in step 208, thebrowser prompts the user to indicate whether the user wishes to eitheropen the selected file or to save the selected file. In order to be ableto download or play the file on his digital storage device, the usermust launch the Software Program during step 210, which, in this case,means that the user must choose the “open file” option in reply to thequery from the browser during step 206.

When the Software Program is launched in step 210, in step 214 theSoftware Program retrieves the IP address of the server 116 that storesthe file that has been selected by the user to be downloaded, and duringstep 216 the Software Program then sends a query to central server 100to determine whether the IP address for server 116 is listed on theApproved Web Site Database. If the server 116 storing the file that wasselected by the user to be downloaded is in the Approved Web SiteDatabase maintained by central server 100, during step 332 the SoftwareProgram begins downloading the selected file from server 116.

Either before, during or after the selected file is downloaded to thehard drive (not separately shown) or other memory of computer 114,during step 224 central server 100 prompts the Software Program to sendinformation that is specific to computer 114 and the selected file tocentral server 100, together with encryption information and other data,preferably over a secure connection. In response to the prompt, centralserver 100 stores and then uses this information, together with theother data that it receives from the Software Program running incomputer 114, to assembly and transmit in step 228, unique encodinginformation back to the Software Program, so that the Software Programmay, during step 240, use that encoding information to encrypt the filebeing downloaded, by using an encryption key unique to computer 114 andselected file being downloaded. Alternatively, the Software Program mayencrypt the selected file and generate an encryption key withoutreceiving the encoding information from the central server 100. TheSoftware Program may either begin the process of encrypting the selectedfile as the selected file is being downloaded, or alternatively, theSoftware Program may wait until the selected file has been completelydownloaded and, during step 232, stored in a hidden directory in thehard drive, or other memory of computer 114, and then, during step 240,begin the process of encrypting the selected file within computer 114.Once the selected file has been downloaded, during step 244 the SoftwareProgram opens a new window on the screen 122 of the monitor in order todisplay information such as, by way of example title, file name and thesize of the file, that corresponds to the selected file.

When the inquiry to central server 100 initiated in step 216 determinesthat the web site (e.g., a web site accessed by server 116 or a web sitemaintained by computer 114) is not listed among the web sites on theApproved Web Site Database, during step 220 the Software Programprovides the user with an option in step 248 that may be displayed onscreen 122, to either download the selected file in an unencryptedformat, or to not download the selected file. If the user selects to notreceive the selected file in an unencrypted format, the Software Programterminates. If the user indicates a desire to receive the selected filein an unencrypted format, the Software Program downloads the selectedfile to a folder chosen by the user during step 252.

The user needs to use the Software Program to download the selected filefrom personal computer 114 to a digital storage device 120 that iscompliant with the specifications of this protocol because digitalstorage device 120 is configured to only play or display files that havebeen appropriately encoded by the Software Program.

FIG. 4 illustrates the steps by which digital storage device 120 is ableto download encrypted files from personal computer 114. In step 256, theuser launches the program on personal computer 114. Then, in step 260,the user connects a digital storage device 120 to computer 114, andselects the particular desired file that the user wishes to downloadfrom computer 114. During step 264, the Software Program checks todetermine whether the digital storage device 120 has been installed. Ifthe determination establishes that device 120 has not been installed,the Program displays a message on screen 122 during step 268, statingthat digital storage device 120 has not been yet initiated, andterminates the download algorithm. If the determination establishes thatdigital storage device 120 has been installed however, during step 272digital storage device 120 downloads the selected file and thecorresponding encryption information from computer 114.

Subsequently, the user may activate device 120 in order to either playor display the selected file during step 276. Once the user activatesdevice 120 to either play or display the selected file, during step 280device 120 employs the encryption key in order to check whether the filehas been properly encoded. If during step 284 the determination is madethat the selected file has been properly encoded, device 120 thendecrypts and either plays or displays the file selected by the userduring step 292. Alternatively however, if during step 284 adetermination is made that the file has not been properly encoded,digital storage device 120 alerts the user and neither plays nordisplays the selected file, but terminates the algorithm.

In order that digital storage devices 120 are able to play or displayfiles that have been obtained from sources other than the Internet, theSoftware Program may be used by the user to encrypt those files as well.For example, in the case when it is determined to be appropriate to copythe contents of a compact disk onto the hard drive, or other memory of apersonal computer 114 for later copying onto a digital audio storagedevice, for example, the Software Program may be used to appropriatelyencrypt the music tracks from the compact disk so that only thatparticular personal computer 114 and the digital storage devices 120downloading the contents directly from that specific computer 114 willbe able to play music from that specific compact disk. As an addedmeasure of security, the Software Program may require that computer 114be connected to the Internet and be able to access encryption codinginformation from the central server 100 so that the Software Program canuse the encryption coding information from the central server to encodethe selected file and to generate an encryption key.

