NL2006658C2 - Method and system for detecting violation of intellectual property rights of a digital file. - Google Patents

Method and system for detecting violation of intellectual property rights of a digital file. Download PDF

Info

Publication number
NL2006658C2
NL2006658C2 NL2006658A NL2006658A NL2006658C2 NL 2006658 C2 NL2006658 C2 NL 2006658C2 NL 2006658 A NL2006658 A NL 2006658A NL 2006658 A NL2006658 A NL 2006658A NL 2006658 C2 NL2006658 C2 NL 2006658C2
Authority
NL
Netherlands
Prior art keywords
watermark
file
digital file
sending
station
Prior art date
Application number
NL2006658A
Other languages
Dutch (nl)
Inventor
Dennis Christopher Laat
Marc Oliver Laat
Original Assignee
Media Cowboyz B V
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Media Cowboyz B V filed Critical Media Cowboyz B V
Priority to NL2006658A priority Critical patent/NL2006658C2/en
Application granted granted Critical
Publication of NL2006658C2 publication Critical patent/NL2006658C2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Description

Method and system for detecting violation of intellectual property rights of a digital file
The present invention relates to a method and system for detecting violation of 5 intellectual property rights of a digital file.
Digital files may comprise documents such as books, music, images or video recordings, games or parts thereof or other works that are subject to intellectual property rights, such as copyrights. The digital format makes it easy to copy and spread files, to 10 send them via email, to spread them via peer-to-peer networks or to make them available for download on the Internet. In some cases, intellectual property rights are paid to the owner of the file, but in a lot of cases they are not. Files and the corresponding works are then freely spread, and for the owner of the file, it is very difficult to find out where the work was initially “leaked”. Once made available to the 15 public, it is almost impossible to stop further spreading of the files, and it is also impossible to trace their origin.
Attempts have been made to stop illegal spreading (in particular downloading) of files. Besides regulations that forbid content downloading and/or sharing, encoding 20 techniques have been used that allow only users that have paid for the rights to use the content of a specific digital file to make use of that file. Digital rights management (DRM) and watermarking techniques are examples hereof.
The existing techniques however have not proven to be effective. End-users appear to 25 be very inventive in finding techniques to decode encrypted files or to break DRM
protection. Moreover, some damage, like the leaking of unreleased material, like films, books or music albums, can’t be undone.
It is therefore a goal of the present invention to find a method and system for preventing 30 violation of intellectual property rights of a digital file, that takes away the disadvantages of the prior art, and/or enables an effective detection and/or counteract of intellectual property abuse.
2
The invention thereto proposes a method for detecting violation of intellectual property rights of a digital file, comprising, the steps of (A) in a distribution channel of the digital file, digitally (dis)playing, streaming, (pre-)viewing, and/or downloading the file from a sending or streaming instance to a receiving instance, (B) adding a watermark to 5 the digital file at the sending instance prior to sending/ broadcasting the file, wherein (C) the watermark comprises at least an identifier of the receiving instance.
The distribution channel may for a book for example be from a author, via a publisher, via one or more online bookstores, to multiple end-users. For an audio recording the 10 path may lead from a producer, via a record company, via an online shop, to an end user. For a film, the path may lead from a movie company to cinema’s, and parallel to dvd-producers and to end-users. Very often films already leak before their official premiere.
15 The technique of digitally watermarking digital files is well known. Watermarks can be added in such manner that they are not (dis)played when the file is used, but still can be detected with a dedicated tool. The watermark may either be placed in a data-section of the file, or in a META section, and may be configured such that it remains detectable, even after conversion of other modification of the file.
20
The method according to the invention thus provides an anti-piracy solution that makes fingerprint/ watermark technology applicable within Internet surveillance. The invention offers the possibility to encode watermarking at different stages, in a matter that identifies each stage in the distribution process. When a file is offered illegally it 25 enables the intellectual property holder, distributor and/ or reseller to exclude the identified recipient to receive files in the future or take other measures. This is an advantage over DRM systems according to the art, which only offer protection to a certain stage in the distribution process. In contrast to DRM the bought content can be legally played or viewed on any device, only when the content is illegally shared, the 30 identity of the last receiving instance can be identified.
In a preferred embodiment, the method comprises (D) iteratively repeating steps B and C for subsequent sending and receiving instances in the distribution channel. Therewith, when detecting an alleged illegally spread digital file, the instance that last 3 received it intentionally or legally can be determined, and the possible leaking source can be found.
Iteratively adding watermarks to a digital file may cause difficulties in retreiving the 5 watermark, or may even deteriorate the file in such way that the watermark creates visible or audible artifacts. To avoid these problems, in an embodiment, the method according to the invention comprises removing a prior watermark by the sending or streaming instance trough a plugin/ web application hosted by the patent holder.
