IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0711000
(2000-11-09)
|
발명자
/ 주소 |
|
출원인 / 주소 |
|
인용정보 |
피인용 횟수 :
15 인용 특허 :
9 |
초록
▼
A distribution server distributes A/V content to a recipient according to terms determined from information stored in a database of prior unauthorized copying attributed to that recipient. The copy distributed to the recipient includes identifications of the content and recipient embedded in it by a
A distribution server distributes A/V content to a recipient according to terms determined from information stored in a database of prior unauthorized copying attributed to that recipient. The copy distributed to the recipient includes identifications of the content and recipient embedded in it by an ID embedder employing a steganographic or watermarking technique. A detection server detects embedded ID's in A/V content sampled from various distribution channels, and provides the ID information to the distribution server to update the database of prior unauthorized copying.
대표청구항
▼
I claim: 1. A computer implemented method for distributing protected material, comprising: ascertaining terms for providing a protected material to a prospective recipient according at least in part to information of unauthorized copying of other protected material previously provided to said prosp
I claim: 1. A computer implemented method for distributing protected material, comprising: ascertaining terms for providing a protected material to a prospective recipient according at least in part to information of unauthorized copying of other protected material previously provided to said prospective recipient; and providing or withholding a copy of said protected material to said prospective recipient in accordance with said ascertained terms. 2. The method according to claim 1, wherein said ascertaining further includes obtaining said information of unauthorized copying from a database. 3. The method according to claim 1, wherein said providing comprises providing a copy of said protected material to said prospective recipient in the form of a file. 4. The method according to claim 1, wherein said providing comprises providing a copy of said protected material to said prospective recipient in the form of streaming media. 5. The method according to claim 4, wherein said protected material includes audio-visual content. 6. The method according to claim 5, further comprising embedding an identification of said protected material in said copy prior to providing said copy to said prospective recipient. 7. The method according to claim 5, further comprising embedding an identification of said prospective recipient in said copy prior to providing said copy to said prospective recipient. 8. The method according to claim 7, wherein said embedding employs a steganographic technique. 9. The method according to claim 7, wherein said embedding employs a watermarking technique. 10. The method according to claim 7, wherein said identification of said prospective recipient includes a credit card number of said prospective recipient. 11. The method according to claim 7, wherein said identification of said prospective recipient includes an electronic signature of said prospective recipient. 12. The method according to claim 7, wherein said identification of said prospective recipient includes a serial number associated with a computer of said prospective recipient. 13. The method according to claim 7, wherein said identification of said prospective recipient includes an Internet protocol address associated with a network interface card in a computer of said prospective recipient. 14. The method according to claim 7, further comprising encrypting said protected material in said copy of said protected material prior to providing said copy to said prospective recipient. 15. The method according to claim 7, wherein said ascertaining comprises determining a price for providing said protected material to said prospective recipient according to a formula and information of unauthorized copying of other protected material previously provided to said prospective recipient. 16. The method according to claim 15, further comprising receiving an identification of said protected material and said identification of said prospective recipient over the Internet, and said providing of said copy of said protected material to said prospective recipient employs the Internet. 17. The method according to claim 15, wherein said ascertaining comprises: transmitting said identification of said prospective recipient to a remote server; and receiving said terms for providing said protected material to said prospective recipient back from said remote server. 18. The method according to claim 17, wherein said providing comprises: recording said copy of said protected material on a tangible medium; and providing said tangible medium to said prospective recipient according to said terms. 19. The method according to claim 18, wherein said tangible medium is a compact disc. 20. The method according to claim 18, wherein said tangible medium is a digital versatile disc. 21. An apparatus for distributing protected material, comprising a computer having a first set of program code for: ascertaining terms for providing a protected material to a prospective recipient according at least in part to information of unauthorized copying of other protected material previously provided to said prospective recipient; and providing or withholding a copy of said protected material to or from said prospective recipient in accordance with said ascertained terms. 22. The apparatus according to claim 21, wherein said ascertaining further includes obtaining said information of unauthorized copying from a database. 23. The apparatus according to claim 21, wherein said providing comprises providing a copy of said protected material to said prospective recipient in the form of a file. 24. The apparatus according to claim 21, wherein said providing comprises providing a copy of said protected material to said prospective recipient in the form of streaming media. 25. The apparatus according to claim 24, wherein said protected material includes audio-visual content. 26. The apparatus according to claim 25, wherein said computer has a second set of program code for embedding an identification of said protected material in said copy prior to providing said copy to said prospective recipient. 27. The apparatus according to claim 26, wherein said computer has a second set of program code for embedding an identification of said prospective recipient in said copy prior to providing said copy to said prospective recipient. 28. The apparatus according to claim 27, wherein said embedding employs a steganographic technique. 29. The apparatus according to claim 27, wherein said embedding employs a watermarking technique. 30. The apparatus according to claim 27, wherein said identification of said prospective recipient includes a credit card number of said prospective recipient. 31. The apparatus according to claim 27, wherein said identification of said prospective recipient includes an electronic signature of said prospective recipient. 32. The apparatus according to claim 27, wherein said identification of said prospective recipient includes a serial number associated with a computer of said prospective recipient. 33. The apparatus according to claim 27, wherein said identification of said prospective recipient includes an Internet protocol address associated with a network interface card in a computer of said prospective recipient. 34. The apparatus according to claim 27, wherein said computer has a third set of program code for encrypting said protected material in said copy prior to providing said copy to said prospective recipient. 35. The apparatus according to claim 27, wherein said ascertaining comprises determining a price for providing said protected material to said prospective recipient according to a formula and information of unauthorized copying of other protected material previously provided to said prospective recipient. 