System, method and apparatus for the detection and capturing of technological crime instances
First Claim
1. A computer program product for enabling a consumer electronic device to detect instances of technological crimes occurring through the use of electronic technology, said computer program product comprising:
- software instructions for enabling the consumer electronic device to perform predetermined operations;
firmware instructions for enabling the consumer electronic device to perform predetermined operations; and
at least one computer readable medium bearing said software and firmware instructions, said predetermined operations including the steps of(a) detecting an instance of a technological crime occurring on the electronic technology,(b) identifying a type of said technological crime instance(c) capturing said technological crime instance data,(d) reporting of said technological crime instance data to the Enterprise Collection Center, and(e) provisioning of a location of said technological crime instance to at least one interested entity;
wherein the interested entity can quickly and efficiently investigate said technological crime instance.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method and apparatus for the detection, verification, capturing, reporting and locating of technological crime instances occurring through the use of consumer electronic devices, including an custom software application comprised of modules, a development environment and a real time production environment. In one embodiment the software/firmware detection, verification and capturing rules, definitions and instructions are created, maintained and managed in the development environment for transmittal and for use in the real time production environment existing on media, in content and on one or more hardware chips installed in consumer electronic devices. The system, method and apparatus includes capabilities to detect, capture, report and provide location information of technological crimes such as child pornography, online identity theft, spamming, disc piracy, screener piracy, camcorder piracy and internet piracy, and a method of generating revenue for industries affected by piracy.
63 Citations
19 Claims
-
1. A computer program product for enabling a consumer electronic device to detect instances of technological crimes occurring through the use of electronic technology, said computer program product comprising:
-
software instructions for enabling the consumer electronic device to perform predetermined operations; firmware instructions for enabling the consumer electronic device to perform predetermined operations; and at least one computer readable medium bearing said software and firmware instructions, said predetermined operations including the steps of (a) detecting an instance of a technological crime occurring on the electronic technology, (b) identifying a type of said technological crime instance (c) capturing said technological crime instance data, (d) reporting of said technological crime instance data to the Enterprise Collection Center, and (e) provisioning of a location of said technological crime instance to at least one interested entity; wherein the interested entity can quickly and efficiently investigate said technological crime instance.
-
-
2. A computer system adapted for detecting, identifying, capturing and reporting instances of technological crimes, said computer system comprising:
-
an Enterprise Collection Center software application residing on a server for performing predetermined operations; a computer readable medium electronically attached to or inserted into an electronic device, said electronic device being remotely located from said Enterprise Collection Center software application, said computer readable medium bearing software/firmware instructions, the predetermined operations including the steps of (a) detecting a technological crime instance occurring on the electronic technology, (b) identifying a type of said technological crime instance, (c) capturing said technological crime instance, and (d) reporting a location of said technological crime instance to at least one interested entity; and
a communications link for transmitting data between said computer readable medium and said enterprise collection center such that said technological crime instance can be remotely and automatically detected during real-time and thereby enable the interested entity to quickly and efficiently investigate said technological crime instance. - View Dependent Claims (3, 4)
-
-
5. A software/firmware instruction set embodied in a transmission medium for enabling an electronic device to detect instances of technological crimes occurring through the use of electronic technology, said software/firmware instructions comprising:
-
readable software/firmware instruction code for detecting a technological crime instance occurring on an electronic device, readable software/firmware instruction code for identifying a type of said technological crime instance, and readable software/firmware instruction code for reporting and provisioning of a location of said technological crime instance to at least one interested entity; wherein the interested entity can quickly and efficiently investigate said technological crime instance.
-
-
6. A method for detecting, identifying, capturing, locating and reporting instances of technological crimes occurring through the use of consumer electronic technology, said method comprising the steps of:
providing an enterprise collection center for creating and managing crime detection rules, definitions and instructions, said enterprise collection center comprising at least one manager module selected from the group comprising a Security Manager module; a Communications Manager module; an Update Manager module; a Task Manager module; an Instance Manager module; a Report Manager module; a Contact Manager module; a Device Manager module; and an Advertising Manager module. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
Specification