10 In order to be able to recognise a watermarked file later on, as a first step, a digital file may be marked with a unique ID.
In yet another embodiment, subsequently added watermarks are laid over a not yet watermarked part of the digital file. This requires specific watermarking methods. In 15 case of an audio file, the file may be divided into parts corresponding with a certain playback time. This can for example be done by dividing the file length into an amount of intervals higher than the expected number of instances in the distribution channel. Each subsequent instance then places a watermark in the first free interval. A disadvantage of this method however is that the watermarks disappear when the file is 20 cut for some reason.
Another option, that provides a solution for this problem, is to divide the file length in intervals of one second or for example five seconds of playback time, and to divide these intervals into timeslots of several milliseconds, wherein a specific instance adds or 25 superimposes or stamps the watermark to a certain timeslot in each interval. It needs to be emphasised here that the actual file is divided in intervals according to the invention.
Evidently, an analogue technique could be applied to a document or book, wherein the intervals do not correspond with a predetermined amount of time, but rather with a 30 predetermined amount of mutations, for example synonyms and/or abbreviations to create a binary code. Examples that can be thought of are replacing “you’re” with “you are” or “is not” with “isn’t”, adding code to whitespaces, interchanging synonyms and/ or personalise the book.
4
In order to be able to find out at what level in the distribution channel the digital file was leaked, or illegally spread, the identifier may comprise an indication of a level/ stage in the distribution channel. For example, specific indicators for a “source”, a “producer”, a “webshop” or or “streaming platform” (such as Youtube or Soundcloud or 5 Spotify) and “end user” may be used. After analysing a leaked file, it can be determined at what level in the distribution channel further protection is necessary.
More specific detection can take place when the identifier is chosen to be a unique identifier. In this case, the exact instance that has last received the file can be 10 determined, and precautions can be taken against the instance coupled to the specific instance. For example, the identifier may comprise the IP address, a MAC or IMEA address or customer information such as user ID, login credentials or a creditcard number of the receiving instance. IP addresses are unique numbers, and they are registered with internet providers. For mobile media playing devices (telephones, 15 PDA’s, laptops and readers), device-specific codes may be used.
However, a central database of a system according to the present invention, does not necessarily need to store end-user information. It may store a unique code for every station in the distribution channel. During sales, and/or distribution and/or streaming, 20 codes are added or (re)placed. Herein, multiple codes may be combined as a single code, for example with a common checksum. This way, the system is only required to store the codes. If abuse is determined, the system may provide for example a webshop with the ID of its end user, so that the webshop may take action/ precautions. The codes may be chosen such that the entire distribution channel can be traced, or only a last end-25 user, that has leaked the file.
Watermarking the digital file is preferably performed real-time on the moment of streaming, (pre-)viewing, reading, playing or buying the file. An application can be provided that accepts a file for watermarking, and that adds a unique identifier. The 30 application can be stand alone, an applet, or a web application/ service. In another embodiment, according to the invention, a plugin/ API is provided to websites for incorporation thereon. Instances in the distribution chain can register and have a unique copy of such an application, or log on to a central web or server application which then authenticates the instance and adds a (unique) watermark.
5
The method according to the invention may further comprise the step of searching the internet for content infringing intellectual property rights. Various techniques to trace illegal content, i.e. content for which intellectual property rights are infringed, may be 5 applied. For example, peer-to-peer networks and file-sharing applications and websites can be searched. When illegal content is found, it is scanned for the presence of a watermark, and if a watermark is detected, the instance that has last legally received, and apparently has leaked the content is determined, and where applicable, contacted, or other actions/ precautions are taken such as (temporary) exclusion from a website or a 10 community.
According to en embodiment of the invention, no end users are contacted directly, but the last issuing party (i.e. a website, or webshop, or any streaming instance) is contacted. Such party may know the identity of the user, and may take further 15 precautions, such as a warning, a fee or an exclusion from a website or service, or even legal action. Preferably, the party is enabled to identify and contact the user. If the user makes use of the website, webshop or service anonymously, an IP address, or in case of the use of certain (mobile) media devices, a MAC or IMEA code may be registered.
20 Examples of parties for which the method and system according to the invention may be applicable are for example filehosting sites, such as Zippyshare, Megaupload, Rapidshare, streaming sites, such as Youtube.com, Soundcloud.com andVimeo.com, and peer to peer sharing sites and communities, such as torrents, Usenet and file sharing software such as Kazaa and Limewire. Content may further be spread via Social 25 networks such as Facebook, Hyves, etcetera.
