IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0620019
(2000-07-20)
|
등록번호 |
US-7689532
(2010-04-23)
|
발명자
/ 주소 |
|
출원인 / 주소 |
|
인용정보 |
피인용 횟수 :
53 인용 특허 :
41 |
초록
▼
Peer-to-peer file sharing is increasing in popularity on the Internet, faster than any product known in history. Although file-sharing can enable massive piracy, it has many advantages for distribution of information including scalability. Alternatively, file-sharing can be sabotaged with falsified
Peer-to-peer file sharing is increasing in popularity on the Internet, faster than any product known in history. Although file-sharing can enable massive piracy, it has many advantages for distribution of information including scalability. Alternatively, file-sharing can be sabotaged with falsified files and used to distribute viruses. To this end, a solution that maintains the scalability of file-sharing and promotes reliability is proposed. The solution involves embedding data within the file or content and using the data to identify the content, demonstrate its completeness and lack of viruses, and verify the file can be shared. The embedded data can be checked when the file is registered with the database for sharing, and before or while the file is being uploaded and/or downloaded. Ideally, the embedded data is added at the time of creation for the file. The embedded data may include a watermark and be linked to other copy management systems, such as those proposed in DVD and SDMI. Finally, the embedded data can be used to enable purchases of files that owners do not have rights to share.
대표청구항
▼
The invention claimed is: 1. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, and in response to finding the embedded data, instructing the user's comp
The invention claimed is: 1. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, and in response to finding the embedded data, instructing the user's computer to act according to the embedded data; wherein the user's computer interacts with the embedded data to control file-sharing in the file sharing system, and the embedded data includes an identifier of content in the file, the identifier serving as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry; the database indicating files available for sharing in the file sharing system. 2. A computer readable storage medium on which is stored instructions for performing the method of claim 1. 3. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, wherein the embedded data includes data throughout the file that facilitates verification that the file is at least one of complete and free of a virus, and in response to finding the embedded data, instructing the user's computer to act according to the embedded data, including verifying that the file is at least one of complete and free of a virus, and indicating a result of the verifying; wherein the user's computer interacts with the embedded data to control file-sharing in the file sharing system. 4. The method of claim 3 in which the embedded data is modified by the content and encrypted to improve its robustness to impersonation. 5. The method of claim 3 in which the embedded data includes an identifier of the content to facilitate automated searching. 6. The method of claim 5 in which the embedded data includes data to determine whether content in the file can be shared. 7. A computer readable storage medium on which is stored instructions for performing the method of claim 3. 8. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, determining from processing of the embedded data whether to allow transfer of the file to or from another computer in response to a request to share the file in the file sharing system and in response to the processing of the embedded data, instructing the user's computer to act according to the embedded data; wherein the user's computer interacts with the embedded data to control file-sharing in the file sharing system. 9. A computer readable storage medium on which is stored instructions for performing the method of claim 8. 10. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, and in response to finding the embedded data, instructing the user's computer to act according to the embedded data; wherein the user's computer interacts with the embedded data to control file-sharing in the file sharing system; wherein the embedded data comprises a watermark embedded in content in the file, the watermark being embedded within the content by modifying the content with changes that are imperceptible to humans; and wherein the watermark includes data used to control transfer of the file in the file sharing system. 11. The method of claim 10 in which the embedded data includes data throughout the file to facilitate verification that the file is at least one of complete and free of a virus. 12. The method of claim 11 in which the embedded data includes an identifier of content in the file to facilitate automated searching. 13. The method of claim 12 in which the embedded data includes data to determine whether content in the file can be shared. 14. The method of claim 10 in which the embedded data includes data to determine whether content in the file can be shared. 15. The method of claim 14 in which the embedded data includes a watermark embedded in content in the file that carries an identifier of the content facilitating automated searching of the content. 16. The method of claim 14 in which the embedded data is embedded throughout the file to facilitate verification that the file is at least one of complete and free of a virus. 17. The method of claim 16 in which the embedded data includes an identifier of content in the file to facilitate automated searching for the content. 18. The method of claim 10 in which the file is an audio file. 19. The method of claim 18 in which the user's computer checks content in the file for the embedded data before adding the file to a file-sharing database. 20. The method of claim 18 in which the user's computer checks content in the file for the embedded data before allowing the file to be downloaded. 21. The method of claim 10 in which the user's computer checks content in the file for the embedded data before adding the file to a file-sharing database. 22. The method of claim 10 in which the user's computer checks content in the file for the embedded data before allowing the file to be uploaded. 