US20100287070A1 - Digital content management, playback and delivery - Google Patents

Digital content management, playback and delivery Download PDF

Info

Publication number
US20100287070A1
US20100287070A1 US12/767,955 US76795510A US2010287070A1 US 20100287070 A1 US20100287070 A1 US 20100287070A1 US 76795510 A US76795510 A US 76795510A US 2010287070 A1 US2010287070 A1 US 2010287070A1
Authority
US
United States
Prior art keywords
user
digital content
server
database
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/767,955
Inventor
Michael N. Santeufemia
Christopher John Moulios
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US12/767,955 priority Critical patent/US20100287070A1/en
Publication of US20100287070A1 publication Critical patent/US20100287070A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0603Catalogue ordering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0621Item configuration or customization

Definitions

  • the present invention pertains to an improved method, software and system for managing, sharing and distributing electronic information and particularly electronic files including adult digital content.
  • the present invention meets one or more of the above needs by providing an electronic information system comprising at least one user interface adapted for interaction with a user; at least one database associated with a server that is remotely accessible by the user, the database comprising adult digital content; and a network for providing remote access to the at least one database by the user to enable downloading of the adult digital content.
  • the software and method of the present invention further contemplates a method for accessing adult content electronic information, comprising the steps of providing a user interface to a user over a network; maintaining a database of adult digital content; granting access to the user to the database for allowing the user to sample the adult digital content and select content for downloading by the user to a storage medium; and transferring the digital content to the user for downloading by the user, and any possible viewing by the user, particularly at the user's convenience.
  • FIGS. 1 and 2 are schematic block diagrams illustrating possible systems of the present invention.
  • FIGS. 3A-17 are either flow diagrams or sample interfaces illustrating various methodologies that may be employed in accordance with the present invention.
  • a “network” shall include any one or more networks that covers any geographical area, such as a local area network, wide area network, regional network, global network (e.g., The World Wide Web or Internet) or any combination thereof.
  • Networks may be hardwired (e.g., via conductive wire, fiber optics or otherwise), wireless (e.g., via electromagnetic radiation such as used in cellular systems, or other personal or satellite communication systems), or a combination thereof.
  • a “website” typically refers to one or more files or other digital information maintained on one or more computers, such as web servers, and being accessible over a network, such as the Internet, via suitable protocol.
  • a file might be accessed by sending a message with a suitable internet protocol, such as hypertext transfer protocol (HTTP) request that recites a uniform resource locator (URL) where a file or other digital content is located or otherwise managed.
  • HTTP hypertext transfer protocol
  • URL uniform resource locator
  • files and content can include, for example, hypertext markup language (HTML) files, common gateway interface (CGI) files, Java applications, or otherwise.
  • a website typically will include a home page to provide access to the files and content maintained within the website, such as at web pages (which typically will include, for example, video recordings, photographs, audio recordings, animations, text, spreadsheets, presentations or any combination thereof, any or all of which may be static, dynamic or a combination thereof).
  • web pages which typically will include, for example, video recordings, photographs, audio recordings, animations, text, spreadsheets, presentations or any combination thereof, any or all of which may be static, dynamic or a combination thereof).
  • “Adult digital content” as used herein shall refer to files, links, or other electronic information providing a user with embody video recordings, photographs, audio recordings, animations, text, spreadsheets, presentations, any combination thereof, or other depictions that pertain generally to subject matter considered appropriate for observation by persons having a mature emotional development.
  • Adult digital content thus may encompass graphic depictions of acts of physical violence, one or more adults engaging in acts of self gratification, consensual acts of explicit sexual activity, or both, at least partially unclothed models, subject matter for which the Motion Picture Association of America would deem inappropriate for viewing by persons under 17 years of age (e.g., R or NR ratings, or a television TV MA rating), crude indecent language or any combination thereof.
  • Computers herein shall refer to any processor controlled device that permits access to a network, such as the Internet, including for example personal computers (whether desktop, mobile or other), workstations, servers, networks of individual computers, hand-held devices (e.g., personal digital assistants), set top boxes for viewing appliances, interactive kiosks, web-enabled wireless communications devices, mobile web browsers, or any combination thereof.
  • These computers will typically include or be in operational communication with a suitable addressable storage medium or computer accessible medium, such as one or more memories selected from a random access memory (RAM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electronically erasable programmable read-only memory (EEPROM), or any combination thereof.
  • RAM random access memory
  • PROM programmable read-only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electronically erasable programmable read-only memory
  • Memory may be comprised in any suitable storage device such as a hard disk, a floppy disk, a DVD, a CD, a magnetic recording tape, an optical recording device, a memory card, a memory stick, a flash storage medium, a memory key device, or any combination thereof.
  • a hard disk such as a hard disk, a floppy disk, a DVD, a CD, a magnetic recording tape, an optical recording device, a memory card, a memory stick, a flash storage medium, a memory key device, or any combination thereof.
  • the computers are equipped with a network communication device such as a modem, a network or other interface card, or other network connection device.
  • the computers execute any appropriate operating system, which itself may include a suitable communications protocol for messaging over the Internet.
  • the operating system may also provide appropriate communications protocols to establish communication links with the Internet.
  • the computers generally will contain program logic or the like for representing data and instructions to govern computer operation.
  • the program logic may be implemented as one or more object frameworks or modules that reside on an addressable storage medium and execute on at least one processor.
  • the frameworks or modules may include components such as hardware and/or software components, object-oriented software components, class components, task components, drivers, firmware, microcode, circuitry, segments of program code or any other subject matter for processing procedures, subroutines, functions, attributes, data, databases, data structures, tables, arrays, variables, or any combination thereof.
  • one illustrative system 10 of the present invention includes a user component 12 , a content provider (which may be a content originator) component 14 , and a network website component 16 .
  • the user component 12 will typically include at least one computer 18 , which has a display screen 20 .
  • the computer itself might be a portable (e.g., handheld) media player or, as in FIG. 1 , it may be another type of computer and include an optional portable (e.g., handheld) media player 22 that is be signally connectable with the computer for synchronizing the content of the portable media player 22 with the content of the computer 18 .
  • a user will be able to enter commands and information into the computer 18 through one or more suitable input devices such as keyboard, pointing device, touch screen or any combination thereof.
  • suitable input devices may include (without limitation) a joystick, microphone, camera, fax device, game controls, scanner, bar code reader, radiofrequency identification device transponder, any combination thereof or the like.
  • These and other input devices are often connected to the computer through an interface, such as a serial port interface coupled to a system bus, but may be connected by other interfaces, such as a parallel port, game port, or a universal serial bus (USB).
  • USB universal serial bus
  • One or more display devices 24 may also be associated with the user component 12 , via the computer, the portable media player or both, pursuant to which the user will be able to interact with one or more user interfaces.
  • the graphical display device there may be other peripheral output devices such as speakers, printers or otherwise.
  • the computer will be signally connected (hardwired, by wireless, or a combination thereof) to a network (e.g., the Internet) through a suitable network interface, adapter, a modem, or other means for establishing communications, over the network.
  • the network website component, the content provider component, or a combination of the two typically will include at least one server computer that is also signally connected (hardwired, by wireless, or a combination thereof) to the network (e.g., the Internet) through a suitable network interface, adapter, a modem, or other means for establishing communications, over the network.
  • the network e.g., the Internet
  • a user can remotely access, view, and/or manage adult digital content maintained at the network website component, the content provider component, or a combination of the two, from a computer of the user component, and shall be able to download files or link to files that are stored at the network website component, the content provider component, or a combination of the two.
  • One attractive benefit of the present invention resides in its feature of providing an approach for searching a plurality of adult digital content resources on a network such as the Internet with as little as one search query or menu selection made by a user.
  • the network website component advantageously maintains (and optionally periodically updates) a database of adult digital content available from numerous content providers on the network (whether simultaneously or selectively based upon user selection criteria) and provides a method for acquiring the content, viewing it and/or managing it.
  • the present invention thus provides “one-stop” shopping for the user, and avoids the hassles common to users from the nuances of accessing, searching and retrieving information via various non-uniform methods currently employed in the adult digital content field.
  • the user may, with a single search, acquire a comprehensive list of available resources on a desired adult digital content topic.
  • the user may then access the adult digital content directly through a “seamless” interface, purchase the right to download the adult digital content, download the adult digital content, view the adult digital content and optionally transfer the adult digital content to a suitable storage medium such as disclosed above (e.g., a handheld or other portable media player, a DVD, a CD or the like), enabling the user to view the adult digital content at the convenience of the user.
  • a suitable storage medium such as disclosed above (e.g., a handheld or other portable media player, a DVD, a CD or the like), enabling the user to view the adult digital content at the convenience of the user.
  • the databases of the present invention are typically maintained in the network component (e.g., via at least one computer server associated with the network component), but may also have sub-components maintained by a content provider, by a user or both.
  • the databases may be of any suitable architecture, whether object based, relation based, a combination thereof or otherwise.
  • the databases herein contemplate not only a single database, but may include plural databases maintained at the same or at remote locations relative to each other, but which are accessible to a user.
  • the database may include entire files, portions of files, links to files or other information. Thus it is possible that files will remain stored on a server controlled by a content provider and the website of the present invention is used merely as a portal for access to the content provider.
  • the database may include one or a plurality of tables, and may be searchable by topic, key word, text (e.g., Boolean or free form), file directory display, links, menu (e.g., dropdown menu) any combination thereof or otherwise.
  • the network component host will offer a storefront to enable purchase of a variety of goods via the network, such goods being offered for sale either by the network component host, a third party vendor, a combination thereof or otherwise, and thus available for shipment via courier (e.g., postal service, express courier or otherwise).
  • goods may include, without limitation, cameras, clothing, toys, novelty items, magazines, books, home appliances, portable media players, other electronic devices, health and beauty aids, dietary supplements, combinations thereof or otherwise.
  • services include adult entertainment, escort services, or the like.
  • the network component of the present invention shall function to interact with information provided by a user and perform the steps of creating a new user (if a first time user is detected) or authenticating a prior user logging in with a unique identifier (e.g., a password, with an option to send such user a reminder if the identifier is forgotten or misplaced, such as a password reminder email message); providing at least one user interface page; providing the user one or more options for searching; retrieving search results from at least one data base and providing the results to the user; and offering the user an opportunity to acquire a download of a file based upon the search results.
  • a unique identifier e.g., a password, with an option to send such user a reminder if the identifier is forgotten or misplaced, such as a password reminder email message
  • a user may be provided with a thumbnail image or other depiction representative of one or more available files.
  • a user may select such file for downloading based upon the depiction.
  • the user is provided with more detailed summary information about the clip, an opportunity to view at least a portion of the file or a combination thereof.
  • the method and system of the present invention contemplates consummating a transaction that includes the user purchasing a right to download the file.
  • the user may optionally also be provided with a display of the user's history of viewing selections, downloads or both, with the ability to access such selections, downloads or both for further viewing.
