Using embedded data with file sharing
First Claim
1. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
- checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, andin response to finding the embedded data, instructing the user'"'"'s computer to act according to the embedded data;
wherein the user'"'"'s computer interacts with the embedded data to control file-sharing in the file sharing system, and the embedded data includes an identifier of content in the file, the identifier serving as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry;
the database indicating files available for sharing in the file sharing system.
15 Assignments
0 Petitions
Accused Products
Abstract
Peer-to-peer file sharing is increasing in popularity on the Internet, faster than any product known in history. Although file-sharing can enable massive piracy, it has many advantages for distribution of information including scalability. Alternatively, file-sharing can be sabotaged with falsified files and used to distribute viruses. To this end, a solution that maintains the scalability of file-sharing and promotes reliability is proposed. The solution involves embedding data within the file or content and using the data to identify the content, demonstrate its completeness and lack of viruses, and verify the file can be shared. The embedded data can be checked when the file is registered with the database for sharing, and before or while the file is being uploaded and/or downloaded. Ideally, the embedded data is added at the time of creation for the file. The embedded data may include a watermark and be linked to other copy management systems, such as those proposed in DVD and SDMI. Finally, the embedded data can be used to enable purchases of files that owners do not have rights to share.
-
Citations
38 Claims
-
1. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, and in response to finding the embedded data, instructing the user'"'"'s computer to act according to the embedded data; wherein the user'"'"'s computer interacts with the embedded data to control file-sharing in the file sharing system, and the embedded data includes an identifier of content in the file, the identifier serving as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry;
the database indicating files available for sharing in the file sharing system. - View Dependent Claims (2)
-
-
3. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, wherein the embedded data includes data throughout the file that facilitates verification that the file is at least one of complete and free of a virus, and in response to finding the embedded data, instructing the user'"'"'s computer to act according to the embedded data, including verifying that the file is at least one of complete and free of a virus, and indicating a result of the verifying; wherein the user'"'"'s computer interacts with the embedded data to control file-sharing in the file sharing system. - View Dependent Claims (4, 5, 6, 7)
-
-
8. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, determining from processing of the embedded data whether to allow transfer of the file to or from another computer in response to a request to share the file in the file sharing system and in response to the processing of the embedded data, instructing the user'"'"'s computer to act according to the embedded data; wherein the user'"'"'s computer interacts with the embedded data to control file-sharing in the file sharing system. - View Dependent Claims (9)
-
-
10. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, and in response to finding the embedded data, instructing the user'"'"'s computer to act according to the embedded data; wherein the user'"'"'s computer interacts with the embedded data to control file-sharing in the file sharing system;
wherein the embedded data comprises a watermark embedded in content in the file, the watermark being embedded within the content by modifying the content with changes that are imperceptible to humans; and
wherein the watermark includes data used to control transfer of the file in the file sharing system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, wherein the embedded data comprises a watermark embedded in content in the file, the watermark being embedded within the content by modifying the content with changes that are imperceptible to humans, and wherein the embedded data includes an identifier of content in the file, the identifier referencing a database providing information regarding availability of the file for sharing, and in response to finding the embedded data, instructing the user'"'"'s computer to act according to the embedded data; wherein the user'"'"'s computer interacts with the embedded data to control file-sharing of the file with the embedded data in the file sharing system. - View Dependent Claims (26)
-
-
27. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, wherein the embedded data is a watermark and the file comprises an audio file, the watermark being embedded within the content by modifying the content with changes that are imperceptible to humans, and in response to finding the embedded data, instructing the user'"'"'s computer to act according to the embedded data; wherein the user'"'"'s computer interacts with the embedded data to control file-sharing of the file with the embedded data in the file sharing system, and wherein the user'"'"'s computer checks content in the file for the embedded data before allowing the file to be uploaded. - View Dependent Claims (28)
-
-
29. A method of controlling file-sharing using embedded data, the method comprising:
-
embedding data in a file before releasing the file for file-sharing, checking for the embedded data in the file at a user'"'"'s computer, and having the user'"'"'s computer act according to the embedded data;
wherein the embedded data includes a digital watermark that carries an identifier, and the identifier serves as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry, the database indicating files available for sharing in the file sharing system. - View Dependent Claims (30)
-
-
31. A file sharing system comprising:
-
a memory; a file sharing client in communication with the memory and operable to locate a file available for sharing on one or more remote devices, and an embedded data decoder in communication with the memory and operable to check the file for embedded data, and to instruct the file sharing client to act according to the embedded data;
wherein the embedded data includes a digital watermark that carries an identifier, and the identifier serves as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry, the database indicating files available for sharing in the file sharing system. - View Dependent Claims (32)
-
-
33. A method of controlling file-sharing in a file sharing system that includes a searchable database enabling users to search for files in the file sharing system, the method comprising:
-
receiving a search request including information about a file from a user of the file sharing system to find a file based on matching information about the file in the searchable database; locating a file in response to the search request; receiving a file transfer request for the located file; and transferring the located file to a device that made the file transfer request, wherein the located file includes embedded data in media content in the file, and wherein the embedded data includes a digital watermark that carries an identifier, and the identifier serves as an index to an entry in a database that includes information about the file to enable searching for the file based on the information in the entry. - View Dependent Claims (34)
-
-
35. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, wherein the embedded data includes data throughout the file that facilitates verification that the file is at least one of complete and free of a virus, and in response to finding the embedded data, instructing a computer to act according to the embedded data, wherein the computer interacts with the embedded data to verify the file, after checking the embedded data, notifying the file sharing system that the file has been verified. - View Dependent Claims (36)
-
-
37. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, and in response to finding the embedded data, instructing the user'"'"'s computer to act according to the embedded data; wherein the user'"'"'s computer interacts with the embedded data to control file-sharing in the file sharing system, and wherein the embedded data includes an identifier of content in the file that facilitates automated searching for the file; and
wherein the identifier serves as an index to an entry in a database that includes word descriptors about the file to enable searching for the file based on the word descriptors in the entry, the database indicating files available for sharing in the file sharing system.
-
-
38. A method of controlling file-sharing in a file sharing system using embedded data, the method comprising:
-
checking for the embedded data in a file designated for file sharing at a user'"'"'s computer, and in response to finding the embedded data, instructing the user'"'"'s computer to act according to the embedded data; wherein the user'"'"'s computer interacts with the embedded data to control file-sharing in the file sharing system, wherein the embedded data includes data used to determine whether to allow transfer of the file to or from another computer in response to a request to share the file in the file sharing system, and the data used to determine whether to allow transfer of the file includes or refers to a permission governing whether a user has rights sufficient to allow the transfer of the file.
-
Specification