Various coding techniques may be applied. Table 1 below gives a non extensive overview of possible digital data and types of watermarks that can be applied.
30 Table 1: 1 Music (Audio Watermark) 2 Text/ Books (Text Encoding + Personalization) 3 Video (Audio and Picture Watermark) 6 4 Pictures (Picture Watermark) 5 Software/ Games (Audio and Picture and Metadata Watermark)
Table two below gives an overview of the stations during the release process where a 5 watermark may be added, and parties that can be encoded in the watermark. According to the invention, watermarks may be added in one or more of these stages. However, it is preferred that a stage wherein the digital media is delivered to an end user is at least watermarked, so that the end user of a shop etcetera can be determined, and precautions can be taken.
10
Table 2: A Intellectual Property Holder (Artist/ Author/ Company) B Testing/Pre Viewing (Alpha/Beta Testers) 15 C (Post-) Production Company (Mastering Studio/Digital Publisher) D Promotion (Press) E Distribution (Partners) F Performance (Live Performance, (Online Viewing), Premiere) G Release General Public (Shop, Cinema, Internet Transmission/ Download) 20
The invention will now be elucidated into more detail, with reference to the following figures. Herein: - Figure 1 shows steps of a method for adding a watermark to a digital file according to the invention; 25 - Figure 2 shows a method for subsequently adding watermarks to a digital file during a distribution process thereof according to the invention;
Figure 3 shows a method for tracing a watermarked digital file according to the invention.
30 Figure 1 shows steps of a method 1 for adding a watermark to a digital file, using a so called application or a plugin for a website. The method comprises a first step of registering an instance at a central server application. After registering, as a second step, a pre-personalised application is supplied to the instance. The application may for example be downloadable, sent by e-mail or by other means of distribution. The 7 intellectual property comprises details of the instance, that may be used when watermarking a digital file. In another embodiment, a generic application may be made available, wherein the instance needs to fill out details for enabling the application to add specific watermarks to files.
5 A third step is to edit a file with the application, which may take place by dragging and dropping the file to the application. The application may require information on the destination of the file. Upon dropping the file, as a fourth step, the application may contact a central database, that authenticates the instance, and requires further 10 information. If the instance cannot be authenticated, as a fifth step, further information may be required, and a digital form may be presented. In that case, as a sixth step, registration may take place. When adding the watermark to the file, an amount is deducted from a credit of the instance, as seventh step. Next, as step eight, the watermarked file is output to a “processed files” folder. A ninth and last step is then to 15 send the file to a receiving instance. Besides an application, a plugin may be used as well.
Figure 2 shows a flowchart for watermarking digital files in a distribution channel according to the present invention. As a first step, a producer of an audio recording 20 retrieves the application as described with reference to figure 1. As a next step, a digital music file is provided with a watermark by an application used by the producer. The producer indicates the destination of the file, in this case, a record company. Then, the file is sent to a record company. The record company performs the same steps: it receives the file, provides it with a watermark by adding the latter with their own copy 25 of the application, and sends it to a next receiving instance, in the example given, a mastering studio. From this studio, the file is forwarded to internet shops, and then on to an end user, wherein at each level in the distribution channel corresponding steps are performed. For that purpose, the central server application may distinguish various different instance types, and issue specific watermarks, for example for producers, 30 masters, record companies, (web)shops, promo’s, portals, remixers, and websites like youtube and soundcloud (media streaming websites).
Figure 3 shows a method for tracing a watermarked digital file according to the invention. First, editors in the distribution channel register at the central server. Then, 8 content, in the form of a digital file, is sent to an end user or client. A next step is to collect content from various internet sources, such as websites, file sharing networks and blogs, and to filter new entries for registered titles to be monitored. When found, the content is downloaded, and checked for watermarks. If these watermarks are found, 5 details of the watermark are collected, and the last issuing instance or is contacted. A predetermined or suitable action or precaution is then taken, for example the user account is blocked or deleted, or in certain cases his/her creditcard may be charged.
Besides the above described methods, the present invention also relates to a system for 10 preventing violation of intellectual property rights of a digital file, comprising: means for adding a watermark to the digital file at a sending instance prior to sending the file, wherein the watermark comprises an identifier of the sending instance. The system may be configured for removing a previously added watermark, or to add a watermark in a part of a digital file where no watermark was available yet. The system may further 15 comprise local applications, each configured to run at an instance in the distribution channel of the digital file, wherein the local applications are further configured for communication with a central server application. The system may be implemented in various ways, such as an application, a plugin, a webservice, etcetera.
20