  • the user component of the invention typically will be constructed to perform the steps of browsing directories provided by at least one network component server, establishing a secure connection via a network, optionally affording anonymity for a user, creating individualized or local directories on a user computer; cataloging files on a user computer; downloading files; creating file links; deleting files; organizing files; consummating a sales transaction to purchase rights to access or download a file, to purchase goods via a virtual storefront provided by a network component server, or both; synchronizing with another device (e.g., as with other handheld embodiments herein, a handheld or other portable media player having suitable memory capacity (such as at least 10 gigabytes, 20 gigabytes, or even 50 gigabytes or more), examples of which (without limitation) include the LYRATM device from RCA, the Archos AV300 series, a Microsoft Portable Media Center, or the like) or any combination of the foregoing.
  • a handheld or other portable media player having suitable memory capacity (such as at least 10 gigabytes
  • files shall include a plurality of files (if necessary to complete an entire work), and may also contemplate portions of files.
  • File format is not critical. They may be compressed or streaming. In one particular and generally surprising approach, however, MPEG-1 files are employed, even though it is recognized that more modern formats are available and may suitably be employed.
  • Files can be encrypted or not, and commonly will have unique identifier associated with them for permitting access and retrieval. Files will typically include previously recorded adult digital content, but may also include simulcast content. Files may be transmitted in any suitable manner.
  • use of the present invention generally will include a payment requirement to the network website host.
  • a user will be able to purchase a subscription (whether for an initial fee, a periodic fee, a combination thereof or otherwise), which will entitle the user to a predetermined amount of database access, downloads, access time, any combination thereof or otherwise.
  • a user might be able to purchase access, downloads, time, any combination thereof or otherwise on an “as needed” basis (e.g., by paying a fee based upon time of download, size of file, numbers of files, or any combination thereof). Combinations of the above are also contemplated.
  • users will be offered at least partially free use of the present invention by the network website host. In the latter instance, it is also likely that a content provider will require payment by the user.
  • the invention also contemplates providing an approach to establishing a customer account for consummating transactions, with an option to store identifiying information, credit card information or other information.
  • a user can maintain a balance of money or other credit into an account and subsequently debit against the account balance.
  • the user also can have the option of paying for each individual transaction by providing credit or debit card information at the time of transaction. Any combination of the above is also possible.
  • EFT Electronic Funds Transfer
  • ACH Automated Clearing House
  • FIG. 2 provides a more elaborate illustration of one possible embodiment for the architecture of a system according to the present invention. Methods for use of such a system and others within the scope of the present invention are also described in further detail with reference to the accompanying FIGS. 3A-7B .
  • FIG. 3A illustrates a method by which first time users, users without an existing account or other users are granted access to adult digital content.
  • a user will be presented with a terms and conditions of use agreement, such as shown in the screen of FIG. 3B . If the user does not agree, operation will cease, and no access will be granted. If the user agrees, a next step 302 provides the user with an interface for inputting personal information, such as in FIG. 3C .
  • FIG. 3D illustrates an example of a homepage associated with a website for use of the method and system of the present invention (which itself may including one or more links, directories or the like for facilitating navigation).
  • a server of the network component will verify whether user information is valid and authorized, such as by confirming with a credit card company (step 304 ). Of course if steps 303 or 304 show the user as not authorized, operation will cease, and no access will be granted. Assuming the user is authorized, a step 305 contemplates further activity by a server of the network component toward granting access to the site, and will typically include a step of displaying another interactive interface for the user, such as by providing at least one storefront interface page.
  • the steps of FIG. 3A (as well as that of FIG. 4A addressed below) could also include one or more additional steps such as offering a user a function of remembering a password, establishing one or more accounts, referring others to the site, offering discounts or coupons, or the like.
  • FIG. 4A illustrates a sequence of steps that might be employed to grant access to previous users having a login identifier.
  • an initial step 401 the user is presented with a screen, such as that in FIG. 4B , which allows the user to log into the site.
  • a comparison step 402 user input is compared with data stored by the network component to assure authenticity.
  • One approach may include a step 403 by which if a user makes repeated unsuccessful efforts to log into the site, operation will cease, and no access will be granted.
  • a step 404 contemplates further activity by a server of the network component toward granting access to the site, and will typically include a step of displaying another interactive interface for the user, such as by providing at least one storefront interface page.
  • FIG. 5A per step 501 a user is presented with at least one storefront interface page by which the user is presented with content that the user can review, purchase rights to download, download or any combination thereof.
  • FIG. 5B illustrates one example of such an interface, which could include one or more menus, directories, thumbnail images, enlarged images, tool bars (e.g., to facilitate navigation through the site, to facilitate downloading, to facilitate purchases or any combination thereof), searching tools, merchandise displays, or any combination thereof.
  • the user When using the storefront interface, the user thus will be offered one or more of the ability to perform a selection step 502 of whether to view such as per 502 ′ to download as per 502 ′′ or both; to perform a viewing step 503 (which if selected will trigger a network component server, such as per step 503 ′; to obtain and play the clip, present summary information about the clip, a combination thereof or otherwise); to perform a searching step 504 (which if selected will trigger a network component server, such as per step 504 ′ to afford access to one or more databases for searching); perform a downloading step 505 (which if selected will trigger a network component server, such as per step 505 ′ to obtain a file and present it to the user for downloading, optionally with or without a thumbnail icon (such as per step 505 ′′), and optionally with a step (such as per step 505 ′′) of adding information about the selection to a catalog); to perform a selection step 506 from a provided list, which optionally may be a catalog list
  • FIG. 6A there is illustrated an operation for viewing adult digital content by the user.
  • a digital media player is offered to the user, for local viewing by the user, or by a server of the network component.
  • An example of an interface a user might obtain upon accessing such a player is shown in FIG. 6B .
  • such interface may include buttons and controls and a suitable viewing screen for the media.
  • a user is then provided with options for operating the player. For example, a user may employ a step 603 “double clicking an entry in the list” to start playback of the media (step 603 ′). Or by accessing the transport controls as in step 604 , (e.g., forward, rewind, play, record, stop, pause or the like are accessed), the media player component is forwarded the appropriate command message as documented in step 605 .
  • FIG. 7A there is illustrated a possible approach for facilitating the archiving of an adult digital content file onto CD-R or DVD-R or other storage mediums in accordance with the present invention.
  • a user is again provided a step 701 of choosing whether the user wishes to change modes and view videos such as per 701 ′ or return for additional shopping to another storefront interface such as per step 701 ′′.
  • steps of changing a mode of operation of the system such as the above steps 502 , 603 and 701 (and any other like step discussed herein) might be manifested through a tool bar, icon or other functional navigation tool, which may be always present, thus enabling the user to escape an operation by selecting that tool.
  • the user may then be afforded options for adding (step 702 ) a selection to a list for archiving (in which case the selection is added (step 702 ′), removing (step 703 ) a selection from a list for burning (in which case the selection is removed (step 703 ′), or both.
  • adding step 702
  • removing step 703
  • a selection from a list for burning in which case the selection is removed (step 703 ′)
  • a plurality of selections may be added to the burn list in a single step.
  • step 704 Upon completing a list, or an individual selection (as the case may be) the user will then perform a command (step 704 ) to cause the system to start the process of “burning” a disc or otherwise initiating the archival process (step 705 ) from the selection or list of selections to a location designated by the user.
  • a command to cause the system to start the process of “burning” a disc or otherwise initiating the archival process (step 705 ) from the selection or list of selections to a location designated by the user.
  • step 705 is an example interface.
  • FIGS. 8-17 illustrate steps that a server associated with a network component of the present invention might employ combinations of any two or more of the steps of creating a session, creating a new user, authenticating a user login, sending a password reminder, returning a front page, performing a database search, serving up at least one adult digital content, serving up a data description page, and repeating a serve up of a file.
  • FIG. 8 shows one way that a server component may create a session, with a session being a method of keeping data for a specific user during the time they login until the time they log off the system.
  • a session is useful to prevent the user from having to repeat actions such as those requiring identification. For example the user need only gives their user name once when using the program instead of before each and every action.
  • a session is also useful to track a user's action for security purposes; for example to prevent two users from logging in with the same user ID (which would suggest a stolen username/password).
  • a session is still further useful to keep track of who is online at any one time for administrative purposes.
  • step 801 a new database entry in the session table is created to hold information regarding this session.
  • step 802 if there is no space or another database error occurs then the operation aborts in step 802 a.
  • a unique identifier is generated and stored as a “session code” or “sessionCODE”. This identifier is used during the rest of the user's time period of interaction(session) with the server. For security reasons the unique identifier (sessionCODE) is preferably large and somewhat random in nature. This will help prevent guessing of sessionCODEs by unauthorized users.
  • step 804 information regarding the user is stored in the database entry created in step 801 .
  • step 805 values in the database entry that track user actions are initialized with default values.
  • step 806 the server returns the unique identifier sessionCODE to the client application so the client can later send this reference with further inquiries.
  • FIG. 9 shows an illustrative sequence of operations that occurs on the server to create a new user. Creation of a new user is initiated by someone using the client software for the first time. The client then stores the sessionCODE it gets back which is used to identify the user until they exit the client program or shutdown their system.
  • step 901 the input arguments are described. They may include for example one or any combination of Billing Name, Billing AddressLine 1 , Billing AddressLine 2 , Billing City, Billing State, Billing Zip, Shipping Name, Shipping AddressLine 1 , Shipping AddressLine 2 , Shipping City, Shipping State, Shipping Zip, Card Type, Card Number, Card Expiration, Card Code, email address, username, or password.
  • step 902 if the format of the arguments is not OK then action step 902 a is taken and the server action is aborted with an error message.
  • step 903 the User Table portion of the database is checked for duplicate users. If one is found then in step 903 a the server action is aborted with an error message.
  • step 904 a third party database is accessed and the credit card information is checked for authenticity. If the card is invalid or otherwise unusable then in step 904 a the server action is aborted with an error message.
  • step 905 a record is created in the User Table portion of the database.
  • step 906 a number unique to this user is generated and stored in the User Table record created in step 905 .
  • step 907 the data from the arguments of step 901 are stored in the database record created in step 905 .
  • step 908 the server initializes other fields in the User Table database record that is created in step 905 , such as one or any combination of (numbers in parentheticals being for illustration purposes): Login Created Date (to current date), Last Time Login Date (to current date), Number of Times Logged In (1), Number of Downloads (0), Number of Succesful Charges (0), date of Last Successful charge (0), Last Rejected TransactionID (0), Number of UnSuccesful Charges (0), Date of Last Unsuccessful charge (0), Last Rejected TransactionID (0), SuggestedMediaIDs(6) (based on actors, genre etc. . . . ), lastIPAddresses[20] (all 0.0.0.0), IPAddressIndex, Last date/time, password sent to email, or Number of Times password sent to email.
  • Login Created Date to current date
  • Last Time Login Date to current date
  • Number of Times Logged In (1) Number of Downloads (0), Number of Succes
  • step 909 a session is created by calling the subroutine as described in FIG. 8 .
  • step 910 the server operation completes with a message to the client that making the new user was successive.
  • An example of the server transaction could be:
  • FIG. 10 shows the sequence of one or a combination of operations that may occur on the server to authenticate a user login.
  • a user generally will be authenticated every time it is run.
  • a sessionCODE can thus be stored and used to identify the user until they exit the client program or shutdown of their system.
  • step 1001 the input arguments are described. Username and password are passed in combined and encrypted.
  • step 1002 the data is optionally decrypted and if the format of the arguments is not OK then action step 1002 a may be taken and the server action is aborted with an error message.