The steps used to implement this process for Internet enabled digitalstorage devices are similar to those used for digital storage deviceswith personal computer interfaces, except that the Internet enableddigital storage devices do not require a personal computer in order toaccess files from the Internet. As such, the Software Program is loadedon the Internet enabled digital storage device instead of onto apersonal computer. Additionally, when downloading a file of a certaintype from the Internet, the enabled digital storage device mayalternatively configured so that it will only be able to download filesfrom web sites on the Approved Web Site Database, whereas the personalcomputer 114 is able to bypass the Soft download files from source. Itis important to note however, that even when using a personal computer114, a digital device 120 with a personal computer interface that iscompliant with the specifications of this invention is not able tobypass these copyright protection mechanisms.

A digital content encryption apparatus deigned to restrict the sourcesfrom which a digital storage device will play or display digitalcontent, with an Approved Web Site Database which contains a list of theweb sites which are determined to be appropriate sources of files of acertain type for digital storage devices adherent to the specificationdescribed in this invention. A Central Server connected to the Interneton which the Approved Web Site Database is stored that performs thefollowing functions: when prompted by the Software Program located on aPC or Internet enabled digital storage device, performs query search todetermine whether a submitted IP address is on the Approved Web SiteDatabase; when it is found that the IP address is on the Approved WebSite Database, generates encryption key/encoding information that isunique to the file being downloaded and the device to which it is beingdownloaded and transmits it to the Software Program; and transmitsunique encryption key/encoding, information to the Software Program whenthe Software Program requests one for the purpose of encoding digitalcontent that is being copied from a media storage peripheral device ontothe device's own digital storage memory.

A Software Program located on a PC that performs the followingfunctions: identifies the IP address from which a file is beingdownloaded; sends a query to the Central Server to determine whether anIP address is on the Approved Web Site Database; retrieves encryptionkey from Central Server when the IP address is on the Approved Web SiteDatabase; encrypts the downloaded file on its own or using theencryption key provided by the Central Server 100; requests uniqueencryption code/key from Central Server and/or generates own encryptionkey for the purpose of encrypting digital content being copied from a PCperipheral onto the PC's hard drive; and initializes a Digital StorageDevice so that the Digital Storage Device is able to download andplay/display encrypted files downloaded from the PC.

A Digital Storage Device 120 with a PC interface that is adherent tothis protocol, performs the following functions: connects to PC so thatit can be initialized by the Software Program; allows the SoftwareProgram to retrieve information of files that it stores; allows the userto download files to it through the user interface of the PC SoftwareProgram; retrieves encryption key from the Software Program for filesthat it downloads; only plays or displays files that are appropriatelyencrypted; does not play or display files that are sent to it inunencrypted format; and does not provide other devices with access toits encryption key information.

The Software Program could also be located on an Internet enableddigital storage device 120 that performs the following functions:identifies the IP address from which a file is being downloaded; sends aquery to the central server 100 to determine whether an IP address is onthe Approved Web Site Database; retrieves encryption key/codeinformation from central server 100 when the IP address is on theApproved Web Site Database; encrypts the downloaded file using theencryption key provided by the central server 100; only plays ordisplays files that are appropriately encrypted; does not play ordisplay files that are sent to it in unencrypted format; and does notprovide other devices with access to its encryption key information.

The foregoing paragraphs describe a workable solution that is relativelyefficient and foolproof when incorporated into processes and apparatusduring the practice of the principles of the present invention, remedythe problem of protecting copyrightable material from unlawful use,reproduction and distribution by ensuring that a digital storage devicewill only be able to download or play those files that were obtainedfrom sources deemed either by the manufacturer of the device, or by anoverseeing organization, to be acceptable. This ensures that theseprocesses and digital storage devices do not download, play or displayfiles that were obtained over the Internet from web sites that have notbeen pre-approved by either the manufacturer of the device or by anoverseeing organization.

