Claims
- 1. A method of identifying transmissions of digital works comprising:
maintaining a registry of information permitting identification of digital works; monitoring a network for transmission of at least one packet-based digital signal; extracting at least one feature from the at least one digital signal; comparing the extracted at least one feature with registry information to assess whether the at least one digital signal includes a transmission of at least one portion of a registered digital work; and taking action based on the result of the comparison
- 2. The method of claim 1, further comprising the step of initiating an action based on the result of the comparison step, wherein the action is in accordance with at least one pre-defined business rule(s).
- 3. The method of claim 1, wherein said action comprises the step of recording information identifying transmissions of digital works.
- 4. The method of claim 1, further comprising the step of extracting the recipient address from the digital transmission and determining whether an address is authorized to receive a registered work included in the at least one digital signal.
- 5. The method of claim 4, further comprising the step of initiating an action based on the result of authorization determination step, wherein the action is in accordance with pre-defined business rules.
- 6. The method of claim 1, further comprising the step of extracting the source address from the digital transmission and determining whether an address is authorized to transmit a registered work included in the at least one digital signal.
- 7. The method of claim 6, further comprising the step of initiating an action based on the result of authorization identification step, wherein the action is in accordance with pre-defined business rules.
- 8. The method of claim 2, wherein the at least one business rules is selected from the set consisting of: interrupting transmission of the at least one digital signal;
providing a message to the recipient address; providing a message to the source address; referring the recipient address to a commercial site where the registered digital work may be purchased; forwarding an advertisement to the recipient address; recording information about the transmission; and reporting information about the transmission.
- 9. The method of claim 2, wherein the at least one business rules is selected from the set consisting of: inserting different digital content into the transaction; or replacing the digital content with other digital content.
- 10. The method of claim 1, wherein the at least one digital signal comprises one or more of digital audio information, digital video information, digital text, software, or digital image information.
- 11. The method of claim 1, further comprising the step of preparing reports including information on transmissions of digital works.
- 12. The method of claim 1, further comprising the step of network traffic analysis.
- 13. The method of claim 1, wherein the at least one feature extracted from the digital signal is selected from the group consisting of: file name, file size, file type, source address, recipient address, metadata identifiers, a watermark, a file hash, protocol type, text content, and enough data to generate a content-based fingerprint.
- 14. The method of claim 1, further comprising the step of generating a content-based fingerprint from the at least one digital signal.
- 15. The method of claim 1, wherein the registry includes content-based fingerprints which represent digital works, and the comparison step includes the comparison of fingerprint(s) generated from the at least one digital signal with fingerprints in the registry.
- 16. The method of claim 1, wherein the assessment of whether the comparison of at least one extracted feature with registry information is performed according to a hierarchy of comparison criteria.
- 17. The method of claim 1, wherein the registry is composed of information pertaining to copyrighted works.
- 18. The method of claim 1, wherein the action taken is to implement a strategy to cache certain digital content in the network.
- 19. The method of claim 18, wherein the action taken is based on geographic or network topologic information associated with the destination of the transmission.
- 20. The method of claim 1, wherein the at least one portion comprises information that represents the entire digital work.
- 21. A digital works identification system comprising:
a first memory for storing information permitting identification of digital works; a digital input receiver for receiving at least one packet-based digital signal transmitted over a network; a second memory for storing at least one portion of the at least one packet-based digital signal; and at least one processor for obtaining at least one feature from the at least one digital signal and comparing the at least one feature with the stored identifying information.
- 22. The method of claim 21, wherein the system is intended to protect copyrighted works.
- 23. The method of claim 21, wherein the system is intended to identify new digital works.
- 24. The system of claim 21, wherein the at least one feature includes data sufficient to generate a content-based fingerprint from the content of the at least one digital signal.
- 25. The system of claim 21, wherein the at least one feature includes feature vectors generated from the content of the at least one digital signal.
- 26. The system of claim 21, wherein the at least one digital signal comprises one or more of digital audio information, digital video information, digital representation of text, software, and digital image information.
- 27. The system of claim 21, wherein the at least one processor identifies digital works carried by the at least one packet-based digital signal.
- 28. The system of claim 21, wherein the at least one packet-based digital signal is characterized by at least one of: a source address; or a destination address.
- 29. the system of claim 21, further comprising a third memory for recording the identified transmissions.
- 30. The system of claim 29, wherein the third memory further includes a transaction database.
- 31. The system of claim 29, further comprising a report generator for generating reports on transmissions carried by the at least one packet-based digital signal.
- 32. The system of claim 28, further comprising a transaction request broker for identifying whether a destination address is authorized to receive the content of the at least one digital signal.
- 33. The system of claim 32, further comprising means for disabling transmission of at least a portion of the at least one packet-based digital signal if the destination address is not authorized to receive the content of the at least one digital signal.
- 34. The system of claim 28, further comprising a transaction request broker for identifying whether a source address is authorized to transmit the content of the at least one digital signal.
- 35. The system of claim 34, further comprising means for disabling transmission of at least a portion of the at least one packet-based digital signal if the source address is not authorized to transmit the content of the at least one digital signal.
- 36. The system of claim 28, further comprising a message generator for sending a message to the source address or destination address upon detection of an identified transmission.
- 37. The system of claim 36, wherein the message directs a destination address to a commercial site where authorization to obtain the desired content may be purchased.
- 38. The system of claim 28, wherein other content is inserted into the transmission.
- 39. The system of claim 28, wherein other content is substituted into the transmission.
- 40. The system of claim 21, wherein the at least one processor includes:
a content type recognizer for identifying the file type of a packet-based digital signal.
- 41. The system of claim 21, wherein the at least one processor includes:
a content identifier for identifying the content of a packet-based digital signal.
- 42. A digital works identification system comprising:
a first database containing features of digital works; a digital input receiver for receiving at least one digital signal characterized by a source address and a recipient address; a feature extractor for extracting features from the digital signal; and a feature comparator for comparing features extracted from the digital signal against features contained in the database.
- 43. The system of claim 42, wherein the database further contains authorization indicators indicating whether an intended recipient is authorized to receive particular content.
- 44. The system of claim 42, wherein the database further contains authorization indicators indicating whether an intended source is authorized to transmit a particular digital work.
- 45. A method for conducting a business enterprise, the method comprising the steps of:
maintaining a first database for storing features permitting the identification of registered digital works; monitoring a network for transmission of at least one digital signal characterized by a source and recipient address; extracting at least one feature from the at least one digital signal; comparing the extracted at least one feature with features from the database to determine whether the digital signal includes a registered digital work; and taking action based on business rules.
- 46. The method of claim 45 wherein said taking action comprises recording information identifying transmissions of registered digital works.
- 47. The method of claim 45, further comprising the step of determining whether a recipient address is authorized to receive transmission of a registered digital work.
- 48. The method of claim 45, further comprising the step of initiating an action based on the result of the identification step, wherein the action is in accordance with pre-defined business rules.
- 49. The method of claim 45, further comprising the step of generating at least one feature of a registered digitial work, wherein the at least one feature includes feature vectors.
- 50. The method of claim 45, wherein the at least one feature includes source address.
- 51. The method of claim 45, wherein the at least one feature includes destination address.
- 52. The method of claim 45, wherein the at least one digital signal comprises one or more of audio information, video information, image information, digital representation of text, or software.
- 53. The method of claim 45, further comprising the step of soliciting owners of digital works to register digital works with the business enterprise for inclusion in the first database.
- 54. The method of claim 45, further comprising the step of obtaining value from owners of digital works in exchange for registration of digital works in the first database.
- 55. The method of claim 45, further comprising the step of obtaining value from network providers or network operators in exchange for providing a copyright protection system or copyright protection services.
- 56. The method of claim 47, further comprising the step of referring an intended recipient not authorized to receive a registered digital work to a commercial site where authorization to receive the registered digital work may be purchased.
- 57. The method of claim 56, further comprising the step of soliciting value from commercial sites to which intended recipients are referred by the business enterprise.
- 58. The method of claim 47, further comprising the step of precluding an unauthorized recipient address from receiving uninterrupted transmission of a registered digital work.
- 59. The method of claim 45, further comprising the step of determining whether a source address is authorized to transmit a registered digital work.
- 60. The method of claim 59, further comprising the step of precluding an unauthorized source address from sending uninterrupted transmission of a registered digital work.
- 61. The method of claim 47, further comprising the step of transmitting a message to an unauthorized recipient address.
- 62. The method of claim 59, further comprising the step of transmitting a message to an unauthorized source address.
- 63. The method of claim 45, further comprising the step of inserting digital content into the transmission.
- 64. The method of claim 45, further comprising the step of substituting digital content into the transmission.
- 65. The method of claim 61, wherein the message includes instructions by which an unauthorized recipient address may purchase authorization to receive a registered digital work.
- 66. The method of claim 45, wherein the identifiers of registered digital works are generated from the content of the digital works.
- 67. The method of claim 45, further comprising the step of maintaining a second database recording transmissions of digital works over the network.
- 68. The method of claim 67 wherein the second database includes recipient addresses.
- 69. The method of claim 67, wherein the second database includes source addresses.
- 70. The method of claim 67, further comprising the step of preparing reports including transaction information.
- 71. The method of claim 67, further comprising the step of selling the reports.
- 72. The method of claim 45, wherein the network includes a connection to the Internet.
- 73. The method of claim 45, further comprising the step of maintaining a second database recording information identifying transmissions in digital works over the network.
- 74. A method for altering the behavior of a device based on the transmissions of digital works comprising:
maintaining a registry of information permitting identification of digital works; monitoring a network for transmission of at least one packet-based digital signal; extracting at least one feature from the at least one digital signal; comparing the extracted at least one feature with registry information to assess whether the at least one digital signal includes a transmission of a registered digital work; accumulating statistical measurements of the features of the transmitted digital works; and altering the functional behavior of the device based on the comparison of the transmitted work
- 75. The method of claim 74, wherein the device is a network component.
- 76. The method of claim 74, wherein the functional behavior that is altered is allocating bandwidth to different categories of network use.
- 77. The method of claim 74, wherein a database of frequently identified digital works is maintained such that these works could be inserted into the digital stream in place of the original source transmission.
- 78. A registry of digital works comprising:
an identifier to link a digital work to associated information about the work; at least one feature of the digital work permitting the digital work to be identified; business rules that indicate how the digital work may be transmitted over a digital stream.
- 79. The method of claim 78, wherein the at least one feature extracted from the digital signal is selected from the group consisting of: file name, file size, file type, source address, recipient address, metadata identifiers, a watermark, a file hash, protocol type, text content, and a content-based fingerprint.
- 80. The method of claim 78, wherein the business rules indicate whether a particular address or range of addresses is authorized to transmit said digital work.
- 81. The method of claim 78, wherein the business rules indicate whether a particular address or range of addresses is authorized to receive said digital work.
PRIORITY CLAIM
[0001] This application claims the benefit of U.S. Provisional Application Serial No. 60/281,881, filed Apr. 5, 2001.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60281881 |
Apr 2001 |
US |