System, method and client user interface for a copy protection service
First Claim
1. A system for providing a copy protection service, comprising:
- a plurality of software agents masquerading as nodes in a decentralized network for monitoring and interdicting file sharing activities of a protected file; and
a control center configured to communicate with the plurality of software agents and a client computer, so as to provide information of such monitoring to the client computer and control such monitoring and interdicting according to instructions received from the client computer.
13 Assignments
0 Petitions
Accused Products
Abstract
A system, method and client user interface for a copy protection service employs software agents masquerading as nodes in decentralized networks for monitoring and interdicting file sharing activities of protected files in the networks. A control center communicates with the software agents and subscriber client computers through user interfaces, so as to provide monitoring information to users of the client computers and control the monitoring and interdiction of protected files according to instructions received from the client computers. A one-click method for requesting protection of a file, providing the terms of such protection, and updating billing information for the user is implemented through the user interface to simplify user interaction with the copy protection service.
117 Citations
76 Claims
-
1. A system for providing a copy protection service, comprising:
-
a plurality of software agents masquerading as nodes in a decentralized network for monitoring and interdicting file sharing activities of a protected file; and
a control center configured to communicate with the plurality of software agents and a client computer, so as to provide information of such monitoring to the client computer and control such monitoring and interdicting according to instructions received from the client computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for providing a copy protection service, comprising:
-
receiving file information for one or more protected files in one or more decentralized networks from a plurality of software agents masquerading as nodes in the one or more decentralized networks;
providing the file information to one or more client computers respectively associated with individual of the one or more protected files;
receiving interdiction instructions from the one or more client computers; and
commanding the plurality of software agents to interdict file sharing activities in the one or more decentralized networks for the one or more protected files according to the interdiction instructions. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A one-click method for providing a copy protection service, comprising:
-
receiving a protection command associated with a protected file from a client computer;
updating billing information associated with the client computer to reflect the protection command; and
interdicting file sharing activities for the protected file in a decentralized network according to the protection command. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A user interface method associated with a copy protection service, comprising:
-
displaying information of a protected file in a decentralized network on a display screen of a client computer; and
displaying a user selectable protection option on the display screen so that upon selection of the user selectable protection option and specification of interdiction terms by a user of the client computer, a protection request to interdict file sharing activity of the protected file in the decentralized network is transmitted to a control center providing a copy protection service. - View Dependent Claims (51, 52, 53, 54, 55, 56)
-
-
57. A system for providing a copy protection service, comprising:
-
a control center configured to perform instrumentation and interdiction functions for subscriber specified files in at least one file sharing network; and
a subscriber operated client computer configured to communicate with the control center so as to facilitate selection of the instrumentation and interdiction functions to be performed by the control center. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76)
-
Specification