System and Method for Authenticating Content
First Claim
1. A method for determining whether to approve suspect content, comprising:
- receiving the suspect content;
performing content recognition on the suspect content to generate suspect content data for the suspect content;
comparing the suspect content data with comparable known content data, the known content data being representative of known content and being associated with one or more known content rules;
finding a correlation between the suspect content data and the known content data;
deciding whether to approve an action for the suspect content based upon said correlation and at least one of the known content rules;
approving the action for the suspect content if the suspect content complies with each of said at least one of the known content rules; and
determining that the suspect content is a misappropriation of the known content if the suspect content does not comply with one or more of said at least one of the known content rules.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for authenticating content and methods for making and using same. The content authentication system advantageously facilitates recognition of known content, control over use of the known content, and knowledge accumulation regarding the use of known content for monetization models. The recognition of the suspect content preferably includes an analysis of known content recognition data associated with the known content and suspect content recognition data associated with the suspect content. A correlation between the known content recognition data and the suspect content recognition data is found, and the suspect content is analyzed in light of the correlation and known content rules associated with the known content. Thereby, the content authentication system can determine whether to approve action for the suspect content. The content authentication system enables selected known content information to be shared among known content right holders and hosting websites.
-
Citations
106 Claims
-
1. A method for determining whether to approve suspect content, comprising:
-
receiving the suspect content; performing content recognition on the suspect content to generate suspect content data for the suspect content; comparing the suspect content data with comparable known content data, the known content data being representative of known content and being associated with one or more known content rules; finding a correlation between the suspect content data and the known content data; deciding whether to approve an action for the suspect content based upon said correlation and at least one of the known content rules; approving the action for the suspect content if the suspect content complies with each of said at least one of the known content rules; and determining that the suspect content is a misappropriation of the known content if the suspect content does not comply with one or more of said at least one of the known content rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authenticating content, comprising:
-
applying a content recognition technology to known content to generate known content data for the known content, the known content data being associated with at least one known content rule; comparing the known content data with comparable suspect content data that is representative of suspect content; determining a correlation between the known content data and the suspect content data; deciding whether to approve an action for the suspect content based on said determining the correlation and upon a selected known content rule; and approving the action for the suspect content if the suspect content complies with said selected known content rule. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method for identifying content, comprising:
-
receiving known content data associated with at least one known content rule, the known content data being generated by applying a content recognition technology to known content; receiving suspect content data, the suspect content data being generated by applying the content recognition technology to suspect content; comparing the known content data with the suspect content data; determining a correlation between the known content data and the suspect content data; applying said determining the correlation and one or more selected known content rules to decide whether to approve action for suspect content; approving the action for the suspect content if the suspect content complies with said selected known content rules; and determining that the suspect content has not been authorized by an owner of the known content if the suspect content does not comply with said selected known content rules. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A system for authenticating content, comprising:
-
a data application system that processes known content associated with at least one known content rule; a content recognition technology generator that is configured for communication with said data application system, said content recognition technology generator generating known content recognition data associated with the known content, the known content recognition data being comparable to suspect content recognition data associated with suspect content; a database system that is configured for communication with said data application system and that stores content recognition data; and a secured communication system that is configured for communication with said data application system and that determines whether a correlation exists between the known content recognition data and the suspect content recognition data, said secured communication system determining whether the suspect content complies with each of said at least one known content rule if the correlation between the known content recognition data and the suspect content recognition data exists, wherein action for the suspect content is determined to be authorized if the suspect content complies with each of said at least one known content rule. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A system for authenticating content, comprising:
-
a data application system that processes suspect content; a content recognition generator that generates content recognition data; and a decision engine that determines whether a correlation exists between suspect content recognition data associated with the suspect content and comparable known content recognition data associated with known content, said decision engine determines whether the suspect content complies with a selected known content rule associated with the known content if said correlation between the suspect content recognition data and the known content recognition data exists, wherein action for the suspect content is determined to be authorized if the suspect content complies with the known content rule. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46)
-
-
47. A content identification platform for authenticating content, comprising:
-
a DarkNet system that receives and stores original source content in a predetermined digital form and that includes a content recognition system that builds a reference identifier for the original source content; and a ProductionNet system that receives said reference identifier from said DarkNet system and that matches incoming candidate files with said reference identifier based upon at least one predefined matching criteria. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
-
-
72. A system for authenticating content, comprising:
-
a database system that stores known content data and known content data information associated with the known content data; and a decision engine that determines whether a correlation exists between known content data and suspect content data and, if said correlation exists, determines whether to approve action for the suspect content if the suspect content complies with the selected known content data information, wherein the known content data and the suspect content data are generated by applying a content recognition technology to known content and suspect content, respectively. - View Dependent Claims (73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85)
-
-
86. A content authentication platform by identifying content, comprising:
-
a ProductionNet system that receives known content recognition data and a known content rule each associated with known content, the content recognition data being generated by applying a content recognition technology to the known content; and a decision engine that finds a correlation between the known content recognition data and suspect content recognition data associated with a suspect content and applies said correlation between the known content recognition data and the suspect content recognition data to determine whether to approve action for the suspect content based on the known content rule, the suspect content recognition data being generated by applying the content recognition technology to the suspect content, wherein said decision engine determines that the known content has been misappropriated if the suspect content does not comply with the known content rule. - View Dependent Claims (87, 88, 89, 90, 91, 92, 93, 94)
-
-
95. A computer program product suitable for storage on a physical storage medium and having computer-readable instructions, the computer program product comprising:
-
an instruction that receives the suspect content; an instruction that performs content recognition on suspect content to generate suspect content data for the suspect content; an instruction that compares the suspect content data with comparable known content data that is representative of known content and that is associated with at one or more known content rules; an instruction that finds a correlation between the suspect content data and the known content data; and an instruction that decides whether to approve action for the suspect content based upon said correlation between the suspect content data and the known content data and at least one selected known content rule, wherein action for the suspect content is determined to be authorized if the suspect content complies with said at least one selected known content rule, and wherein the suspect content is determined to be a misappropriation of the known content if the suspect content does not comply with one or more of said at least one of the known content rules. - View Dependent Claims (96, 97, 98, 99, 100)
-
-
101. A computer program product suitable for storage on a physical storage medium and having computer-readable instructions, the computer program product comprising:
-
an instruction that applies a content recognition technology to known content to generate known content data for the known content, the known content data being associated with at least one known content rule; an instruction that compares the known content data with comparable suspect content data that is representative of suspect content; an instruction that determines a correlation between the known content data and the suspect content data; and an instruction that decides whether to approve action for the suspect content based on said correlation and a selected known content rule, wherein the action for the suspect content is determined to be authorized if the suspect content complies with said at least one selected known content rule. - View Dependent Claims (102, 103, 104, 105, 106)
-
Specification