Claims (17)

1. Werkwijze voor het detecteren van schending van intellectuele eigendomsrechten van een digitaal bestand, omvattende:A method for detecting the violation of intellectual property rights of a digital file, comprising: 2. Werkwijze volgens conclusie 1, omvattende: D. voor navolgende zend- en ontvangststations in het distributiekanaal, het iteratief herhalen van stappen B en C. 15Method according to claim 1, comprising: D. for subsequent sending and receiving stations in the distribution channel, iteratively repeating steps B and C. 3. Werkwijze volgens conclusie 1 of 2, omvattende: - als een eerste stap in de werkwijze, het markeren van het digitale bestand met een uniek ID.Method according to claim 1 or 2, comprising: - as a first step in the method, marking the digital file with a unique ID. 4. Werkwijze volgens één van de voorgaande conclusies, waarin een ontvangststation een vroeger watermark verwijdert.Method according to one of the preceding claims, wherein a receiving station removes an earlier watermark. 5 E. het zoeken op internet naar content die inbreuk maakt op intellectuele eigendomsrechten.5 E. searching the internet for content that infringes intellectual property rights. 5. Werkwijze volgens één van de conclusies 1, 2 of 3, waarin nadien toegevoegde watermerken over een niet gewatermerkt deel van het digitale bestand worden gelegd. 25A method according to any of claims 1, 2 or 3, wherein added watermarks are subsequently superimposed on a non-watermarked part of the digital file. 25 5 A. in een distributiekanaal, het digitaal verzenden van het bestand van een zendstation naar een ontvangststation; B. het toevoegen van een watermerk aan het digitale bestand bij het zendstation voorafgaand aan het verzenden van het bestand gedurende het verzenden, streamen, afspelen of bekijken van het bestand; waarin:A. in a distribution channel, digitally sending the file from a transmitting station to a receiving station; B. adding a watermark to the digital file at the broadcasting station prior to sending the file during sending, streaming, playback or viewing of the file; in which: 6. Werkwijze volgens één van de voorgaande conclusies, waarin de identificator een indicatie van een niveau in het distributiekanaal omvat.The method of any one of the preceding claims, wherein the identifier comprises an indication of a level in the distribution channel. 7. Werkwijze volgens één van de voorgaande conclusies, waarin de identificator een 30 unieke identificator is.7. Method as claimed in any of the foregoing claims, wherein the identifier is a unique identifier. 8. Werkwijze volgens één van de voorgaande conclusies, waarin de identificator omvat het IP adres/ cliënten ID / MAC of IMEA adres van het ontvangststationThe method of any one of the preceding claims, wherein the identifier comprises the IP address / client ID / MAC or IMEA address of the receiving station 9. Werkwijze volgens één van de voorgaande conclusies, waarin het watermerken onvertraagd wordt uitgevoerd.A method according to any one of the preceding claims, wherein the watermarking is performed in real time. 10 G. wanneer een watermerk gevonden wordt, het determineren van het stations in het distributiekanaal dat als laatste de content legaal ontvangen heeft.G. when a watermark is found, determining the stations in the distribution channel that last received the content legally. 