  • step 1003 if the username is present in the list of sessions (user is online twice) then step 1003 b is taken and the server action is aborted with an error message. Also per step 1003 a , a warning to the system administrator might be made if a possible security breach is detected.
  • step 1004 a session might be created by calling the subroutine as described in FIG. 8 .
  • step 1005 the server operation can be completed, such as by a message that reflects whether the session was created in step 1004 .
  • An example of the server transaction could be:
  • step 1101 the input is described.
  • step 1102 the data is decrypted and if the format of the arguments is not OK then action step 1002 a is taken and the server action is aborted, possibly also delivering an error message.
  • step 1103 if the username is present in the list of sessions (user is online twice) then step 1002 a is taken and the server action is aborted, possibly also delivering an error message.
  • step 1104 a username is looked up, such as in the User Table portion of the database, to find the user record.
  • step 1105 if a user name is not found, the server action can be aborted, possibly also delivering an error message.
  • step 1106 an email message is generated and sent containing the password from the user table record to the email described in the user table record.
  • step 1107 the user table is updated with messaging data, such as information about the “last date/time password sent to email”. Other data can also be addressed, such as by incrementing “Number of Times password sent to email”. This information thus can be used to discover security abuses of this operation.
  • messaging data such as information about the “last date/time password sent to email”.
  • Other data can also be addressed, such as by incrementing “Number of Times password sent to email”. This information thus can be used to discover security abuses of this operation.
  • step 1108 a result describing the success of step 1106 can be generated.
  • An example of the server transaction could be:
  • FIG. 12 shows the sequence of operations that occurs on the server to return a front page, such as by an HTML that displays the front page.
  • the input is described it is just a sessionCODE.
  • the sessionCODE is looked up in the Session Table portion of the database. If it is not found then action of step 1202 a can be taken and the server action is aborted, such as with an error message, e.g., Invalid Session.
  • the record in the Session Table matching the session code is located.
  • step 1204 if the user is not set up for customized content the server returns a generic front page in step 1204 a . Otherwise in step 1205 a custom webpage may be generated reflecting content that the company thinks is most appropriate for the user based on data collected about the user. In step 1206 the custom webpage HTML can be returned to the client for display.
  • An example of the server transaction could be:
  • HTML webpage that contains links to suggested media for download
  • FIG. 13 shows an illustrative sequence of operations that occurs on the server to perform a database search, such as a search based on a number of keywords.
  • a database search such as a search based on a number of keywords.
  • arguments are described as sessionCODE, searchString and any number of keywords.
  • a “from” and “to” range can also be specified to limit the number of results and/or spread them out over a number of HTML pages.
  • step 1302 if the format of the arguments are not OK then action of step 1302 a may be taken and the server action aborted with a suitable error message.
  • step 1303 a search of the Media Table portion of the database is conducted looking for matching keywords from arguments in step 1301 .
  • an response such as an HTML document, is returned with the search results for the range specified.
  • FIG. 14 shows an illustrative sequence of operations that can occur on the server to serve up adult digital content, such as a media clip.
  • arguments are described as sessionCODE, and a mediaID.
  • the client passes these in.
  • the client usually gets the mediaID from links on the front page and search results pages.
  • step 1402 if sessionCODE is invalid (not found in Session Table) then action step 1402 a is taken and the server action is aborted with a suitable error message, e.g., Invalid Session.
  • step 1403 if mediaID is invalid (not found in Media Table) then action step 1403 a may be taken and the server action is aborted with a suitable error message, e.g., Invalid Media.
  • step 1404 using the mediaID a server file path to the requested media is found in the Media Table portion of the database.
  • step 1405 the webserver component begins sending the file at the path from step 1404 to the client.
  • step 1406 if the download completes then step 1406 a the user is charged for the download (though charging may occur prior to the same), and per step 1406 b the user's succssful download count is incremented.
  • step 1408 Upon arriving at step 1408 , the action is concluded and system may return to client.
  • step 1407 a user's unsuccssful download count may be incremented.
  • step 1408 the action is concluded and system may return to client, which will notice the incomplete download and could report an error.
  • An example of the server transaction could be:
  • FIG. 15 shows an example of a sequence of operations that could occur on the server to serve up a data description page, such as an HTML media description page.
  • the input is described as a medial D.
  • the mediaID is looked up in the Media Table portion of the database.
  • action of step 1503 a is taken and the server action is aborted, preferably with a suitable error message such as Invalid MediaID.
  • step 1504 one or more records that match the MediaID is then accessed. Thumbnails, dates of production, or other descriptive information are gathered and form the content of an HTML page that gives a description of the media. In step 1505 the HTML page is returned to the client for display.
  • FIG. 16 shows an example of a sequence of operations that occurs on the server to serve up an optional user download history page, e.g., an HTML page that lists all of the downloads a user has made since they started using the product, during a specific time period, or otherwise.
  • an optional user download history page e.g., an HTML page that lists all of the downloads a user has made since they started using the product, during a specific time period, or otherwise.
  • step 1601 the input is described as a sessionCODE.
  • step 1602 the sessionCODE is looked up in the Session Table portion of the database. If it is not found then the action of step 1602 a is taken and the server action is aborted, preferably with a suitable error message such as Invalid Session.
  • step 1603 the UserID is extracted from the SessionCODE using the Session Table portion of the database.
  • step 1604 the Transaction Table portion of the database is accessed and searched for occurrences of the UserID corresponding with previous downloads.
  • step 1605 the results are returned to client, such as by an HTML web page. Displaying the HTML results a list of media the user can “re”-download.
  • FIG. 17 shows an example of a sequence of operations that may occur on the server to repeating a serve up of a file such as a media clip, such as if a user loses their media file (in which case, the user might be able to re-download the file for a fee, for free, or possibly for a reduced price).
  • the steps of FIG. 14 may then be re-executed, with the same or a different price for the download.
  • Per step 1701 arguments are described as sessionCODE, and a mediaID.
  • the client passes these in.
  • the client usually gets the mediaID from links on the front page and search results pages.
  • sessionCODE is invalid (not found in Session Table) then action of step 1702 a is taken and the server action is aborted, possibly with a suitable error message.
  • step 1703 if mediaID is invalid (not found in Media Table) then action of step 1703 a is taken and the server action is aborted, possibly with a suitable error message.
  • step 1704 the mediaID a server file path is used to find the requested media in the Media Table portion of the database.
  • step 1705 the webserver component begins sending the file at the path from step 1704 to the client.
  • step 1706 if the download completes, then in step 1706 a the user is charged for the download and step 1706 b the user's successful download count is incremented.
  • step 1708 the action is concluded and system may return to client, which will notice the incomplete download and could report an error. Otherwise in step 1707 the user's unsuccessful download count is incremented. Per step 1708 , the action is concluded and system may return to client, which will notice the incomplete download and could report an error.
  • An example of the server transaction could be:
  • Various other features are contemplated as within the present invention, including digital rights management.
  • digital rights management there may be a step employed of restricting the ability of the user to copy downloaded files, the manner of their use, dissemination to others, the ability to transfer license rights in content between users, combinations thereof or the like. See, e.g., U.S. Patent Application Nos. 20030079133 (Breiter) and 20030131252 (Barton). Users may also be able to access a framework by which a coupon, gift certificate or other approach to offering a price reduction might be employed. Thus one possible step of the invention includes offers a price reduction to a user.
  • the present invention also contemplates a method of doing business by which the identity of users of the software, network or Internet website of the present invention will be provided for consideration to adult digital content providers, thus enabling direct communication between the content providers and the user.
  • the network component may also be a vehicle for providing advertising to users.
  • one aspect of the invention contemplates providing a module that a user can elect that would prevent cookie detection, filter unsolicited messages, banner advertisements, pop-up advertisements from undesired content providers, or any combination thereof.
  • the system might include a framework or module for tracking user activity (e.g., by compiling lists of user queries, by tracking hits on certain topics, by tracking downloads, by tracking most times of user activity, any combination thereof or otherwise).
  • the website of the present invention may also be adapted for providing and maintaining a directory for facilitating peer-to-peer sharing of files.
  • An example of one such system is disclosed without limitation in U.S. Patent Application Publication No. 20030225796 (Matsubara).
  • U.S. Pat. No. 6,670,537 illustrates an example of one possible system, in the context of music files, which is believed adaptable to facilitate such an operation in accordance with the present invention.
  • Yet another aspect of the present invention contemplates offering a user a data warehouse site remote from a user personal-controlled storage medium, where the user can store downloaded files for later retrieval over the internet. In this manner, the user need not consume vast amounts of storage space on the user's own computer, but yet still have access to files the user has acquired rights to use.
  • the system and method (including any software (e.g., Windows-based or otherwise)) of the present invention provides users access to an extensive internet data base of adult digital content, particularly video files.
  • the system and method of the present invention allows the user to browse one or more data bases, and for a fee, download content to his/her computer. Once downloaded, the user can view the content in at least one of at least three ways, specifically, on a local computer via a built in video player associated with the system; by “burning” the content to vcd and playing it on a conventional vcd/dvd player; or by “transferring” the content to an MPEG player, or any combination thereof.
  • any of a number of different approaches to offering the system and method commercially might be employed.
  • software is offered at no charge (or a nominal fee) as is browsing of the data base, with the user paying for downloads.
  • the data bases associated with the present invention of adult video content could be produced by the operator of the method and system, or acquired from third party vendors who might be paid or themselves pay to include their files in the data base.
  • users optionally can be required to accept certain terms and conditions for using the software to access the data base.
  • the terms may include a representation that the user is of legal age to view and purchase adult content.
  • Users are also optionally provided an opportunity to establish an on line account. For example, if a user elected to not pursue an option of charging a credit card or the like for each purchase, one approach contemplates establishing an account into which a user can deposit funds (e.g., via a credit card), which will be debited for each purchase.
  • the adult digital content is indexed in several ways designed to assist users with finding the specific type of adult digital content they want to view or download.
  • the method and system allows users to enter “personal” search criteria, to select from the software's built in menu of distinct search criteria, or both.
  • the method and system of the present invention also contemplates employing a framework pursuant to which user selection history is analyzed and employed to formulate recommendations for selections to the user, whether requested by the user, unsolicited or both.
  • the matching search results are initially displayed as a list of files, optionally accompanied by a brief text description of each file and one or more thumbnail images (e.g., a still image, a motion image or combination thereof) from each file.
  • thumbnail images e.g., a still image, a motion image or combination thereof
  • the user may be able to simply click on the applicable thumbnail. From there, one additional click on the “download” icon is all that is required to purchase and download that video. Downloaded content can be viewed via the software's built in video player, burned to vcd, transferred to an MPEG player, or otherwise, whether for a fee or at no additional charge.
  • the present invention contemplates application of the methods, systems or both in connection with the distribution of adult digital content.
  • application of the invention is not limited to such content, but can be extended to other content or media forms as well, such as music videos.
  • Example illustrates one possible approach to implementing the present invention and particularly addresses how a network component operator would operate a server for interaction with a user via one or more user interfaces.
  • a multi-tier client/server architecture e.g. in the context of operations performed by the network website component
  • client and server functions are combined to a single computer or spread over a plurality of computers, including for example two or more computers (e.g. servers), a transaction processing monitor (e.g. TP monitor server, messaging server, application server, or any combination thereof).

