Intelligent accompaniment apparatus and method
First Claim
1. A method for preventing the unauthorized use of a repertoire data file with a digital computer and a data cartridge, the repertoire data file having a serial number, file length value, and a predetermined series of target data keys each generated by one of a series of different encryption algorithms, the method comprising the steps of:
- (a) extracting the serial number and the file length value from the repertoire data file;
(b) selecting an encryption data key from a predetermined series of data keys contained in the data cartridge;
(c) using one of the series of different encryption algorithms and the selected encryption data key to encrypt the serial number and file length value to generate a resultant data key;
(d) comparing the resultant data key to one of the series of target data keys; and
(e) allowing access to the repertoire data file if the resultant data key matches one of the series of target data keys.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for interpreting the requests and performance of an instrumental soloist, stated in the parlance of the musician and within the context of a specific published edition of music the soloist is using, to control the performance of a digitized musical accompaniment. Sound events and their associated attributes are extracted from the soloist performance and are numerically encoded. The pitch, duration and event type of the encoded sound events are then compared to a desired sequence of the performance score to determine if a match exists between the soloist performance and the performance score. If a match exists between the soloist performance and the performance score, the system instructs a music synthesizer module to provide an audible accompaniment for the soloist. The system can provide an accompaniment for a selectable amount of time even if the soloist intentionally or unintentionally departs from the score.
-
Citations
2 Claims
-
1. A method for preventing the unauthorized use of a repertoire data file with a digital computer and a data cartridge, the repertoire data file having a serial number, file length value, and a predetermined series of target data keys each generated by one of a series of different encryption algorithms, the method comprising the steps of:
-
(a) extracting the serial number and the file length value from the repertoire data file; (b) selecting an encryption data key from a predetermined series of data keys contained in the data cartridge; (c) using one of the series of different encryption algorithms and the selected encryption data key to encrypt the serial number and file length value to generate a resultant data key; (d) comparing the resultant data key to one of the series of target data keys; and (e) allowing access to the repertoire data file if the resultant data key matches one of the series of target data keys. - View Dependent Claims (2)
-
Specification