COST-EFFECTIVE REUSE OF DIGITAL ASSETS
First Claim
1. A method for cost-effectively reusing digital assets, the method comprising:
- a processor of a computer system detecting that a first user has used a digital asset,wherein the first user is associated with a first user-eminence value that represents a relative importance of the first user, andwherein the digital asset is associated with an asset-eminence value that represents a relative importance of the digital asset; and
the processor, in response to the detecting, automatically creating and adding a first instance of the digital asset to a first collection of digital assets for a purpose of allowing other users to identify and use the digital asset, wherein the first collection is a personal collection of the first user and is accessible by other users without requiring an action of the processor,wherein the first user-eminence value is a function of a weighted sum of all eminence values of all assets comprised by the first collection.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user'"'"'s collection, thus indicating the first user'"'"'s favorable view of the asset. When a second user accesses the first user'"'"'s copy, the asset is copied to the second user'"'"'s collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user'"'"'s copy, the asset is copied to the third user'"'"'s collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user'"'"'s collection through means that include the second user'"'"'s decision to “follow” the first user.
12 Citations
20 Claims
-
1. A method for cost-effectively reusing digital assets, the method comprising:
-
a processor of a computer system detecting that a first user has used a digital asset, wherein the first user is associated with a first user-eminence value that represents a relative importance of the first user, and wherein the digital asset is associated with an asset-eminence value that represents a relative importance of the digital asset; and the processor, in response to the detecting, automatically creating and adding a first instance of the digital asset to a first collection of digital assets for a purpose of allowing other users to identify and use the digital asset, wherein the first collection is a personal collection of the first user and is accessible by other users without requiring an action of the processor, wherein the first user-eminence value is a function of a weighted sum of all eminence values of all assets comprised by the first collection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product, comprising a computer-readable hardware storage device having a computer-readable program code stored therein, said program code configured to be executed by a processor of a computer system to implement a method for cost-effectively reusing digital assets, the method comprising:
-
a processor of a computer system detecting that a first user has used a digital asset, wherein the first user is associated with a first user-eminence value that represents a relative importance of the first user, and wherein the digital asset is associated with an asset-eminence value that represents a relative importance of the digital asset; the processor, in response to the detecting, automatically creating and adding a first instance of the digital asset to a first collection of digital assets for a purpose of allowing other users to identify and use the digital asset, wherein the first collection is a personal collection of the first user and is accessible by other users without requiring an action of the processor, wherein the first user-eminence value is a function of a weighted sum of all eminence values of all assets comprised by the first collection; the processor further detecting that a second user has identified the first instance of the digital asset, that the second user has requested from the first user access to the first instance of the digital asset in response to the identifying, and that the second user has, upon receiving permission from the first user, subsequently used the first instance, wherein the second user is associated with a second user-eminence value that represents a relative importance of the second user, and; the processor responding to the further detecting by further automatically creating and adding a second instance of the digital asset to a second collection of digital assets for a purpose of allowing other users to identify and use the digital asset, wherein the second collection is a personal collection of the second user and is accessible by other users without requiring an action of the processor; the processor revising, as a function of the further detecting, the asset-eminence value and the first user-eminence value, but not the second user-eminence value; the processor receiving notice that a third user has further identified the second instance of the digital asset, that the third user has requested from the second user access to the second instance of the digital asset in response to the further identifying, and that the third user has, upon receiving permission from the second user, subsequently used the second instance, wherein the third user is associated with a third user-eminence value that represents a relative importance of the third user, and; the processor automatically creating and adding a third instance of the digital asset to a third collection of digital assets for a purpose of allowing other users to identify and use the digital asset, wherein the third collection is a personal collection of the third user and is accessible by other users without requiring an action of the processor; and the processor further revising, as a function of the receiving notice, the asset-eminence value, the first user-eminence value, and the second user-eminence value, but not the third user-eminence value. - View Dependent Claims (15, 16, 17)
-
-
18. A computer system comprising a processor, a memory coupled to said processor, and a computer-readable hardware storage device coupled to said processor, said storage device containing program code configured to be run by said processor via the memory to implement a method for cost-effectively reusing digital assets, the method comprising:
-
a processor of a computer system detecting hat a first user has used a digital asset, wherein the first user is associated with a first user-eminence value that represents a relative importance of the first user, and wherein the digital asset is associated with an asset-eminence value that represents a relative importance of the digital asset; the processor, in response to the detecting, automatically creating and adding a first instance of the digital asset to a first collection of digital assets for a purpose of allowing other users to identify and use the digital asset, wherein the first collection is a personal collection of the first user and is accessible by other users without requiring an action of the processor, wherein the first user-eminence value is a function of a weighted sum of all eminence values of all assets comprised by the first collection; the processor further detecting that a second user has identified the first instance of the digital asset, that the second user has requested from the first user access to the first instance of the digital asset in response to the identifying, and that the second user has, upon receiving permission from the first user, subsequently used the first instance, wherein the second user is associated with a second user-eminence value that represents a relative importance of the second user, and; the processor responding to the further detecting by further automatically creating and adding a second instance of the digital asset to a second collection of digital assets for a purpose of allowing other users to identify and use the digital asset, wherein the second collection is a personal collection of the second user and is accessible by other users without requiring an action of the processor; the processor revising, as a function of the further detecting, the asset-eminence value and the first user-eminence value, but not the second user-eminence value; the processor receiving notice that a third user has further identified the second instance of the digital asset, that the third user has requested from the second user access to the second instance of the digital asset in response to the further identifying, and that the third user has, upon receiving permission from the second user, subsequently used the second instance, wherein the third user is associated with a third user-eminence value that represents a relative importance of the third user, and; the processor automatically creating and adding a third instance of the digital asset to a third collection of digital assets for a purpose of allowing other users to identify and use the digital asset, wherein the third collection is a personal collection of the third user and is accessible by other users without requiring an action of the processor; and the processor further revising, as a function of the receiving notice, the asset-eminence value, the first user-eminence value, and the second user-eminence value, but not the third user-eminence value. - View Dependent Claims (19, 20)
-
Specification