23. The method of claim 10 in which the user's computer checks content in the file for the embedded data before allowing the file to be downloaded. 24. A computer readable storage medium on which is stored instructions for performing the method of claim 10. 25. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, wherein the embedded data comprises a watermark embedded in content in the file, the watermark being embedded within the content by modifying the content with changes that are imperceptible to humans, and wherein the embedded data includes an identifier of content in the file, the identifier referencing a database providing information regarding availability of the file for sharing, and in response to finding the embedded data, instructing the user's computer to act according to the embedded data; wherein the user's computer interacts with the embedded data to control file-sharing of the file with the embedded data in the file sharing system. 26. A computer readable storage medium on which is stored instructions for performing the method of claim 25. 27. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, wherein the embedded data is a watermark and the file comprises an audio file, the watermark being embedded within the content by modifying the content with changes that are imperceptible to humans, and in response to finding the embedded data, instructing the user's computer to act according to the embedded data; wherein the user's computer interacts with the embedded data to control file-sharing of the file with the embedded data in the file sharing system, and wherein the user's computer checks content in the file for the embedded data before allowing the file to be uploaded. 28. A computer readable storage medium on which is stored instructions for performing the method of claim 27. 29. A method of controlling file-sharing using embedded data, the method comprising: embedding data in a file before releasing the file for file-sharing, checking for the embedded data in the file at a user's computer, and having the user's computer act according to the embedded data; wherein the embedded data includes a digital watermark that carries an identifier, and the identifier serves as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry, the database indicating files available for sharing in the file sharing system. 30. A computer readable storage medium on which is stored software for performing the method of claim 29. 31. A file sharing system comprising: a memory; a file sharing client in communication with the memory and operable to locate a file available for sharing on one or more remote devices, and an embedded data decoder in communication with the memory and operable to check the file for embedded data, and to instruct the file sharing client to act according to the embedded data; wherein the embedded data includes a digital watermark that carries an identifier, and the identifier serves as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry, the database indicating files available for sharing in the file sharing system. 32. The file sharing system of claim 31 wherein the embedded data includes control information operable to inhibit the file sharing client from transferring the file. 33. A method of controlling file-sharing in a file sharing system that includes a searchable database enabling users to search for files in the file sharing system, the method comprising: receiving a search request including information about a file from a user of the file sharing system to find a file based on matching information about the file in the searchable database; locating a file in response to the search request; receiving a file transfer request for the located file; and transferring the located file to a device that made the file transfer request, wherein the located file includes embedded data in media content in the file, and wherein the embedded data includes a digital watermark that carries an identifier, and the identifier serves as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry. 34. A computer readable storage medium on which is stored instructions for performing the method of claim 33. 35. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, wherein the embedded data includes data throughout the file that facilitates verification that the file is at least one of complete and free of a virus, and in response to finding the embedded data, instructing a computer to act according to the embedded data, wherein the computer interacts with the embedded data to verify the file, after checking the embedded data, notifying the file sharing system that the file has been verified. 36. The method of claim 35 in which the embedded data is modified by the content and encrypted to improve its robustness to impersonation. 37. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, and in response to finding the embedded data, instructing the user's computer to act according to the embedded data; wherein the user's computer interacts with the embedded data to control file-sharing in the file sharing system, and wherein the embedded data includes an identifier of content in the file that facilitates automated searching for the file; and wherein the identifier serves as an index to an entry in a database that includes word descriptors about the file to enable searching for the file based on the word descriptors in the entry, the database indicating files available for sharing in the file sharing system. 38. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising: checking for the embedded data in a file designated for file sharing at a user's computer, and in response to finding the embedded data, instructing the user's computer to act according to the embedded data; wherein the user's computer interacts with the embedded data to control file-sharing in the file sharing system, wherein the embedded data includes data used to determine whether to allow transfer of the file to or from another computer in response to a request to share the file in the file sharing system, and the data used to determine whether to allow transfer of the file includes or refers to a permission governing whether a user has rights sufficient to allow the transfer of the file.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.