10. Werkwijze volgens één van de voorgaandeconclusies, omvattende:Method according to one of the preceding claims, comprising: 10 C. het watermerk omvat een identificator van het ontvangststation.C. the watermark comprises an identifier of the receiving station. 11. Werkwijze volgens conclusie 10, omvattende: F. het scannen van vermeende content op watermerken;The method of claim 10, comprising: F. scanning alleged content for watermarks; 12. Werkwijze volgens conclusie 11, omvattende het nemen van voorzorgsmaatregelen of acties tegen een station dat gelekt heeft of de illegale content heeft gelekt. 15A method according to claim 11, comprising taking precautions or actions against a station that has leaked or has leaked the illegal content. 15 13. Inrichting ter voorkoming van schending van intellectuele eigendomsrechten van een digitaal bestand, omvattende: - middelen om een watermerk toe te voegen aan het digitale bestand bij een zendstation voorafgaan aan het verzenden, streamen, afspelen van het bestand; waarin het 20 watermerk een identificator omvat van het zendstation.Device for preventing intellectual property rights violation of a digital file, comprising: - means for adding a watermark to the digital file at a broadcasting station prior to sending, streaming, and playing back the file; wherein the watermark comprises an identifier of the sending station. 14. Inrichting volgens conclusie 13, geconfigureerd voor het verwijderen van een eerder toegevoegd watermerk.The device of claim 13, configured to delete a previously added watermark. 15. Inrichting volgens conclusie 13, geconfigureerd om een watermerk toe te voegen in een deel van een digitaal bestand waar tot nu toe geen watermark beschikbaar was.The device of claim 13, configured to add a watermark in a portion of a digital file where no watermark has previously been available. 16. Inrichting volgens één van de voorgaande conclusies 13-15, omvattende lokale applicaties, elk geconfigureerd om uitgevoerd te worden bij een station in het 30 distributiekanaal van het digitale bestand, waarin de lokale applicaties nader geconfigureerd worden voor communicatie met een centrale server applicatie.16. Device as claimed in any of the foregoing claims 13-15, comprising local applications, each configured to be executed at a station in the distribution channel of the digital file, wherein the local applications are further configured for communication with a central server application. 17. Inrichting volgens één van de conclusies 13 tot 16, waarin ten minste één van de middelen om een watermerk toe te voegen een plugin omvat.The device of any one of claims 13 to 16, wherein at least one of the means for adding a watermark comprises a plugin.
NL2006658A 2011-04-22 2011-04-22 Method and system for detecting violation of intellectual property rights of a digital file. NL2006658C2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
NL2006658A NL2006658C2 (en) 2011-04-22 2011-04-22 Method and system for detecting violation of intellectual property rights of a digital file.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NL2006658 2011-04-22
NL2006658A NL2006658C2 (en) 2011-04-22 2011-04-22 Method and system for detecting violation of intellectual property rights of a digital file.