Abstract

An electronic information system and method pursuant to which at least one user interface is adapted for interaction with a user; at least one database comprising adult digital content associated with a server is remotely accessible and accessed by the user, and a network provides remote access to the at least one database to enable downloading of adult digital content.

Description

  • This application claims the benefit of U.S. Provisional Application No. 60/534,494, filed on Jan. 6, 2004, the contents of which are expressly incorporated herein.
  • TECHNICAL FIELD
  • The present invention pertains to an improved method, software and system for managing, sharing and distributing electronic information and particularly electronic files including adult digital content.
  • BACKGROUND
  • The growth and widespread use of the Internet in recent years has made it possible for large volumes of digital content to be available for user review. One particular field of content, adult digital content, has yet to see a convenient approach to enabling users to search for, access, download and organize libraries of files. Adult digital content presents unique issues as compared with other content types, such as music. For example, users often desire to remain anonymous. Additionally, there is an undesirably large volume of junk e-mail or “spam” that is generated when a user accesses an adult website. Adult digital content also tends largely to comprise images or video files, and thus commands the ability of a system to manage large scale volumes of data. There is thus a need for an improved method, software and system for managing, sharing and distributing electronic information and particularly electronic files including adult content.
  • SUMMARY OF THE INVENTION
  • The present invention meets one or more of the above needs by providing an electronic information system comprising at least one user interface adapted for interaction with a user; at least one database associated with a server that is remotely accessible by the user, the database comprising adult digital content; and a network for providing remote access to the at least one database by the user to enable downloading of the adult digital content.
  • For meeting one or more of the above needs, the software and method of the present invention further contemplates a method for accessing adult content electronic information, comprising the steps of providing a user interface to a user over a network; maintaining a database of adult digital content; granting access to the user to the database for allowing the user to sample the adult digital content and select content for downloading by the user to a storage medium; and transferring the digital content to the user for downloading by the user, and any possible viewing by the user, particularly at the user's convenience.
  • DESCRIPTION OF THE DRAWINGS
  • FIGS. 1 and 2 are schematic block diagrams illustrating possible systems of the present invention.
  • FIGS. 3A-17 are either flow diagrams or sample interfaces illustrating various methodologies that may be employed in accordance with the present invention.
  • DETAILED DESCRIPTION
  • As described herein, in accordance with the present invention, a “network” shall include any one or more networks that covers any geographical area, such as a local area network, wide area network, regional network, global network (e.g., The World Wide Web or Internet) or any combination thereof. Networks may be hardwired (e.g., via conductive wire, fiber optics or otherwise), wireless (e.g., via electromagnetic radiation such as used in cellular systems, or other personal or satellite communication systems), or a combination thereof.
  • In accordance with the present invention, a “website” typically refers to one or more files or other digital information maintained on one or more computers, such as web servers, and being accessible over a network, such as the Internet, via suitable protocol. For example, a file might be accessed by sending a message with a suitable internet protocol, such as hypertext transfer protocol (HTTP) request that recites a uniform resource locator (URL) where a file or other digital content is located or otherwise managed. Such files and content can include, for example, hypertext markup language (HTML) files, common gateway interface (CGI) files, Java applications, or otherwise. A website typically will include a home page to provide access to the files and content maintained within the website, such as at web pages (which typically will include, for example, video recordings, photographs, audio recordings, animations, text, spreadsheets, presentations or any combination thereof, any or all of which may be static, dynamic or a combination thereof).
  • “Adult digital content” as used herein shall refer to files, links, or other electronic information providing a user with embody video recordings, photographs, audio recordings, animations, text, spreadsheets, presentations, any combination thereof, or other depictions that pertain generally to subject matter considered appropriate for observation by persons having a mature emotional development. Adult digital content thus may encompass graphic depictions of acts of physical violence, one or more adults engaging in acts of self gratification, consensual acts of explicit sexual activity, or both, at least partially unclothed models, subject matter for which the Motion Picture Association of America would deem inappropriate for viewing by persons under 17 years of age (e.g., R or NR ratings, or a television TV MA rating), crude indecent language or any combination thereof.
  • “Computers” herein shall refer to any processor controlled device that permits access to a network, such as the Internet, including for example personal computers (whether desktop, mobile or other), workstations, servers, networks of individual computers, hand-held devices (e.g., personal digital assistants), set top boxes for viewing appliances, interactive kiosks, web-enabled wireless communications devices, mobile web browsers, or any combination thereof. These computers will typically include or be in operational communication with a suitable addressable storage medium or computer accessible medium, such as one or more memories selected from a random access memory (RAM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electronically erasable programmable read-only memory (EEPROM), or any combination thereof. Memory may be comprised in any suitable storage device such as a hard disk, a floppy disk, a DVD, a CD, a magnetic recording tape, an optical recording device, a memory card, a memory stick, a flash storage medium, a memory key device, or any combination thereof.
  • In one embodiment, the computers are equipped with a network communication device such as a modem, a network or other interface card, or other network connection device. The computers execute any appropriate operating system, which itself may include a suitable communications protocol for messaging over the Internet. The operating system may also provide appropriate communications protocols to establish communication links with the Internet.
  • The computers generally will contain program logic or the like for representing data and instructions to govern computer operation. The program logic may be implemented as one or more object frameworks or modules that reside on an addressable storage medium and execute on at least one processor. The frameworks or modules may include components such as hardware and/or software components, object-oriented software components, class components, task components, drivers, firmware, microcode, circuitry, segments of program code or any other subject matter for processing procedures, subroutines, functions, attributes, data, databases, data structures, tables, arrays, variables, or any combination thereof.
  • Referring to FIG. 1, one illustrative system 10 of the present invention includes a user component 12, a content provider (which may be a content originator) component 14, and a network website component 16. The user component 12 will typically include at least one computer 18, which has a display screen 20. The computer itself might be a portable (e.g., handheld) media player or, as in FIG. 1, it may be another type of computer and include an optional portable (e.g., handheld) media player 22 that is be signally connectable with the computer for synchronizing the content of the portable media player 22 with the content of the computer 18.
  • Ordinarily, a user will be able to enter commands and information into the computer 18 through one or more suitable input devices such as keyboard, pointing device, touch screen or any combination thereof. Other input devices may include (without limitation) a joystick, microphone, camera, fax device, game controls, scanner, bar code reader, radiofrequency identification device transponder, any combination thereof or the like. These and other input devices are often connected to the computer through an interface, such as a serial port interface coupled to a system bus, but may be connected by other interfaces, such as a parallel port, game port, or a universal serial bus (USB). Wireless communication connections are also possible. One or more display devices 24 may also be associated with the user component 12, via the computer, the portable media player or both, pursuant to which the user will be able to interact with one or more user interfaces. In addition to the graphical display device, there may be other peripheral output devices such as speakers, printers or otherwise. The computer will be signally connected (hardwired, by wireless, or a combination thereof) to a network (e.g., the Internet) through a suitable network interface, adapter, a modem, or other means for establishing communications, over the network.
  • The network website component, the content provider component, or a combination of the two (e.g., in instances where the content provider is also the entity that runs the website) typically will include at least one server computer that is also signally connected (hardwired, by wireless, or a combination thereof) to the network (e.g., the Internet) through a suitable network interface, adapter, a modem, or other means for establishing communications, over the network.
  • Accordingly, it is contemplated that a user can remotely access, view, and/or manage adult digital content maintained at the network website component, the content provider component, or a combination of the two, from a computer of the user component, and shall be able to download files or link to files that are stored at the network website component, the content provider component, or a combination of the two.
  • One attractive benefit of the present invention resides in its feature of providing an approach for searching a plurality of adult digital content resources on a network such as the Internet with as little as one search query or menu selection made by a user. To do this the network website component advantageously maintains (and optionally periodically updates) a database of adult digital content available from numerous content providers on the network (whether simultaneously or selectively based upon user selection criteria) and provides a method for acquiring the content, viewing it and/or managing it.
  • The present invention thus provides “one-stop” shopping for the user, and avoids the hassles common to users from the nuances of accessing, searching and retrieving information via various non-uniform methods currently employed in the adult digital content field. Thus pursuant to one aspect of the system and method of the present invention, the user may, with a single search, acquire a comprehensive list of available resources on a desired adult digital content topic. The user may then access the adult digital content directly through a “seamless” interface, purchase the right to download the adult digital content, download the adult digital content, view the adult digital content and optionally transfer the adult digital content to a suitable storage medium such as disclosed above (e.g., a handheld or other portable media player, a DVD, a CD or the like), enabling the user to view the adult digital content at the convenience of the user.
  • The databases of the present invention are typically maintained in the network component (e.g., via at least one computer server associated with the network component), but may also have sub-components maintained by a content provider, by a user or both. The databases may be of any suitable architecture, whether object based, relation based, a combination thereof or otherwise. The databases herein contemplate not only a single database, but may include plural databases maintained at the same or at remote locations relative to each other, but which are accessible to a user. The database may include entire files, portions of files, links to files or other information. Thus it is possible that files will remain stored on a server controlled by a content provider and the website of the present invention is used merely as a portal for access to the content provider. The database may include one or a plurality of tables, and may be searchable by topic, key word, text (e.g., Boolean or free form), file directory display, links, menu (e.g., dropdown menu) any combination thereof or otherwise.
  • In another aspect of the present invention there is contemplated not only a vehicle for providing users with access to adult digital content, but also a vehicle for purchasing goods or services such as for use in enjoyment of the adult digital content. In this regard, it is contemplated also that the network component host will offer a storefront to enable purchase of a variety of goods via the network, such goods being offered for sale either by the network component host, a third party vendor, a combination thereof or otherwise, and thus available for shipment via courier (e.g., postal service, express courier or otherwise). Examples of such goods may include, without limitation, cameras, clothing, toys, novelty items, magazines, books, home appliances, portable media players, other electronic devices, health and beauty aids, dietary supplements, combinations thereof or otherwise. Examples of services include adult entertainment, escort services, or the like.
  • In accordance with one illustration of the methods of the present invention, the network component of the present invention shall function to interact with information provided by a user and perform the steps of creating a new user (if a first time user is detected) or authenticating a prior user logging in with a unique identifier (e.g., a password, with an option to send such user a reminder if the identifier is forgotten or misplaced, such as a password reminder email message); providing at least one user interface page; providing the user one or more options for searching; retrieving search results from at least one data base and providing the results to the user; and offering the user an opportunity to acquire a download of a file based upon the search results. In a more particular aspect, based upon results from a search, a user may be provided with a thumbnail image or other depiction representative of one or more available files. A user may select such file for downloading based upon the depiction. Optionally, the user is provided with more detailed summary information about the clip, an opportunity to view at least a portion of the file or a combination thereof. When satisfied with the selection, or prior thereto, the method and system of the present invention contemplates consummating a transaction that includes the user purchasing a right to download the file. The user may optionally also be provided with a display of the user's history of viewing selections, downloads or both, with the ability to access such selections, downloads or both for further viewing.
  • In this regard, the user component of the invention typically will be constructed to perform the steps of browsing directories provided by at least one network component server, establishing a secure connection via a network, optionally affording anonymity for a user, creating individualized or local directories on a user computer; cataloging files on a user computer; downloading files; creating file links; deleting files; organizing files; consummating a sales transaction to purchase rights to access or download a file, to purchase goods via a virtual storefront provided by a network component server, or both; synchronizing with another device (e.g., as with other handheld embodiments herein, a handheld or other portable media player having suitable memory capacity (such as at least 10 gigabytes, 20 gigabytes, or even 50 gigabytes or more), examples of which (without limitation) include the LYRA™ device from RCA, the Archos AV300 series, a Microsoft Portable Media Center, or the like) or any combination of the foregoing.
  • It should be appreciated that reference to “files” herein shall include a plurality of files (if necessary to complete an entire work), and may also contemplate portions of files. File format is not critical. They may be compressed or streaming. In one particular and generally surprising approach, however, MPEG-1 files are employed, even though it is recognized that more modern formats are available and may suitably be employed. Files can be encrypted or not, and commonly will have unique identifier associated with them for permitting access and retrieval. Files will typically include previously recorded adult digital content, but may also include simulcast content. Files may be transmitted in any suitable manner.
  • As appreciated from the above, use of the present invention generally will include a payment requirement to the network website host. In one approach, a user will be able to purchase a subscription (whether for an initial fee, a periodic fee, a combination thereof or otherwise), which will entitle the user to a predetermined amount of database access, downloads, access time, any combination thereof or otherwise. A user might be able to purchase access, downloads, time, any combination thereof or otherwise on an “as needed” basis (e.g., by paying a fee based upon time of download, size of file, numbers of files, or any combination thereof). Combinations of the above are also contemplated. In addition, it is possible that users will be offered at least partially free use of the present invention by the network website host. In the latter instance, it is also likely that a content provider will require payment by the user.
  • The invention also contemplates providing an approach to establishing a customer account for consummating transactions, with an option to store identifiying information, credit card information or other information. In this regard, a user can maintain a balance of money or other credit into an account and subsequently debit against the account balance. The user also can have the option of paying for each individual transaction by providing credit or debit card information at the time of transaction. Any combination of the above is also possible. Other illustrations of effectuating an electronic payment using an Electronic Funds Transfer (EFT) network (such as the Automated Clearing House (ACH) network) are disclosed, for example, in U.S. Pat. No. 6,609,113 (O'Leary et al); U.S. Pat. No. 5,960,411 (Hartman et al.); U.S. Pat. No. 5,715,314 (Payne et al.); and U.S. Pat. No. 5,724,424 (Gifford).
  • FIG. 2 provides a more elaborate illustration of one possible embodiment for the architecture of a system according to the present invention. Methods for use of such a system and others within the scope of the present invention are also described in further detail with reference to the accompanying FIGS. 3A-7B.
  • FIG. 3A illustrates a method by which first time users, users without an existing account or other users are granted access to adult digital content. In an initial step 301, a user will be presented with a terms and conditions of use agreement, such as shown in the screen of FIG. 3B. If the user does not agree, operation will cease, and no access will be granted. If the user agrees, a next step 302 provides the user with an interface for inputting personal information, such as in FIG. 3C.
  • FIG. 3D illustrates an example of a homepage associated with a website for use of the method and system of the present invention (which itself may including one or more links, directories or the like for facilitating navigation).