What is claimed is:
 1. A method comprising: receiving a command from auser to download at least one file from a selected web site, receiving acommand from the user to either save the at least one file as is or openthe at least one file; retrieving an address of the selected web site inresponse to the command from the user to open the at least one file;forwarding a query to at least one server to determine if the retrievedaddress is within an approved web site database; notifying the user thatthe selected web site is not within the approved web site database upona determination that the selected web site is not within the approvedweb site database and downloading the at least one file in anunencrypted format in response to a command from the user to downloadthe at least one file in an unencrypted format to a selected folder ofthe user; forwarding user information and information with regard to theat least one file to the at least one server upon a determination thatthe selected web site is within the approved web site database, andreceiving encryption information from the at least one server inresponse thereto, the user downloading the at least one file in anunencrypted format from the selected web site and converting the atleast one file to an encrypted format in accordance with the encryptioninformation from the at least one server; and storing the at least onefile in the encrypted format.
 2. The method of claim 1, furthercomprising: downloading and saving the at least one file as is in anunencrypted format upon a command from the user to save the at least onefile as is.
 3. The method of claim 1, further comprising: receiving acommand from the user to at least one of either play or display the atleast one file stored in the encrypted format; retrieving the at leastone file stored in the encrypted format and decrypting the at least onefile stored in the encrypted format with a previously stored encryptionkey in response to the user to at least one of either play or displaythe at least one file stored in the encrypted format; and playing ordisplaying to the user the now decrypted at least one file.
 4. Themethod of claim 1, wherein the address of the selected web sitecomprises an Internet address of the selected web site.
 5. The method ofclaim 2, further comprising transferring the at least one file as is inan unencrypted format to a digital storage device.
 6. The method ofclaim 3, further comprising transferring the now decrypted at least onefile to a digital storage device prior to playing or displaying to theuser the now decrypted at least one file.
 7. The method of claim 1,further comprising previously storing the approved web site database onthe at least one server.
 8. The method of claim 1, further comprisingreceiving a file from an external source and encrypting the receivedfile from the external source into an encrypted format prior to storingthe file.
 9. The method of claim 8, further comprising: receiving acommand from the user to at least one of either play or display the atleast one file stored in the-encrypted format; retrieving the at leastone file stored in the encrypted format and decrypting the at least onefile stored in the encrypted format with a previously stored encryptionkey in response to the user to at least one of either play or displaythe at least one file stored in the encrypted format; and playing ordisplaying to the user the now decrypted at least one file.
 10. Themethod of claim 9, further comprising transferring the now decrypted atleast one file to a digital storage device prior to playing ordisplaying to the user the now decrypted at least one file.
 11. Anapparatus comprising: at least one server; a computer including: atleast one user input device adapted to receive an input from a user; atleast one of a display and an audio output device adapted torespectively display or provide an audio output in response to data of afile; and a memory adapted to store files; a digital storage deviceadapted to be connected to the computer to receive files therefrom; anda network interface adapted to be connected to the computer to receivefiles from the at least one server via a network; wherein, upon thecomputer receiving a command from the user via the at least one userinput device to download at least one file from a selected web site andto either save the at least one file as is or open the at least onefile, the computer retrieves the address of the selected web site inresponse to the command from the user to open the at least one file;wherein, upon the computer retrieving the address, the computer forwardsa query to the at least one server via the network and a network adapterto determine if the retrieved address is within an approved web sitedatabase; wherein, the computer notifies the user that the selected website is not within the approved web site database upon a determinationthat the selected web site is not within the approved web site databaseand downloads the at least one file in an unencrypted format in responseto a command from the user to download the at least one file in anunencrypted format to a selected folder of the user; wherein, thecomputer forwards user information and information with regard to the atleast one file to the at least one server upon a determination that theselected web site is within the approved web site database, and receivesencryption information from the at least one server in response thereto;wherein, the computer downloads the at least one file in an unencryptedformat from the selected web site and converts the at least one file toan encrypted format in accordance with the encryption information fromthe at least one server; and wherein the computer stores the at leastone file in the encrypted format in the memory of the computer.
 12. Theapparatus of claim 11, wherein the computer downloads and saves the atleast one file as is in an unencrypted format upon a command from theuser to save the at least one file as is.
 13. The apparatus of claim 11,wherein the computer: upon receiving a command from the user via the atleast one user input device to at least one of either play or displaythe at least one file stored in the memory in the encrypted format,retrieves the at least one file stored in the memory in the encryptedformat and decrypts the at least one file stored in the encrypted formatwith a previously stored encryption key in response to the user to atleast one of either play or display the at least one file stored in thememory in the encrypted format; and plays or displays to the user thenow decrypted at least one file.
 14. The apparatus of claim 13, whereinthe computer transfers the at least one stored now decrypted file fromthe memory to the digital storage device.
 15. The apparatus of claim 12,wherein the computer transfers the unencrypted at least one stored filefrom the memory to the digital storage device.
 16. The apparatus ofclaim 11, wherein the address of the selected web site comprises anInternet address of the selected web site.
 17. The apparatus of claim12, wherein the computer transfers the at least one file as is in anunencrypted format stored in the memory to a digital storage device. 18.The apparatus of claim 12, wherein the computer transfers the nowdecrypted at least one file stored in the memory to a digital storagedevice prior to playing or displaying to the user the now decrypted atleast one file.
 19. The apparatus of claim 11, wherein the at least oneserver stores the approved web site database therein.
 20. The apparatusof claim 11, wherein the computer is adapted to receive a file from anexternal source and to encrypt the received file from the externalsource into an encrypted format prior to storing the file.
 21. Theapparatus of claim 20, wherein the computer: receives a command from theuser to at least one of either play or display the at least one filestored in the encrypted format; retrieves the at least one file storedin the encrypted format and decrypt the at least one file stored in theencrypted format with a previously stored encryption key in response tothe user to at least one of either play or display the at least one filestored in the encrypted format; and plays or displays to the user thenow decrypted at least one file.
 22. The apparatus of claim 21, whereinthe computer transfers the now decrypted at least one file stored in thememory to a digital storage device prior to playing or displaying to theuser the now decrypted at least one file.