36. The apparatus according to claim 35, wherein said first set of program code is further for receiving an identification of said protected material and said identification of said prospective recipient over the Internet, and said providing of said copy of said protected material to said prospective recipient employs the Internet. 37. The apparatus according to claim 35, wherein said ascertaining comprises: transmitting said identification of said prospective recipient to a remote server; and receiving said terms for providing said protected material to said prospective recipient back from said remote server. 38. The apparatus according to claim 37, wherein said providing comprises: recording said copy of said protected material on a tangible medium; and providing said tangible medium to said prospective recipient according to said terms. 39. The apparatus according to claim 38, wherein said tangible medium is a compact disc. 40. The apparatus according to claim 38, wherein said tangible medium is a digital versatile disc. 41. A computer implemented method for generating a database of unauthorized copying of protected material, comprising: detecting at least one identification embedded in a copy of protected material procured from a distribution channel; and storing information of said protected material according to said at least one identification in a database so as to be indicative of unauthorized copying of said protected material. 42. The method according to claim 41, wherein said at least one identification includes a content identification identifying said protected material, and a recipient identification identifying a recipient of said protected material. 43. The method according to claim 42, wherein said at least one identification has been embedded in said protected material by a steganographic technique. 44. The method according to claim 42, wherein said at least one identification has been embedded in said protected material by a watermarking technique. 45. The method according to claim 42, wherein said protected material includes audio-visual content. 46. The method according to claim 45, wherein said recipient is an original purchaser of said copy of said protected material. 47. The method according to claim 46, wherein said recipient identification is a credit card number of said original purchaser. 48. The method according to claim 45, wherein said recipient is an independent contractor involved in post-production work on said protected material. 49. The method according to claim 45, further comprising procuring said copy of said protected material over the Internet. 50. The method according to claim 49, wherein said procuring comprises: contacting a list server; and downloading a copy of a selected protected material from an on-line client identified by said list server. 51. The method according to claim 49, wherein said procuring comprises: searching for a selected protected material; and downloading a coy of said selected protected material from an on-line client identified as a result of said searching. 52. An apparatus for generating a database of unauthorized copying of protected material, comprising a computer having a first set of program code for: detecting at least one identification embedded in a copy of protected material procured from a distribution channel; and storing information of said protected material according to said at least one identification in a database so as to be indicative of unauthorized copying of said protected material. 53. The apparatus according to claim 52, wherein said at least one identification includes a content identification identifying said protected material, and a recipient identification identifying a recipient of said protected material. 54. The apparatus according to claim 53, wherein said at least one identification has been embedded in said protected material by a steganographic technique. 55. The apparatus according to claim 53, wherein said at least one identification has been embedded in said protected material by a watermarking technique. 56. The apparatus according to claim 53, wherein said protected material includes audio-visual content. 57. The apparatus according to claim 56, wherein said recipient is an original purchaser of a copy of said protected material. 58. The apparatus according to claim 57, wherein said recipient identification is a credit card number of said original purchaser. 59. The apparatus according to claim 56, wherein said recipient is an independent contractor involved in post-production work on said protected material. 60. The apparatus according to claim 56, wherein said computer has a second set of program code for procuring said protected material over the Internet. 61. The apparatus according to claim 60, wherein said procuring comprises: contacting a list server; and downloading a copy of a selected protected material from an on-line client identified by said list server. 62. The apparatus according to claim 60, wherein said procuring comprises: searching for a selected protected material; and downloading a copy of said selected protected material from an on-line client identified as a result of said searching. 63. An apparatus for distributing protected material, comprising: a detection server having a first program for detecting identifications embedded in copies of protected materials procured from at least one distribution channel, and storing information of said protected materials according to said identifications in a database so as to be indicative of unauthorized copying of said protected material; and a distribution server having a second program for ascertaining terms for providing a protected material to a prospective recipient according at least in part to said information in said database, and providing or withholding a copy of said protected material to said prospective recipient in accordance with said ascertained terms. 64. The apparatus according to claim 63, wherein said protected material includes audio-visual content. 65. The apparatus according to claim 64, wherein said distribution server has a third program for embedding an identification of said protected material in said copy prior to providing said copy to said prospective recipient. 66. The apparatus according to claim 65, wherein said third program is further for embedding an identification of said recipient in said copy prior to providing said copy to said prospective recipient. 67. The apparatus according to claim 66, wherein said embedding employs a steganographic technique. 68. The apparatus according to claim 66, wherein said embedding employs a watermarking technique. 69. The apparatus according to claim 64, wherein said ascertaining comprises determining a price for providing said protected material to said prospective recipient according to a formula and said information in said database. 70. The apparatus according to claim 69, wherein said second program is further for receiving a content identification of said protected material and a recipient identification of said prospective recipient over the Internet, and said providing of said copy employs the Internet. 71. The apparatus according to claim 64, wherein said detection server has a fourth program for procuring said protected material from at least one distribution channel over the Internet. 72. The apparatus according to claim 71, wherein said procuring comprises: contacting a list server; and downloading selected protected materials from online clients identified by said list server. 73. The apparatus according to claim 71, wherein said procuring comprises: searching for selected protected materials; and downloading said selected protected materials from on-line clients identified as a result of said searching.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.