  • If the user elects not to complete the information requested, operation also will cease, and no access will be granted. In another step 303, a server of the network component will verify whether user information is valid and authorized, such as by confirming with a credit card company (step 304). Of course if steps 303 or 304 show the user as not authorized, operation will cease, and no access will be granted. Assuming the user is authorized, a step 305 contemplates further activity by a server of the network component toward granting access to the site, and will typically include a step of displaying another interactive interface for the user, such as by providing at least one storefront interface page. The steps of FIG. 3A (as well as that of FIG. 4A addressed below) could also include one or more additional steps such as offering a user a function of remembering a password, establishing one or more accounts, referring others to the site, offering discounts or coupons, or the like.
  • Alternatively, FIG. 4A illustrates a sequence of steps that might be employed to grant access to previous users having a login identifier. In an initial step 401, the user is presented with a screen, such as that in FIG. 4B, which allows the user to log into the site. In a comparison step 402, user input is compared with data stored by the network component to assure authenticity. One approach may include a step 403 by which if a user makes repeated unsuccessful efforts to log into the site, operation will cease, and no access will be granted. Assuming the user successfully logs in, a step 404 contemplates further activity by a server of the network component toward granting access to the site, and will typically include a step of displaying another interactive interface for the user, such as by providing at least one storefront interface page.
  • Turning to FIG. 5A, per step 501 a user is presented with at least one storefront interface page by which the user is presented with content that the user can review, purchase rights to download, download or any combination thereof. FIG. 5B illustrates one example of such an interface, which could include one or more menus, directories, thumbnail images, enlarged images, tool bars (e.g., to facilitate navigation through the site, to facilitate downloading, to facilitate purchases or any combination thereof), searching tools, merchandise displays, or any combination thereof.
  • When using the storefront interface, the user thus will be offered one or more of the ability to perform a selection step 502 of whether to view such as per 502′ to download as per 502″ or both; to perform a viewing step 503 (which if selected will trigger a network component server, such as per step 503′; to obtain and play the clip, present summary information about the clip, a combination thereof or otherwise); to perform a searching step 504 (which if selected will trigger a network component server, such as per step 504′ to afford access to one or more databases for searching); perform a downloading step 505 (which if selected will trigger a network component server, such as per step 505′ to obtain a file and present it to the user for downloading, optionally with or without a thumbnail icon (such as per step 505″), and optionally with a step (such as per step 505″) of adding information about the selection to a catalog); to perform a selection step 506 from a provided list, which optionally may be a catalog list that is maintained personally by the user (in which case the user is provided viewing access to the selection); or to perform any combination of the aforenoted steps. Of course other functions may be performed using the storefront interface, and functions mentioned in the above may be omitted as well.
  • Referring to FIG. 6A, there is illustrated an operation for viewing adult digital content by the user. Under this approach, following the selection step 601, a digital media player is offered to the user, for local viewing by the user, or by a server of the network component. An example of an interface a user might obtain upon accessing such a player is shown in FIG. 6B. For example, as seen in FIG. 6B, such interface may include buttons and controls and a suitable viewing screen for the media.
  • A user is then provided with options for operating the player. For example, a user may employ a step 603 “double clicking an entry in the list” to start playback of the media (step 603′). Or by accessing the transport controls as in step 604, (e.g., forward, rewind, play, record, stop, pause or the like are accessed), the media player component is forwarded the appropriate command message as documented in step 605.
  • Turning to FIG. 7A, there is illustrated a possible approach for facilitating the archiving of an adult digital content file onto CD-R or DVD-R or other storage mediums in accordance with the present invention. Under this approach a user is again provided a step 701 of choosing whether the user wishes to change modes and view videos such as per 701′ or return for additional shopping to another storefront interface such as per step 701″. It should be realized that the steps of changing a mode of operation of the system, such as the above steps 502, 603 and 701 (and any other like step discussed herein) might be manifested through a tool bar, icon or other functional navigation tool, which may be always present, thus enabling the user to escape an operation by selecting that tool. Assuming the user elects to transfer a file or “burn” it to a disc, the user may then be afforded options for adding (step 702) a selection to a list for archiving (in which case the selection is added (step 702′), removing (step 703) a selection from a list for burning (in which case the selection is removed (step 703′), or both. In this manner, a plurality of selections may be added to the burn list in a single step. Upon completing a list, or an individual selection (as the case may be) the user will then perform a command (step 704) to cause the system to start the process of “burning” a disc or otherwise initiating the archival process (step 705) from the selection or list of selections to a location designated by the user. It should be realized that, as with other functions of the system herein, one or more of the functions performed in accordance with these steps may be controlled by suitable software local to a user computer, by software is associated with a server of the network component or a combination thereof. FIG. 7B is an example interface.
  • FIGS. 8-17 illustrate steps that a server associated with a network component of the present invention might employ combinations of any two or more of the steps of creating a session, creating a new user, authenticating a user login, sending a password reminder, returning a front page, performing a database search, serving up at least one adult digital content, serving up a data description page, and repeating a serve up of a file.
  • FIG. 8 shows one way that a server component may create a session, with a session being a method of keeping data for a specific user during the time they login until the time they log off the system. A session is useful to prevent the user from having to repeat actions such as those requiring identification. For example the user need only gives their user name once when using the program instead of before each and every action. A session is also useful to track a user's action for security purposes; for example to prevent two users from logging in with the same user ID (which would suggest a stolen username/password). A session is still further useful to keep track of who is online at any one time for administrative purposes.
  • In step 801 a new database entry in the session table is created to hold information regarding this session. In step 802 if there is no space or another database error occurs then the operation aborts in step 802 a.
  • In step 803 a unique identifier is generated and stored as a “session code” or “sessionCODE”. This identifier is used during the rest of the user's time period of interaction(session) with the server. For security reasons the unique identifier (sessionCODE) is preferably large and somewhat random in nature. This will help prevent guessing of sessionCODEs by unauthorized users.
  • In step 804 information regarding the user is stored in the database entry created in step 801. In step 805 values in the database entry that track user actions are initialized with default values.
  • In step 806 the server returns the unique identifier sessionCODE to the client application so the client can later send this reference with further inquiries.
  • This is generally an internal server function, and may be sent from another server operation that needs to create a session. For example when an existing user logs in or when a new user is created this subroutine is called.
  • FIG. 9 shows an illustrative sequence of operations that occurs on the server to create a new user. Creation of a new user is initiated by someone using the client software for the first time. The client then stores the sessionCODE it gets back which is used to identify the user until they exit the client program or shutdown their system.
  • In step 901 the input arguments are described. They may include for example one or any combination of Billing Name, Billing AddressLine1, Billing AddressLine2, Billing City, Billing State, Billing Zip, Shipping Name, Shipping AddressLine1, Shipping AddressLine2, Shipping City, Shipping State, Shipping Zip, Card Type, Card Number, Card Expiration, Card Code, email address, username, or password.
  • In step 902 if the format of the arguments is not OK then action step 902 a is taken and the server action is aborted with an error message. In step 903 the User Table portion of the database is checked for duplicate users. If one is found then in step 903 a the server action is aborted with an error message. In step 904 a third party database is accessed and the credit card information is checked for authenticity. If the card is invalid or otherwise unusable then in step 904 a the server action is aborted with an error message.
  • In step 905 a record is created in the User Table portion of the database. In step 906 a number unique to this user is generated and stored in the User Table record created in step 905. In step 907 the data from the arguments of step 901 are stored in the database record created in step 905.
  • In step 908 the server initializes other fields in the User Table database record that is created in step 905, such as one or any combination of (numbers in parentheticals being for illustration purposes): Login Created Date (to current date), Last Time Login Date (to current date), Number of Times Logged In (1), Number of Downloads (0), Number of Succesful Charges (0), date of Last Successful charge (0), Last Rejected TransactionID (0), Number of UnSuccesful Charges (0), Date of Last Unsuccessful charge (0), Last Rejected TransactionID (0), SuggestedMediaIDs(6) (based on actors, genre etc. . . . ), lastIPAddresses[20] (all 0.0.0.0), IPAddressIndex, Last date/time, password sent to email, or Number of Times password sent to email.
  • In step 909 a session is created by calling the subroutine as described in FIG. 8. In step 910 the server operation completes with a message to the client that making the new user was succesful.
  • An example of the server transaction could be:
  • command to server from client: “www.download2disc.com/newuser.php?n=username . . . <all the parameters described in step 901 text description>”
  • response from server to client: “380203764622237788” which represents a sessionCODE
  • FIG. 10 shows the sequence of one or a combination of operations that may occur on the server to authenticate a user login. A user generally will be authenticated every time it is run. A sessionCODE can thus be stored and used to identify the user until they exit the client program or shutdown of their system.
  • In step 1001 the input arguments are described. Username and password are passed in combined and encrypted. In step 1002, the data is optionally decrypted and if the format of the arguments is not OK then action step 1002 a may be taken and the server action is aborted with an error message.
  • In step 1003 if the username is present in the list of sessions (user is online twice) then step 1003 b is taken and the server action is aborted with an error message. Also per step 1003 a, a warning to the system administrator might be made if a possible security breach is detected.
  • In step 1004 a session might be created by calling the subroutine as described in FIG. 8. In step 1005 the server operation can be completed, such as by a message that reflects whether the session was created in step 1004.
  • An example of the server transaction could be:
  • command to server from client: “www.download2disc.com/authenticate.php?n=username&p=928938912836541”
  • response from server to client: “380203764622237788” which represents a sessionCODE
  • Turning to FIG. 11, there is shown an illustrative sequence of operations that occurs on the server to send a lost password email when the user requests one. In step 1101 the input is described. In step 1102, the data is decrypted and if the format of the arguments is not OK then action step 1002 a is taken and the server action is aborted, possibly also delivering an error message.
  • In step 1103, if the username is present in the list of sessions (user is online twice) then step 1002 a is taken and the server action is aborted, possibly also delivering an error message.
  • In step 1104, a username is looked up, such as in the User Table portion of the database, to find the user record. In step 1105 if a user name is not found, the server action can be aborted, possibly also delivering an error message.
  • In step 1106 an email message is generated and sent containing the password from the user table record to the email described in the user table record.
  • In step 1107 the user table is updated with messaging data, such as information about the “last date/time password sent to email”. Other data can also be addressed, such as by incrementing “Number of Times password sent to email”. This information thus can be used to discover security abuses of this operation. In step 1108 a result describing the success of step 1106 can be generated.
  • An example of the server transaction could be:
  • command to server from client: www.download2disc.com/lostpassword.php?n=username
  • response from server to client: webpage “email sent to your address we have on record. More info Cust. Service: 313-555-1234”
  • FIG. 12 shows the sequence of operations that occurs on the server to return a front page, such as by an HTML that displays the front page. In step 1201 the input is described it is just a sessionCODE. In step 1202 The sessionCODE is looked up in the Session Table portion of the database. If it is not found then action of step 1202 a can be taken and the server action is aborted, such as with an error message, e.g., Invalid Session. In step 1203 the record in the Session Table matching the session code is located.
  • In step 1204, if the user is not set up for customized content the server returns a generic front page in step 1204 a. Otherwise in step 1205 a custom webpage may be generated reflecting content that the company thinks is most appropriate for the user based on data collected about the user. In step 1206 the custom webpage HTML can be returned to the client for display.
  • An example of the server transaction could be:
  • command to server from client: www.download2disc.com/front.php?s=380203764622237788
  • response from server to client: HTML webpage that contains links to suggested media for download
  • FIG. 13 shows an illustrative sequence of operations that occurs on the server to perform a database search, such as a search based on a number of keywords. Per step 1301, arguments are described as sessionCODE, searchString and any number of keywords. A “from” and “to” range can also be specified to limit the number of results and/or spread them out over a number of HTML pages.
  • In step 1302 if the format of the arguments are not OK then action of step 1302 a may be taken and the server action aborted with a suitable error message. In step 1303, a search of the Media Table portion of the database is conducted looking for matching keywords from arguments in step 1301. Per step 1304 an response, such as an HTML document, is returned with the search results for the range specified.
  • FIG. 14 shows an illustrative sequence of operations that can occur on the server to serve up adult digital content, such as a media clip. In step 1401 arguments are described as sessionCODE, and a mediaID. The client passes these in. The client usually gets the mediaID from links on the front page and search results pages.
  • In step 1402 if sessionCODE is invalid (not found in Session Table) then action step 1402 a is taken and the server action is aborted with a suitable error message, e.g., Invalid Session. In step 1403 if mediaID is invalid (not found in Media Table) then action step 1403 a may be taken and the server action is aborted with a suitable error message, e.g., Invalid Media. In step 1404 using the mediaID a server file path to the requested media is found in the Media Table portion of the database. In step 1405, the webserver component begins sending the file at the path from step 1404 to the client.
  • In step 1406 if the download completes then step 1406 a the user is charged for the download (though charging may occur prior to the same), and per step 1406 b the user's succssful download count is incremented. Upon arriving at step 1408, the action is concluded and system may return to client.
  • Otherwise per step 1407 a user's unsuccssful download count may be incremented. Lastly step 1408 the action is concluded and system may return to client, which will notice the incomplete download and could report an error.
  • An example of the server transaction could be:
  • command to server from client: www.download2disc.com/download.php?s=380203764622237788&m=0120301&key=993349
  • 374552662
  • response from server to client::<MPEG download stream>
  • FIG. 15 shows an example of a sequence of operations that could occur on the server to serve up a data description page, such as an HTML media description page. In step 1501 the input is described as a medial D. In step 1502, the mediaID is looked up in the Media Table portion of the database. In step 1503, if the MediaID is not found in step 1502 then action of step 1503 a is taken and the server action is aborted, preferably with a suitable error message such as Invalid MediaID.
  • In step 1504, one or more records that match the MediaID is then accessed. Thumbnails, dates of production, or other descriptive information are gathered and form the content of an HTML page that gives a description of the media. In step 1505 the HTML page is returned to the client for display.
  • FIG. 16 shows an example of a sequence of operations that occurs on the server to serve up an optional user download history page, e.g., an HTML page that lists all of the downloads a user has made since they started using the product, during a specific time period, or otherwise.
  • In step 1601 the input is described as a sessionCODE. In step 1602 the sessionCODE is looked up in the Session Table portion of the database. If it is not found then the action of step 1602 a is taken and the server action is aborted, preferably with a suitable error message such as Invalid Session.
  • In step 1603 the UserID is extracted from the SessionCODE using the Session Table portion of the database. In step 1604 the Transaction Table portion of the database is accessed and searched for occurrences of the UserID corresponding with previous downloads.
  • In step 1605 the results are returned to client, such as by an HTML web page. Displaying the HTML results a list of media the user can “re”-download.
  • FIG. 17 shows an example of a sequence of operations that may occur on the server to repeating a serve up of a file such as a media clip, such as if a user loses their media file (in which case, the user might be able to re-download the file for a fee, for free, or possibly for a reduced price). The steps of FIG. 14 may then be re-executed, with the same or a different price for the download.
  • Per step 1701 arguments are described as sessionCODE, and a mediaID. The client passes these in. The client usually gets the mediaID from links on the front page and search results pages. In step 1702 if sessionCODE is invalid (not found in Session Table) then action of step 1702 a is taken and the server action is aborted, possibly with a suitable error message.
  • In step 1703 if mediaID is invalid (not found in Media Table) then action of step 1703 a is taken and the server action is aborted, possibly with a suitable error message. In step 1704 the mediaID a server file path is used to find the requested media in the Media Table portion of the database.
