Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network
First Claim
1. A method to inhibit the identification and retrieval of proprietary media via automated search engines, utilized in association with computer compatible communications networks, said method comprising:
- identifying at least one media protection class within which the identification and retrieval of proprietary media via automated search engines is to be inhibited;
accessing a media sharing computer compatible communications network and identifying shared media properties comparable to said identified media protection class;
manufacturing at least one shared decoy media file comparable to said identified shared media properties and making said decoy file accessible to said media sharing network and automated search engines executed in association therewith;
evaluating the effectiveness of said shared decoy media file in inhibiting the identification and retrieval of proprietary media via said automated search engines; and
interactively modifying process configuration parameters to influence the effectiveness of inhibiting said identification and retrieval of proprietary media via said automated search engines.
20 Assignments
0 Petitions
Accused Products
Abstract
A method and article of manufacture to inhibit automated search engines in locating and retrieving proprietary media by employing cooperative scanning, manufacturing, sharing and supervisory control software processing components to replicate, and make available for sharing, decoy media in such numbers to render media search engines ineffectual. The invention'"'"'s scanning processing component searches media sharing network communities for illegally shared proprietary media and its manufacturing processing component constructs decoy media files mimicking identified proprietary media. The invention'"'"'s share processing component associates media sharing network communities with shared media sets containing decoy media files, and its supervisory control processing component provides for system initialization and checking subprocesses which establish initial configurations, and reactive behavior of the invention in addition to monitoring the effectiveness of a decoy ratio interactively specified by a user of the invention.
210 Citations
16 Claims
-
1. A method to inhibit the identification and retrieval of proprietary media via automated search engines, utilized in association with computer compatible communications networks, said method comprising:
-
identifying at least one media protection class within which the identification and retrieval of proprietary media via automated search engines is to be inhibited;
accessing a media sharing computer compatible communications network and identifying shared media properties comparable to said identified media protection class;
manufacturing at least one shared decoy media file comparable to said identified shared media properties and making said decoy file accessible to said media sharing network and automated search engines executed in association therewith;
evaluating the effectiveness of said shared decoy media file in inhibiting the identification and retrieval of proprietary media via said automated search engines; and
interactively modifying process configuration parameters to influence the effectiveness of inhibiting said identification and retrieval of proprietary media via said automated search engines. - View Dependent Claims (2, 3, 4, 5, 6, 7)
retrieving a valid user name from a user name database to log on to a media sharing network community and retrieving media protection classes from a media protection database to structure media searches;
referencing a user download database to factor first-order decoy media sharing effects when approximating decoy ratios;
matching user names in a user download database to determine those users who have downloaded decoy media; and
factoring said retrieved name, referenced database, and matched names to produce effective decoy ratio approximations.
-
-
8. A computer readable medium encoded with a computer program to inhibit the identification and retrieval of proprietary media via automated search engines, utilized in association with computer compatible communications networks, said program comprising:
-
a code segment for identifying at least one media protection class within which the identification and retrieval of proprietary media via automated search engines is to be inhibited;
a code segment for accessing a media sharing network and identifying shared media properties comparable to said identified media protection class;
a code segment for manufacturing at least one shared decoy media file comparable to said identified shared media properties and making said decoy file accessible to said media sharing network and automated search engines executed in association therewith;
a code segment for evaluating the effectiveness of said shared decoy media file in inhibiting the identification and retrieval of proprietary media via said automated search engines; and
a code segment for interactively modifying process configuration parameters to influence the effectiveness of inhibiting said identification and retrieval of proprietary media via said automated search engines. - View Dependent Claims (9, 10, 11, 12, 13, 14)
retrieving a valid user name from a user name database to log on to a media sharing network community and retrieving media protection classes from a media protection database to structure media searches;
referencing a user download database to factor first-order decoy media sharing effects when approximating decoy ratios;
matching user names in a user download database to determine those users who have downloaded decoy media; and
factoring said retrieved name, referenced database, and matched names into effective decoy ratio approximations.
-
-
15. A method to inhibit the identification and retrieval of proprietary media via automated search engines, utilized in association with computer compatible communications networks, said method comprising:
-
identifying at least one media protection class within which the identification and retrieval of proprietary media via automated search engines is to be inhibited;
accessing a media sharing computer compatible communications network and identifying shared media properties comparable to said identified media protection class;
manufacturing at least one shared decoy media file comparable to said identified shared media properties and making said decoy file accessible to said media sharing network and automated search engines executed in association therewith;
evaluating the effectiveness of said shared decoy media file in inhibiting the identification and retrieval of proprietary media via said automated search engines including the steps of retrieving a valid user name from a user name database to log on to a media sharing network community and retrieving media protection classes from a media protection database to structure media searches;
referencing a user download database to factor first-order decoy media sharing effects when approximating decoy ratios;
matching user names in a user download database to determine those users who have downloaded decoy media;
factoring said retrieved name, referenced database, and matched names to produce effective decoy ratio approximations; and
interactively modifying process configuration parameters to influence the effectiveness of inhibiting said identification and retrieval of proprietary media via said automated search engines.
-
-
16. A computer readable medium encoded with a computer program to inhibit the identification and retrieval of proprietary media via automated search engines, utilized in association with computer compatible communications networks, said program comprising:
-
a code segment for identifying at least one media protection class within which the identification and retrieval of proprietary media via automated search engines is to be inhibited;
a code segment for accessing a media sharing network and identifying shared media properties comparable to said identified media protection class;
a code segment for manufacturing at least one shared decoy media file comparable to said identified shared media properties and making said decoy file accessible to said media sharing network and automated search engines executed in association therewith;
a code segment for evaluating the effectiveness of said shared decoy media file in inhibiting the identification and retrieval of proprietary media via said automated search engines which includes;
retrieving a valid user name from a user name database to log on to a media sharing network community and retrieving media protection classes from a media protection database to structure media searches;
referencing a user download database to factor first-order decoy media sharing effects when approximating decoy ratios;
matching user names in a user download database to determine those users who have downloaded decoy media; and
factoring said retrieved name, referenced database, and matched names into effective decoy ratio approximations; and
a code segment for interactively modifying process configuration parameters to influence the effectiveness of inhibiting said identification and retrieval of proprietary media via said automated search engines.
-
Specification