Publications (1)

Publication Number Publication Date
NL2006658C2 true NL2006658C2 (en) 2012-10-23

Family

ID=44640789

Family Applications (1)

Application Number Title Priority Date Filing Date
NL2006658A NL2006658C2 (en) 2011-04-22 2011-04-22 Method and system for detecting violation of intellectual property rights of a digital file.

Country Status (1)

Country Link
NL (1) NL2006658C2 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2358313A (en) * 1999-12-20 2001-07-18 Ibm Unique watermarking of web documents
WO2004006494A1 (en) * 2002-07-09 2004-01-15 Kaleidescape, Inc. Parallel distribution and fingerprinting of digital content
WO2004038531A2 (en) * 2002-10-25 2004-05-06 Matsushita Electric Industrial Co., Ltd. Watermark insertion apparatus and watermark extraction apparatus
WO2009027902A2 (en) * 2007-08-27 2009-03-05 Koninklijke Philips Electronics N.V. Apparatus and methods for transferring editable digital content
EP2071822A1 (en) * 2007-12-13 2009-06-17 Thomson Licensing Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2358313A (en) * 1999-12-20 2001-07-18 Ibm Unique watermarking of web documents
WO2004006494A1 (en) * 2002-07-09 2004-01-15 Kaleidescape, Inc. Parallel distribution and fingerprinting of digital content
WO2004038531A2 (en) * 2002-10-25 2004-05-06 Matsushita Electric Industrial Co., Ltd. Watermark insertion apparatus and watermark extraction apparatus
WO2009027902A2 (en) * 2007-08-27 2009-03-05 Koninklijke Philips Electronics N.V. Apparatus and methods for transferring editable digital content
EP2071822A1 (en) * 2007-12-13 2009-06-17 Thomson Licensing Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks

Similar Documents

Publication Publication Date Title
US9275199B2 (en) Method and system for detecting violation of intellectual property rights of a digital file
US8055899B2 (en) Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities
US8249992B2 (en) Digital rights management and audience measurement systems and methods
US8126918B2 (en) Using embedded data with file sharing
US20100174608A1 (en) Digital rights management and audience measurement systems and methods
US8442997B2 (en) Method and apparatus for monitoring the distribution of electronic files
US8655826B1 (en) Processing and acting on rules for content recognition systems
US20080109369A1 (en) Content Management System
US20100287201A1 (en) Method and a system for identifying elementary content portions from an edited content
US20120030041A1 (en) Content interactivity gateway and method of use therewith
US20170116694A1 (en) System and method for monitoring a digital work
US11373009B2 (en) Content playlist integrity
US20160050074A1 (en) Content traceability using segmented watermark encoding
CN110619197B (en) Digital asset right-confirming registration information processing system and method
CN112685794A (en) Online evidence obtaining method, evidence obtaining and right maintaining method, system and computer equipment
NL2006658C2 (en) Method and system for detecting violation of intellectual property rights of a digital file.
Jayasinghe et al. VANGUARD: a blockchain-based solution to digital piracy
EP2134094A1 (en) Method and system for performing transactions on multimedia streams being produced over a chain of contributing producers
WO2019198098A1 (en) A system and method for tracking digital assets in a digital ecosystem
JP2009217661A (en) Illicit content determination support system and control program for illicit content determination support system
CN115272040A (en) Video copyright protection method based on block chain and digital watermark technology
KR101465754B1 (en) The apparatus and method of establishing a copyright to a broadcasting content
JP2005057406A (en) Method for providing distribution information of distribution data
Hirakawa et al. A study on integrated mobile service using digital watermark for various information carriers
KR20100105983A (en) Method for protecting copy right of video contents uploaded on internet by using hash code

Legal Events

Date Code Title Description
PD Change of ownership

Owner name: LINK-BUSTERS IP B.V.; NL

Free format text: DETAILS ASSIGNMENT: VERANDERING VAN EIGENAAR(S), OVERDRACHT; FORMER OWNER NAME: MEDIA COWBOYZ B.V.

Effective date: 20160204