  • In step 1705 the webserver component begins sending the file at the path from step 1704 to the client. In step 1706, if the download completes, then in step 1706 a the user is charged for the download and step 1706 b the user's successful download count is incremented. Lastly, per step 1708 the action is concluded and system may return to client, which will notice the incomplete download and could report an error. Otherwise in step 1707 the user's unsuccessful download count is incremented. Per step 1708, the action is concluded and system may return to client, which will notice the incomplete download and could report an error.
  • An example of the server transaction could be:
  • command to server from client: www.download2disc.com/redownload.php?s=380203764622237788&m=012030 1&key=9933
  • 49374552662
  • response from server to client::<MPEG download stream>
  • Various other features are contemplated as within the present invention, including digital rights management. Thus, there may be a step employed of restricting the ability of the user to copy downloaded files, the manner of their use, dissemination to others, the ability to transfer license rights in content between users, combinations thereof or the like. See, e.g., U.S. Patent Application Nos. 20030079133 (Breiter) and 20030131252 (Barton). Users may also be able to access a framework by which a coupon, gift certificate or other approach to offering a price reduction might be employed. Thus one possible step of the invention includes offers a price reduction to a user.
  • In one aspect the present invention also contemplates a method of doing business by which the identity of users of the software, network or Internet website of the present invention will be provided for consideration to adult digital content providers, thus enabling direct communication between the content providers and the user. The network component may also be a vehicle for providing advertising to users. Alternatively, it is expected that a number of users will want to maintain their privacy or access adult digital content without the common resulting unsolicited messages, banner advertisements, pop-up advertisements or the like resulting from cookie detection. Thus, one aspect of the invention contemplates providing a module that a user can elect that would prevent cookie detection, filter unsolicited messages, banner advertisements, pop-up advertisements from undesired content providers, or any combination thereof.
  • Other features may be incorporated in accordance with the present invention including for example a software, method or system might incorporate methodology to help a user formulate a search query. See, e.g., U.S. Pat. No. 6,671,681 (Emens et al). The system might include a framework or module for tracking user activity (e.g., by compiling lists of user queries, by tracking hits on certain topics, by tracking downloads, by tracking most times of user activity, any combination thereof or otherwise).
  • The website of the present invention may also be adapted for providing and maintaining a directory for facilitating peer-to-peer sharing of files. An example of one such system is disclosed without limitation in U.S. Patent Application Publication No. 20030225796 (Matsubara). According to another possible approach, it is possible to select an icon representative of a file under consideration and a compressed sample is made and sent to a selected recipient, e.g., via an email with an accompanying message. This may be done while the video is playing or upon conclusion. U.S. Pat. No. 6,670,537 (Hughes et al) illustrates an example of one possible system, in the context of music files, which is believed adaptable to facilitate such an operation in accordance with the present invention.
  • Yet another aspect of the present invention contemplates offering a user a data warehouse site remote from a user personal-controlled storage medium, where the user can store downloaded files for later retrieval over the internet. In this manner, the user need not consume vast amounts of storage space on the user's own computer, but yet still have access to files the user has acquired rights to use.
  • As can be seen from the above, the system and method (including any software (e.g., Windows-based or otherwise)) of the present invention provides users access to an extensive internet data base of adult digital content, particularly video files. The system and method of the present invention allows the user to browse one or more data bases, and for a fee, download content to his/her computer. Once downloaded, the user can view the content in at least one of at least three ways, specifically, on a local computer via a built in video player associated with the system; by “burning” the content to vcd and playing it on a conventional vcd/dvd player; or by “transferring” the content to an MPEG player, or any combination thereof. As noted, any of a number of different approaches to offering the system and method commercially might be employed. For example, in one embodiment, software is offered at no charge (or a nominal fee) as is browsing of the data base, with the user paying for downloads. The data bases associated with the present invention of adult video content could be produced by the operator of the method and system, or acquired from third party vendors who might be paid or themselves pay to include their files in the data base.
  • Because access to the one or more databases is restricted, users optionally can be required to accept certain terms and conditions for using the software to access the data base. For example, the terms may include a representation that the user is of legal age to view and purchase adult content. Users are also optionally provided an opportunity to establish an on line account. For example, if a user elected to not pursue an option of charging a credit card or the like for each purchase, one approach contemplates establishing an account into which a user can deposit funds (e.g., via a credit card), which will be debited for each purchase.
  • Once access is established, users have the ability to display information about the content they want to see, including “thumbnail” still images which are representative of the video content available to download. The adult digital content is indexed in several ways designed to assist users with finding the specific type of adult digital content they want to view or download. The method and system allows users to enter “personal” search criteria, to select from the software's built in menu of distinct search criteria, or both. The method and system of the present invention also contemplates employing a framework pursuant to which user selection history is analyzed and employed to formulate recommendations for selections to the user, whether requested by the user, unsolicited or both.
  • The matching search results are initially displayed as a list of files, optionally accompanied by a brief text description of each file and one or more thumbnail images (e.g., a still image, a motion image or combination thereof) from each file. For more detailed information and more thumbnail still images of any particular file, the user may be able to simply click on the applicable thumbnail. From there, one additional click on the “download” icon is all that is required to purchase and download that video. Downloaded content can be viewed via the software's built in video player, burned to vcd, transferred to an MPEG player, or otherwise, whether for a fee or at no additional charge.
  • Among other attributes, what makes the system and method of the present invention software unique is a custom approach for integrating adult video content viewing, vcd burning, portable player support, file management, on line consumer electronic shopping, or any combination thereof, into one package. The novel integration of the many “tools” needed to accomplish the innovative media tasks makes the system, method and associated software easy to use for even a computer novice. The integration of these tools also offers users are assured fast, high quality, reliable downloads in the privacy of their own personal environment and at a fraction of the price to buy similar adult video content in stores or by mail.
  • The present invention contemplates application of the methods, systems or both in connection with the distribution of adult digital content. However, application of the invention is not limited to such content, but can be extended to other content or media forms as well, such as music videos.
  • The following further illustrates operation of the method and system of the present invention. It is illustrative only and not intended as limiting, as it is believed that the functions performed and the results obtained are achievable through other similar approaches as well.
  • Example 1
  • The following Example illustrates one possible approach to implementing the present invention and particularly addresses how a network component operator would operate a server for interaction with a user via one or more user interfaces.
  • ===================================
    Server Action # 1 - make new user (first time)
    ===================================
    input:
    Billing Name
    Billing AddressLine1
    Billing AddressLine2
    Billing City
    Billing State
    Billing Zip
    Shipping Name
    Shipping AddressLine1
    Shipping AddressLine2
    Shipping City
    Shipping State
    Shipping Zip
    Card Type
    Card Number
    Card Expiration
    Card Code
    email address
    username
    password
    output: sessionCODE (from authentication)
    actions:
    verify all fields enetered correctly.
    verify valid credit card.
    make new record for user table
    fill in all the data from input
    Make new unique UserID and store in field
    UserID
    initialize these user table fields
    Login Created Date (to current date)
    Last Time Login Date (to current date)
    Number of Times Logged In (1)
    Number of Downloads (0)
    Number of Succesful Charges (0)
    Date of Last Successful charge (0)
    Last Rejected TransactionID (0)
    Number of UnSuccesful Charges (0)
    Date of Last Unsuccessful charge (0)
    Last Rejected TransactionID (0)
    SuggestedMediaIDs(6) (based on actors, genre etc...)
    LastIPAddresses[20] (all 0.0.0.0)
    IPAddressIndex
    Last date/time password sent to email
    Number of Times password sent to email
    perform authentication and return the sessionCODE
    inoutURL: www.download2disc.com/newuser.php?n=
    username&...wow will this be long
    outputTEXT: 380203764622237788
    ===========================================
    Server Action # 2 - authenticate user (non-first time)
    ===========================================
    input: username
    input: password (hash?)
    output: sessionCODE
    inputURL:
    www.download2disc.com/authenticate.php?n=username&p=
    928938912836541
    outputTEXT: 380203764622237788
    actions:
    make new record for Session Table
    make large unique number for sessionCODE
    log sessionCODE
    log IP code
    log date/time
    find UserID - log it
    set PageAccesses to 0
    set SuccessfulDownloads to 0
    set UnsuccessfulDownloads to 0
    update User Table
    concern: can sessionCODE be guessed?
    =================================
    Server Action # 3 - send lost password email
    =================================
    input: username
    output: webpage
    output: email message
    inputURL: www.download2disc.com/
    lostpassword.php?n=username
    outputHTML: (webpage) “email sent to your address we
    have on record. More info Cust. Service:313-555-1234”
    actions:
    send the email
    email address from user table
    update user table
    Last date/time password sent to email
    Number of Times password sent to email
    concern: faked request
    concern: intercepted emails
    ============================
    Server Action # 4 - serve up front page =================
    input:sessionCODE output:webpage
    inputURL: www.download2disc.com/
    front.php?s=380203764622237788
    outputHTML: webpage (pretty much canned HTML for now)
    concern: serve up indvidualized content?
    or will that piss people off?
    ==========================
    Server Action # 5 - perform search
    ==========================
    input:sessionCODE
    input:searchstring
    input:combo1value
    input:combo2value
    input:combo3value
    input:combo4value
    input:combo5value
    input:combo6value
    output:webpage
    inputURL:
    www.download2disc.com/search.php?s=
    380203764622237788&s0=“Jenna”;s1=0;s2=0;s
    3=0;s4=0;s5=0;s6=0;from=0;to=25
    outputHTML: search result webpage
    for <from>-<to> range
    actions:
    Perform MySQL search matching the keywords
    Return webpage with results
    concern: systematic stealing of which content we provide?
    ===========================
    Server Action # 6 - get detail on clip ===============
    input:sessionCODE input:mediaID output:webpage
    inputURL:
    www.download2disc.com/details.php?s=
    380203764622237788&m=0120301
    outputHTML: details webpage. Metadata and
    thumbnails on the webpage.
    actions:
    Perform MySQL search for MediaID
    Make webpage with media details and thumnails
    concern: systematic stealing of our “meta-data”
    (info about videos)
    ========================================
    Server Action # 7 - serve up a clip (user download)
    ========================================
    input:sessionCODE
    input:mediaID
    input:encoded key (sessionCODE,mediaID)
    output:<MPEG download stream>
    inputURL:
    www.download2disc.com/download.php?s=
    380203764622237788&m=0120301&key=993349
    374552662
    outputBINARY:<MPEG download stream>
    concern: check for full download, handle partial download
    concern: user attempts partial downloads to avoid fees
    concern: guessed sessionCODE to steal download
    concern: intercepted sessionCODE to steal download
    ===========================================
    Server Action # 8 - show history of a user's downloads
    ===========================================
    input:sessionCODE
    inputURL:
    www.download2disc.com/downloadhistory.php?s=
    380203764622237788&from=0;to=25
    outputHTML: web page listing media downloads with
    dates & link to “re”-serve the file
    Find the user from the sessionCODE
    search media transactions for userID
    Display List broken up by 1-25, 26-50, 51-75 ...
    concern: privacy?
    ===========================================
    Server Action # 9 - re-serve up a clip (downloaded of
    content they bought before)
    ===========================================
    input:sessionCODE
    input:mediaID
    output:<MPEG download stream>
    inputURL:
    www.download2disc.com/redownload.php?s=
    380203764622237788&m=012030 1&key=9933
    49374552662
    outputHTML:<MPEG download stream>
    concern: “re”-serving for other users besides the original
    concern: other stealing
  • Example 2
  • The following are illustrative of database tables and fields that might be employed in connection with a network component of the present invention, such as for use with the above Example 1.
  • Users Table
    -----------
    UserID
    Login Created Date
    Last Time Login Date
    Number of Times Logged In
    Number of Downloads
    Billing Name
    Billing AddressLine1
    Billing AddressLine2
    Billing City
    Billing State
    Billing Zip
    Shipping Name
    Shipping AddressLine1
    Shipping AddressLine2
    Shipping City
    Shipping State
    Shipping Zip
    Card Type
    Card Number (encrypt?)
    Card Expiration (encrypt?)
    Card Code (encrypt?)
    email address
    Number of Succesful Charges
    Date of Last Successful charge
    Last Rejected TransactionID
    Number of UnSuccesful Charges
    Date of Last Unsuccessful charge
    Last Rejected TransactionID
    SuggestedMediaIDs[6] (based on actors, genre etc...)
    LastIPAddresses[20]
    IPAddressIndex
    Last date/time password sent to email
    Number of Times password sent to email
    Session Table
    -------------
    SessionCODE (unique big number - reliably random)
    UserID
    IP Address
    DateTime
    PageAccesses
    SuccessfulDownloads
    UnsuccessfulDownloads
    Media Table
    -----------
    MediaID
    Short Description
    Long Description
    Publisher
    Date of production
    Date added to database
    Actors
    Total number of downloads
    Thumbnails (array of 64?)
    People also bought (array of 5?)
    Current Rating
    “Aged” Number of Downloads
    “Aged” Rating
    Keywords (long string ? array?)
    Specific Properties
    Hard/Soft/No nudity
    Gay/Bi/Hetero/Lesbian/Transgender/NA
    Latin/Ebony/Interracial.../NA
    Shaved/Hairy/NA
    Amature/Professional/NA
    more...??
    Media Transactions (download purchases) Table
    ---------------------------------------------
    TransactionID
    UserID
    MediaID
    Date/Time
    TransactionNumber (from credit card company)
    Amount charged
    Tax charged
    Number of Download Attempts
    Successful (bool)
    “Aged” Media Transactions Table (used for backup and archiving)
    ---------------------------------------------------------------
    <Same as Media Transactions Table>
    <Media transactions “emptied” into an aged archive once a month
    or once a quarter>
    Merchandise Transactions Table (store purchases of hardware/accessories)
    ------------------------------------------------------------------------
    MerchandiseTransactionID
    UserID
    array of productIDs purchased
    Date/Time
    Amount charged
    Tax charged
    “Aged” Merchandise Transactions Table (used for backup and archiving)
    ---------------------------------------------------------------------
    <Same as Merchandise Transactions Table>
    <Merchandise transactions “emptied” into an aged archive once
    a month or once a quarter>
  • It will be further appreciated that functions or structures of a plurality of components or steps may be combined into a single component or step, or the functions or structures of one step or component may be split among plural steps or components. The functionality provided for in the components, modules, and databases may be combined into fewer components, modules, or databases or further separated into additional components, modules, or databases. Additionally, the components, modules, and databases may be implemented to execute on one or more computers. In another embodiment, some of the components, modules, and databases may be implemented to execute on one or more computers external to a website. In this instance, the website may include program logic to enable the website to communicate with the externally implemented components, modules, and databases to perform the functions as disclosed herein. The present invention contemplates all of these combinations.
  • In addition, while a feature of the present invention may have been described in the context of only one of the illustrated embodiments, such feature may be combined with one or more other features of other embodiments, for any given application. It will also be appreciated from the above that the use of the unique systems herein and the operation thereof also constitute methods in accordance with the present invention.
  • Descriptions herein to a multi-tier client/server architecture (e.g. in the context of operations performed by the network website component) are illustrative and do not preclude the use of other forms of architecture, such as where client and server functions are combined to a single computer or spread over a plurality of computers, including for example two or more computers (e.g. servers), a transaction processing monitor (e.g. TP monitor server, messaging server, application server, or any combination thereof).
  • The explanations and illustrations presented herein are intended to acquaint others skilled in the art with the invention, its principles, and its practical application. Those skilled in the art may adapt and apply the invention in its numerous forms, as may be best suited to the requirements of a particular use. Accordingly, the specific embodiments of the present invention as set forth are not intended as being exhaustive or limiting of the invention. The scope of the invention should, therefore, be determined not with reference to the above description, but should instead be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. The disclosures of all articles and references, including patent applications and publications referred to in the above text, are incorporated by reference for all purposes.

Claims (22)

1. An integrated electronic information system, comprising:
a) at least one user interface adapted for interaction with a user;
b) at least one database associated with a server that is remotely accessible by the user;
c) a username and password for each user that is encrypted;
d) a network for providing remote access to the at least one database by the user to enable downloading of adult digital content; and
e) a digital rights management framework, wherein the digital rights management framework restricts the ability of the user to copy downloaded digital content, the manner of use of digital content, the ability to transfer license rights in content between users, or a combination thereof.
2. The system of claim 1, further comprising a video viewer accessible through the at least one user interface.
3. The system of claim 1, further comprising a portable media player for synchronizing with a computer that displays the at least one user interface.
4. The system of claim 3 wherein the at least one database includes a plurality of digital content files and a plurality of links to other files.
5. (canceled)
6. The system of claim 4, wherein the system further comprises at least one framework for maintaining privacy and providing access to digital content without resulting unsolicited messages, banner advertisements, pop-up advertisements or any combination thereof.
7. The system of claim 6, wherein the system further comprises a security framework for preventing access to the at least one database to an unauthorized user.
8. (canceled)
9. The system of claim 7, wherein the system further comprises an establishment framework, an account payment framework, or a combination thereof.
10. The system of claim 1, wherein the at least one user interface is associated with a user computer, and the network is the internet.
11. The system of claim 10 wherein the user computer is a personal media player having an interface for permitting it to directly access the network.
12. The system of claim 1, wherein the at least one database associated with a server includes a plurality of databases, a plurality of servers or a combination thereof.
13. The system of claim 1, further comprising a framework for facilitating purchase of goods.
14. The system of claim 1, further comprising a framework for storing user selections for future reference.
15. The system of claim 9, further comprising a framework for providing selection recommendations to a user based upon popularity of one or more selections, the selection history of the user or a combination thereof.
16. A method for accessing adult content electronic information, comprising the steps of:
a. providing a user interface to a user over a network;
b. maintaining a database of digital content;
c. granting access to the user to the database for allowing the user to sample the digital content and select content for downloading by the user to a user managed storage medium;
d. encrypting a username and password for each user;
e. using a digital rights management framework so that the user's ability to copy downloaded files, disseminate downloaded files, and transfer downloaded files is restricted; and
f. transferring the digital content to the user for downloading by the user.
17. The method of claim 16, wherein the network is the Internet.
18. The method of claim 16, wherein the storage medium is selected from a hard disk, a floppy disk, a DVD, a CD, a magnetic recording tape, an optical recording device, a memory card, a memory stick, a flash storage medium, a memory key device, or any combination thereof.
19. The method of claim 17, further comprising displaying an interface to the user to permit the user to purchase goods for delivery via courier shipment.
20. The method of claim 16, wherein the network is the Internet and the digital content is provided in MPEG-1 files, is provided for synchronization with a portable media player or both.
21. The system of claim 6, further including a user table.
22. The method of claim 19, further comprising updating a user table.
US12/767,955 2004-01-06 2010-04-27 Digital content management, playback and delivery Abandoned US20100287070A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/767,955 US20100287070A1 (en) 2004-01-06 2010-04-27 Digital content management, playback and delivery

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US53449404P 2004-01-06 2004-01-06
US11/026,861 US7711605B1 (en) 2004-01-06 2004-12-30 Adult digital content management, playback and delivery
US12/767,955 US20100287070A1 (en) 2004-01-06 2010-04-27 Digital content management, playback and delivery

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/026,861 Continuation US7711605B1 (en) 2004-01-06 2004-12-30 Adult digital content management, playback and delivery

Publications (1)

Publication Number Publication Date
US20100287070A1 true US20100287070A1 (en) 2010-11-11

Family

ID=42124922

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/026,861 Expired - Fee Related US7711605B1 (en) 2004-01-06 2004-12-30 Adult digital content management, playback and delivery
US12/767,955 Abandoned US20100287070A1 (en) 2004-01-06 2010-04-27 Digital content management, playback and delivery

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/026,861 Expired - Fee Related US7711605B1 (en) 2004-01-06 2004-12-30 Adult digital content management, playback and delivery

Country Status (1)

Country Link
US (2) US7711605B1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8690682B1 (en) * 2010-05-26 2014-04-08 Wms Gaming, Inc. Browser based wagering game systems and configuration
US8911294B2 (en) 2010-08-06 2014-12-16 Wms Gaming, Inc. Browser based heterogenous technology ecosystem
US20150326565A1 (en) * 2009-02-03 2015-11-12 Inbay Technologies Inc. Method and system for authorizing secure electronic transactions using a security device having a quick response code scanner
US9345973B1 (en) 2010-08-06 2016-05-24 Bally Gaming, Inc. Controlling wagering game system browser areas
US9713763B2 (en) 2007-09-30 2017-07-25 Bally Gaming, Inc. Distributing information in a wagering game system
WO2018118268A1 (en) * 2016-12-19 2018-06-28 Sony Interactive Entertainment Network America Llc Personalized calendar for digital media content-related events
US10846779B2 (en) 2016-11-23 2020-11-24 Sony Interactive Entertainment LLC Custom product categorization of digital media content
US10891032B2 (en) 2012-04-03 2021-01-12 Samsung Electronics Co., Ltd Image reproduction apparatus and method for simultaneously displaying multiple moving-image thumbnails
US10931991B2 (en) 2018-01-04 2021-02-23 Sony Interactive Entertainment LLC Methods and systems for selectively skipping through media content
US11032269B2 (en) * 2009-02-03 2021-06-08 Inbay Technologies Inc. Method and system for establishing trusted communication using a security device

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100564731B1 (en) * 2004-08-13 2006-03-28 (주)잉카엔트웍스 A method for providing data to a personal portable device via network and a system thereof
US7490775B2 (en) * 2004-12-30 2009-02-17 Aol Llc, A Deleware Limited Liability Company Intelligent identification of multimedia content for synchronization
US7734779B1 (en) * 2005-08-25 2010-06-08 Gregory Alexander Piccionelli Password protection system and method
US7937422B1 (en) 2005-11-03 2011-05-03 Aol Inc. Digital asset hosting and distribution
US9386327B2 (en) * 2006-05-24 2016-07-05 Time Warner Cable Enterprises Llc Secondary content insertion apparatus and methods
US8024762B2 (en) 2006-06-13 2011-09-20 Time Warner Cable Inc. Methods and apparatus for providing virtual content over a network
US20100083243A1 (en) * 2008-09-29 2010-04-01 Synopsys, Inc. System and method for delivering software
US9215423B2 (en) 2009-03-30 2015-12-15 Time Warner Cable Enterprises Llc Recommendation engine apparatus and methods
US8813124B2 (en) 2009-07-15 2014-08-19 Time Warner Cable Enterprises Llc Methods and apparatus for targeted secondary content insertion
US20110247059A1 (en) * 2010-03-31 2011-10-06 International Business Machines Corporation Methods and Apparatus for Role-Based Shared Access Control to a Protected System Using Reusable User Identifiers
US20110264530A1 (en) 2010-04-23 2011-10-27 Bryan Santangelo Apparatus and methods for dynamic secondary content and data insertion and delivery
US8694604B2 (en) 2011-08-25 2014-04-08 Microsoft Corporation Accurate search results while honoring content limitations
US9270657B2 (en) * 2011-12-22 2016-02-23 Intel Corporation Activation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure
US9013698B2 (en) 2012-04-26 2015-04-21 Halliburton Energy Services, Inc. Imaging systems for optical computing devices
US8780352B2 (en) 2012-04-26 2014-07-15 Halliburton Energy Services, Inc. Methods and devices for optically determining a characteristic of a substance
US9013702B2 (en) 2012-04-26 2015-04-21 Halliburton Energy Services, Inc. Imaging systems for optical computing devices
US8823939B2 (en) 2012-04-26 2014-09-02 Halliburton Energy Services, Inc. Methods and devices for optically determining a characteristic of a substance
US9019501B2 (en) 2012-04-26 2015-04-28 Halliburton Energy Services, Inc. Methods and devices for optically determining a characteristic of a substance
US8941046B2 (en) 2012-04-26 2015-01-27 Halliburton Energy Services, Inc. Methods and devices for optically determining a characteristic of a substance
US10041331B2 (en) 2015-02-18 2018-08-07 Halliburton Energy Services, Inc. Shifting tool assembly that facilitates controlled pressure equalization
KR102355624B1 (en) * 2015-09-11 2022-01-26 엘지전자 주식회사 Mobile terminal and method for controlling the same
US10586023B2 (en) 2016-04-21 2020-03-10 Time Warner Cable Enterprises Llc Methods and apparatus for secondary content management and fraud prevention
US11540132B2 (en) * 2019-04-29 2022-12-27 Sonicwall Inc. Method for providing an elastic content filtering security service in a mesh network
US11438963B2 (en) 2019-04-29 2022-09-06 Sonicwall Inc. Method for providing an elastic content filtering security service in a mesh network
US11310665B2 (en) * 2019-04-29 2022-04-19 Sonicwall Inc. Elastic security services and load balancing in a wireless mesh network
US11403849B2 (en) 2019-09-25 2022-08-02 Charter Communications Operating, Llc Methods and apparatus for characterization of digital content

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US5724424A (en) * 1993-12-16 1998-03-03 Open Market, Inc. Digital active advertising
US5960411A (en) * 1997-09-12 1999-09-28 Amazon.Com, Inc. Method and system for placing a purchase order via a communications network
US20020095386A1 (en) * 2000-12-07 2002-07-18 Maritzen L. Michael Account control and access management of sub-accounts from master account
US20030079133A1 (en) * 2001-10-18 2003-04-24 International Business Machines Corporation Method and system for digital rights management in content distribution application
US20030131252A1 (en) * 1999-10-20 2003-07-10 Barton James M. Electronic content distribution and exchange system
US6609113B1 (en) * 1999-05-03 2003-08-19 The Chase Manhattan Bank Method and system for processing internet payments using the electronic funds transfer network
US20030225796A1 (en) * 2002-05-31 2003-12-04 Hitachi, Ltd. Method and apparatus for peer-to-peer file sharing
US6670537B2 (en) * 2001-04-20 2003-12-30 Sony Corporation Media player for distribution of music samples
US6671681B1 (en) * 2000-05-31 2003-12-30 International Business Machines Corporation System and technique for suggesting alternate query expressions based on prior user selections and their query strings
US20040078293A1 (en) * 2000-12-21 2004-04-22 Vaughn Iverson Digital content distribution
US20040123129A1 (en) * 1995-02-13 2004-06-24 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
US20040220791A1 (en) * 2000-01-03 2004-11-04 Interactual Technologies, Inc. A California Corpor Personalization services for entities from multiple sources
US6959861B1 (en) * 2003-12-02 2005-11-01 Metro Innovations, Inc. Method of age verification for electronic media
US7080030B2 (en) * 2001-02-28 2006-07-18 Digonex Technologies, Inc. Digital online exchange

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5724424A (en) * 1993-12-16 1998-03-03 Open Market, Inc. Digital active advertising
US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US20040123129A1 (en) * 1995-02-13 2004-06-24 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
US5960411A (en) * 1997-09-12 1999-09-28 Amazon.Com, Inc. Method and system for placing a purchase order via a communications network
US6609113B1 (en) * 1999-05-03 2003-08-19 The Chase Manhattan Bank Method and system for processing internet payments using the electronic funds transfer network
US20030131252A1 (en) * 1999-10-20 2003-07-10 Barton James M. Electronic content distribution and exchange system
US20040220791A1 (en) * 2000-01-03 2004-11-04 Interactual Technologies, Inc. A California Corpor Personalization services for entities from multiple sources
US6671681B1 (en) * 2000-05-31 2003-12-30 International Business Machines Corporation System and technique for suggesting alternate query expressions based on prior user selections and their query strings
US20020095386A1 (en) * 2000-12-07 2002-07-18 Maritzen L. Michael Account control and access management of sub-accounts from master account
US20040078293A1 (en) * 2000-12-21 2004-04-22 Vaughn Iverson Digital content distribution
US7080030B2 (en) * 2001-02-28 2006-07-18 Digonex Technologies, Inc. Digital online exchange
US6670537B2 (en) * 2001-04-20 2003-12-30 Sony Corporation Media player for distribution of music samples
US20030079133A1 (en) * 2001-10-18 2003-04-24 International Business Machines Corporation Method and system for digital rights management in content distribution application
US20030225796A1 (en) * 2002-05-31 2003-12-04 Hitachi, Ltd. Method and apparatus for peer-to-peer file sharing
US6959861B1 (en) * 2003-12-02 2005-11-01 Metro Innovations, Inc. Method of age verification for electronic media

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9713763B2 (en) 2007-09-30 2017-07-25 Bally Gaming, Inc. Distributing information in a wagering game system
US10406426B2 (en) 2007-09-30 2019-09-10 Bally Gaming, Inc. Distributing information in a wagering game system
US11716321B2 (en) 2009-02-03 2023-08-01 Inbay Technologies Inc. Communication network employing a method and system for establishing trusted communication using a security device
US20150326565A1 (en) * 2009-02-03 2015-11-12 Inbay Technologies Inc. Method and system for authorizing secure electronic transactions using a security device having a quick response code scanner
US11032269B2 (en) * 2009-02-03 2021-06-08 Inbay Technologies Inc. Method and system for establishing trusted communication using a security device
US9608988B2 (en) * 2009-02-03 2017-03-28 Inbay Technologies Inc. Method and system for authorizing secure electronic transactions using a security device having a quick response code scanner
US8690682B1 (en) * 2010-05-26 2014-04-08 Wms Gaming, Inc. Browser based wagering game systems and configuration
US9345973B1 (en) 2010-08-06 2016-05-24 Bally Gaming, Inc. Controlling wagering game system browser areas
US9672691B2 (en) 2010-08-06 2017-06-06 Bally Gaming, Inc. Controlling wagering game system browser areas
US10186111B2 (en) 2010-08-06 2019-01-22 Bally Gaming, Inc. Controlling wagering game system browser areas
US9619959B2 (en) 2010-08-06 2017-04-11 Bally Gaming, Inc. Wagering game presentation with multiple technology containers in a web browser
US9269220B2 (en) 2010-08-06 2016-02-23 Bally Gaming, Inc. Web page constructions with different technology containers
US8911294B2 (en) 2010-08-06 2014-12-16 Wms Gaming, Inc. Browser based heterogenous technology ecosystem
US10891032B2 (en) 2012-04-03 2021-01-12 Samsung Electronics Co., Ltd Image reproduction apparatus and method for simultaneously displaying multiple moving-image thumbnails
US10846779B2 (en) 2016-11-23 2020-11-24 Sony Interactive Entertainment LLC Custom product categorization of digital media content
WO2018118268A1 (en) * 2016-12-19 2018-06-28 Sony Interactive Entertainment Network America Llc Personalized calendar for digital media content-related events
US10860987B2 (en) * 2016-12-19 2020-12-08 Sony Interactive Entertainment LLC Personalized calendar for digital media content-related events
US10931991B2 (en) 2018-01-04 2021-02-23 Sony Interactive Entertainment LLC Methods and systems for selectively skipping through media content

Also Published As

Publication number Publication date
US7711605B1 (en) 2010-05-04

Similar Documents

Publication Publication Date Title
US7711605B1 (en) Adult digital content management, playback and delivery
US11507613B2 (en) Method and system for sharing playlists
US7848955B2 (en) On-line media store that supports pre-ordering of digital media assets
CN102203771B (en) Electronic submission of application programs for network-based distribution
US7848954B2 (en) On-line media store that supports pre-ordering of digital media assets
US6247130B1 (en) Distribution of musical products by a web site vendor over the internet
US6233682B1 (en) Distribution of musical products by a web site vendor over the internet
US8504441B2 (en) Services for providing item association data
US7797242B2 (en) Method and system for network-based purchase and distribution of media
JP4624354B2 (en) Music purchasing and playback system and method
US20100299761A1 (en) System and method for sending electronic data to inmates
US20110040658A1 (en) Network-Based Purchase and Distribution of Media
US20020059120A1 (en) Method and apparatus for creating and maintaining a virtual inventory in a distributed network
US20080027874A1 (en) System and method for facilitating secure transactions over communication networks
EP1902421A2 (en) A digital publication system and apparatus
US20100262508A1 (en) Method and system for an online library marketplace
US20140310821A1 (en) Electronic single action software distribution
JP2003526805A6 (en) Distribution of music products via the Internet
WO2000043904A1 (en) Distribution of musical products over the internet
JP2001326921A (en) Contents management system, contents management method, camera apparatus
JP2012088848A (en) History data generating device, history screen generating program, and recording medium recording the program
JP2001516906A (en) Data distribution system for computer networks
KR101032474B1 (en) Mathod for providing electronic catalog service and system thereof
JP2010524058A (en) Custom media generation and distribution systems and methods
KR20020073213A (en) System for operating E-commerce service

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION