WO2004075076A1 - Procede, appareil et systeme pour le partage de fichiers entre ordinateurs - Google Patents

Procede, appareil et systeme pour le partage de fichiers entre ordinateurs Download PDF

Info

Publication number
WO2004075076A1
WO2004075076A1 PCT/US2003/005164 US0305164W WO2004075076A1 WO 2004075076 A1 WO2004075076 A1 WO 2004075076A1 US 0305164 W US0305164 W US 0305164W WO 2004075076 A1 WO2004075076 A1 WO 2004075076A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
user
variant
data file
target query
Prior art date
Application number
PCT/US2003/005164
Other languages
English (en)
Inventor
Todd J. Souvignier
Valentin Kantchev
Kalin Georgiev Toshev
Original Assignee
Exploit Systems, Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Exploit Systems, Inc filed Critical Exploit Systems, Inc
Priority to AU2003217613A priority Critical patent/AU2003217613A1/en
Priority to PCT/US2003/005164 priority patent/WO2004075076A1/fr
Publication of WO2004075076A1 publication Critical patent/WO2004075076A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1834Distributed file systems implemented based on peer-to-peer networks, e.g. gnutella

Definitions

  • the present invention is directed to a file sharing system, method and apparatus for use on a network. More specifically, a peer to peer file sharing system that provides authorized copies of content files for transfer between computers on a network, wherein the ability to locate the file on the network is enhanced by the creation of variable identifiers associated with the content file.
  • Wide area networks such as the Internet or World Wide Web (“WWW”) have created a new marketplace for goods and sendees, and further have created the opportunity for users throughout the world to exchange information. Indeed, performers and artists, well known and unknown, have utilized the networks to expose their creative works, for example, music, photographs, and writings, to the world.
  • WWW World Wide Web
  • secondary networks have been created that allow for the direct sharing of files between users.
  • the secondary networks or file sharing networks
  • the 'shared' files are typically files of general interest, such as, music, photographs, software programs and the like.
  • the secondary networks operate in conjunction with the WWW and other wide area networks, and thus, a fluidity of network communication is maintained. Indeed, searches performed by users on the secondary networks can retrieve search results from other secondary networks and from wide area networks. Thus, access to the vast amount of information available on the wide area networks is not lost by the user.
  • a problem with the operation of file sharing networks is that no control exists regarding how the shared files are entered into the network, or originally obtained.
  • many shared files are originally pilfered from chat rooms, bulletin boards, or from other web sites.
  • violations of laws occur as these files are transferred and distributed among users.
  • lawsuits regarding copyright and trademark violations are proliferating.
  • artists seeking to introduce their work to the world find that unauthorized copying and alteration of the work frequently occurs.
  • the owners intend to only distribute their works for a fee the authorized distribution of these works fails to provide any monetary compensation to the owner.
  • Figure 1 is a network system environment in accordance with a preferred embodiment of the present invention.
  • Figure 2 illustrates the file sharing system in accordance with a preferred embodiment of the invention.
  • Figure 3 is a block diagram of creating clone identifiers or variant target terms in accordance with preferred embodiments of the present invention.
  • Figure 4 is a block diagram of a process for software delivery to a user for the distribution of data files in accordance with preferred embodiments of the invention.
  • Figure 5 is a block diagram of the process for tracking and monitoring deployed content files in accordance with preferred embodiments of the present invention.
  • Figure 6 is a block diagram of load balancing in accordance with preferred embodiments of the present invention.
  • Embodiments of the present invention are directed to a file sharing system, method and apparatus which operates on a network and provides peer to peer file sharing.
  • a file delivery system receives data files from third parties, wherein these files are intended by the owner of the file to be shared with other users.
  • the file delivery system Upon receipt of the data file, the file delivery system encrypts the data to secure the file and stores the file in a content database.
  • the file delivery system creates 'clone' identifiers, or variant target query terms for the file, wherein the clone identifiers are shortcuts or aliases for the file identification that create a set of variations upon which a file can be identified.
  • Clone identifiers are created via a set of rules applied to the filename and any metatags stored in the file.
  • the 'clone' identifiers are stored in a database and are associated with the specific file.
  • a multitude of identical databases exists which store the clone identifiers for more effective distribution, thereby reducing the ability of the database content to be blocked.
  • the database is made accessible to various networks for searching by the users.
  • the file delivery system searches the database for words matching, in whole or in part, to the file identifiers, including the clone identifiers in the database. If a file is determined to be a match for the user's search, identification of the file is presented to the user.
  • the file Upon request from the user, the file is transmitted to the user computer from the file delivery system.
  • a rights acquisition page is transmitted to the user.
  • the rights acquisition page displays licensing terms for use of the requested file.
  • tracking software is also transmitted. If the user refuses to accept the tracking software, the user is still allowed to license the downloaded data file, upon agreeing to the terms of the license.
  • the tracking software is a monitoring and reporting software that monitors specified activities of the user.
  • the tracking software monitors a user's access to other networks, including third party file sharing networks, in conjunction with downloading a file from the other networks.
  • the tracking software reports the file name and file attributes of the downloaded file to the file delivery system.
  • the file delivery system searches a second database that contains targeted files to determine whether any of the targeted files can be forwarded to the user, wherein the targeted files relate in some manner to the downloaded file. It is to be understood that the file delivery system can predetermine the targeted files to be forwarded depending upon the subject matter of the file downloaded from the file sharing software.
  • the file delivery system searches the databases of affiliates or partners in the system.
  • the file delivery system In addition to downloading content from the content database, the file delivery system separately tracks copies of the downloaded content which are subsequently transferred by the user to other users. To track these additional copies, the file delivery system polls the networks and locates all of the copies of its data files. Once the file delivery system has located the copies of its data files, the file delivery system ranks the accessibility of the data files based, in part, upon the type of system that stores the file. In this regard, if the file delivery system is overloaded with requests for a particular file, the file delivery system can direct the user to one of the third party locations for download. If there is no location acceptable for substitute downloads, the file delivery system directly delivers the requested data file to the user.
  • the file delivery system injects itself into other networks by collecting lists of other hosts that exist on other networks. To collect new host lists, the file delivery system accesses other network nodes, or reflectors and copies the host list listed at that reflector. The file delivery system then contacts the hosts listed on the list, via the computer, and identifies itself as an existing host.
  • a feature of preferred embodiments of the invention is the creation of variant target terms.
  • An advantage to this feature is that a user is not required to identically match a file name, or file identifiers in searching for a specific file or a file contained within particular subject matter.
  • a further advantage to this feature is that the file can more readily be located and thus, becomes more accessible to users.
  • Another feature of preferred embodiments of the invention is the ability to track the files transferred among network users and rank the accessibility of the files.
  • An advantage to this feature is the ability of the file delivery system to transfer load to another location by directing a user to one of the third party locations for download, thereby reducing load on the file delivery system and cost to the file delivery system
  • a still further feature of preferred embodiments of the invention is the injection of the file delivery system into other networks via collecting host lists from other network reflectors.
  • An advantage to this feature is that the new host becomes aware of the file delivery system, such that, searches conducted on the host computer can now access the file delivery system and therefore, its database.
  • Another advantage to this feature is that the files in the file delivery system become accessible to a wider group of users.
  • the file delivery system can track download activity of users.
  • the file delivery system can transmit files related to the files being downloaded by the user from any computer or network, such as, marketing files.
  • the file delivery system can determine more popular or desired files as it can track the number of times that a file is transferred.
  • the file delivery system can provide targeted advertisements at the place and time of the downloading of the file.
  • a still further feature of preferred embodiments is the generation of the variant target identifiers for each content file results in the creation of a population of variant target identifications in the search result list.
  • the advantage to this feature is the increased likelihood that a user will be exposed to the underlying content file.
  • a further feature of preferred embodiments is that the number of created file identifiers can be increased or decreased dynamically based on population levels of competing content on the network.
  • An advantage to this feature is that the file sharing system can operate ecologically, that is, the system can monitor the number of identifiers required to achieve distribution of the content file and respond by producing a population level of identifiers that does not overload the shared network.
  • the monitoring and tracking means identifies the file creation activity and records the relevant file information upon receipt of the downloaded file by the user computer.
  • An advantage to this feature is that the tracking and identification of the newly downloaded content is instituted only upon the downloading of the file and is not monitoring search or query information, thereby being able to more effectively collect relevant information regarding a user's selections as the information is based upon an actually downloaded file, and thus, targeted information can be delivered to the user without creating a user profile and without requiring the user to be authenticated on the system.
  • Preferred embodiments of the instant invention operate on a network, such as, for example, the Internet or World Wide Web (“WWW”), or any other type of network system, including, a peer-to-peer network, an internet or an intranet.
  • a network such as, for example, the Internet or World Wide Web (“WWW”), or any other type of network system, including, a peer-to-peer network, an internet or an intranet.
  • WWW World Wide Web
  • Preferred embodiments of the present invention operate on a network system 10 including at least two client or user computers 12, at least one affiliate or partner computer 14 and a file sharing system 16 coupled for communication there between, generally represented at 18. It will be understood that further embodiments may employ any suitable number of user, and affiliate or partner computers, or may eliminate the affiliate or partner computer.
  • the network system 10 may comprise a closed or intranet configuration, an open or public-access network configuration or combinations of such configurations, as is well known in the art.
  • the network system 10 comprises a combination of a large number of interconnected internets and intranets, including third party file sharing systems.
  • the user computer 12 may comprise any suitable network device capable of communicating with other network devices in the network system.
  • the user computer 12 comprises a programmable processor capable of operating in accordance with programs stored on one or more computer readable media (for example, but not limited to floppy disc, hard disc, computer network, random access memory (RAM), CD-ROM, or theiike), a display device for providing a user-perceivable display (for example, but not limited to visual displays, such as cathode ray tube (CRT) displays, light-emitting-diode (LED) or liquid-crystal-diode (LCD) displays, plasma displays or the like, audio displays or tactile displays), and a user input device (for example, but not limited to, a keyboard, mouse, microphone, or the like).
  • the user computer and advertiser computer comprise a personal computer system having a CRT display, a keyboard and a mouse user-input device.
  • the user computer 12 is controlled by suitable software, including network communication and browser software to allow a user to request, receive and display information (or content) from or through a partner computer 14 on the network system 10.
  • the user computer 12 employs a program, such as a browser, for displaying content received from other network devices, such as a partner computer 14, or a file sharing system 16.
  • the partner computer 14 may comprise any suitable network device capable of providing content (data representing text, hypertext, photographs, graphics video and/or audio) for communication over the network.
  • the partner computer 14 comprises a programmable processor capable of operating in accordance with programs stored on one or more computer readable media (for example, but not limited to, floppy disks, hard disks, random access memory RAM,
  • the partner computer 14 may comprise, for example, but is not limited to, a personal computer, a mainframe computer, network computer, portable computer, personal data assistant (such as, Palm lnc.'s Palm Pilot), or the like
  • the partner computer 14 may include one or more internal data storage devices (not shown) or may be coupled to an external data storage device 20, computer or other means.
  • the partner computer 16 is also in electronic communication with the file sharing system 16.
  • the file sharing system 16 may comprise any suitable network device capable of processing information and providing content (data representing text, hypertext, photographs, graphics video and/or audio) for communication over the network.
  • the file sharing system 16 may comprise, for example, but is not limited to, a personal computer, a mainframe computer, network computer, portable computer, personal data assistant (such as, a Palm Inc.'s 1705), or the like.
  • the file sharing system 16 is similar to the user computer 12 and partner computer 14, and thus, the descriptions set forth above for these devices 12,14 is fully applicable with regard to the file sharing system 16.
  • Embodiments of the present invention are directed to a method, apparatus and system for file sharing among user computers.
  • embodiments of the present invention allow content from a content database to be shared among users and tracked by the system, wherein content related to the shared file can be transmitted as the file is shared, and statics on the file usage can be maintained.
  • embodiments of the file sharing system 16 comprise a content manager 30, a clone processor 50, a network interface layer 70, and a distribution manager 80.
  • the content manager 30 is a pre-distribution processor that comprises a digitizer 32, an embedding means 34, an encoder 36, an encrypting means 38 and a storage database 40.
  • the content manager is configured to receive content, or data, files from third parties 42, such as, producers, graphic artists, writers, photographers, and the like.
  • the data files include, but are not limited to, photographs, text files, graphic files, audio visual files, and the like. These files are intended by the owner of the file to be shared with other users, ⁇ f any limitations are imposed on the use or distribution of the content, the content owner indicates such limitations upon the registration or inputting of the content file into the content manager 30, including, but not limited to, a fee amount for usage or viewing of the content.
  • the content manager 30 Upon receipt of the data file, the content manager 30 prepares the file for distribution. To prepare the file for distribution, the content manager determines whether the file must be converted to digital format. If the file requires digitization, the file is processed through the digitizer 32, which converts the file to digital format. In some instances, file content will be received in a digitized format and thus, digitization will not be required. In some instances, once the file has been digitized, the file is embedded, via the embedding means, with URL scripts or commands. The URL script contains the address of a web page, wherein, the web page and the web page content are displayed during the play of the file.
  • the file is encoded by the encoder 36 to compress the data, for example, the video or audio, into distribution formats.
  • the file is then secured via encryption, wherein the encrypting means 38 encrypts the file in accordance with any restrictions of usage and distribution that may be required by the content owner, including, for example, payment requirements for receipt of the file.
  • the file is stored in the storage database 40 for later access.
  • the clone processor 50 is a software application that creates a profusion of 'clone' identifiers, or variant target query terms for each content file, wherein the clone identifiers are shortcuts or aliases for the file identifiers associated with each content file.
  • the clone processor creates a set of variations upon which a specific content file can be identified.
  • the clone processor applies a set of language rules to a set of target or query terms associated with the content file.
  • the original file name, metadata values and target terms, or query terms are input into the clone processor by an operator 52.
  • the target terms are provided with the file content by the content owner upon input of the file into the file sharing system, wherein these pre-identified terms are utilized by the clone processor.
  • Target terms are terms relevant to the content, including, but not limited to, the title, artist, author, actor, producer, photographer, subject matter of content and the like. Additionally, target terms can also include terms that are unrelated to the content or terms that are general terms categorizing the content.
  • the clone processor applies a set of language rules to the original file name, the metadata value, and each member in the set of target terms 54.
  • the language rules create a plurality of clone identifiers, that is, variants or variations on the file names and tag data, wherein the clone variations are created by predefined routines to create variations, for example, on wording and punctuation, including inserting keywords and phrases, or variant words, phrases or characters into the file name and metadata fields, such as genre, title, and description.
  • the rules include adding punctuation to the filename, changing the order of the words or syllables comprising the filename, and adding words, such as metatag identifiers, to the filename.
  • the clone identifiers are associated with the specific content file, wherein the clone identifier and associated file information is stored in a relational manner the database.
  • file attributes are applied to the clone identifiers 56.
  • each clone identifier is assigned file attributes, such as, file size, file type, bit rate, creation date and the like.
  • the clone identifiers are multiplied by programmatically generated file attributes.
  • unique variations can be created using large ranges for each attribute. For example, a file size range of 1 kbyte to 10 Megabytes can be applied.
  • each clone identifier is assigned host attributes, such as, an IP address, connection speed, service provider, user name, host applications and the like 58.
  • the clone identifiers are multiplied by programmatically generated host attributes. To increase the number of variations on the host attributes, unique variations can be generated by creating values from within the full value ranges of each parameter. For example, a range of IP addresses.
  • the assignment or affixing of host attributes to the clone identifiers creates 'spoofed hosts', wherein each of the spoofed hosts redirects the user to the original content database via the clone processor. It is to be understood that in some preferred embodiments, file attributes and host attributes are not assigned to each content file, and in other preferred embodiments, such assignments are optional for the file attributes, the host attributes or any combination thereof.
  • the clone identifiers and attributes are associated with both the original content file and the set of keywords or terms associated with the file 60.
  • a clone population or 'clone farm' is created, wherein each of the aliases appear as downloadable content to the users on a network, thereby increasing the likelihood that a particular content file will be presented to the user.
  • each content file can be exposed to the network numerous times, and these exposures can be grouped such that users requesting a targeted query or search term will receive large numbers of cloned variant entries in the search result list.
  • a search request by a user computer results in the identification of the associated content file in the search result list with a high frequency, wherein each alias is presented to the user as associated with discrete content.
  • the cloned variants in the search result list are returned to users in a manner such that multiple cloned entries will be ranked at and near the top of the search result list.
  • the number of entries and the prominent positions of the entries increase the likelihood that the end user will select and download the content from the file sharing system.
  • the clone processor updates the clone farm's 'image', that is, available sets of clone populations to the network interface layer 62.
  • the aliases are exposed to the active networks.
  • the clone farm instead of creating file aliases or shortcuts, the clone farm will generate or synthesize search results datagrams such that a series of messages are displayed to the user.
  • the number of clones to be generated for each target term is input into the clone processor.
  • an operator, or manager, of the file sharing system manually inputs the information into the system.
  • the desired number of clones are derived automatically by polling t ⁇ i et networks f i each target term and recording the number of results currently populating each term
  • the polling occurs continuously and interacts with the clone processor such that the clone farm populations levels are dynamically increased or decreased for each target term in accordance with the current population counts of competing content on the networks.
  • the network interface layer 70 an interface between the network, including third party file sharing networks, and the storage database.
  • the network interface layer 70 provides a gateway to the networks and operates in conjunction with the clone processor 50 to identify and deliver original content data to users on the network.
  • the network interface layer 70 is not directly accessible by the user, but rather, is a single gateway through which requests for the content can be processed and directed to the clone processor 50, thereby facilitating the identification of the content associated with the alias and the uploading of that content from the storage database 40 to the user computer 12 by the clone processor 50.
  • the distribution manager 80 facilitates distribution of the content database, including the establishment of access to new distribution networks. Additionally, the distribution manager tracks previously downloaded content and monitors the content request load on the file sharing system such that, if necessary, more efficient avenues for the delivery of files can be identified. With reference again to Figure 2, the distribution manager 80 comprises monitoring and tracking means 82, an index server 84 and a network injector system 86.
  • the monitoring and tracking means 82 is a software application that monitors pre-identified activities of the user; namely, the tracking software monitors when the user receives or downloads selected content files, such as, when the user is accessing third party file sharing software and downloading a file from the third party file sharing software. To perform these tasks, the monitoring and tracking software must be resident on the user computer. As such, the monitoring and tracking means is transmitted to the user upon the user's attempt to open a content file downloaded from the file sharing system.
  • a user has conducts a search and requests the downloading of a content file, such as, a audio or video file
  • the user attempts to play or open the file 90.
  • the content file must be 'unlocked' as it has been encrypted.
  • the unlocking of the' file requires a key, such as a digital rights management (“DRM”) key.
  • DRM digital rights management
  • the content file connects the user to the network, if the user is not already connected to the network, and transmits a request for the key to the DRM license server 92. Further, the user is presented with the licensing acquisition page for the particular content, wherein the licensing page commences the attempt to upload the monitoring and tracking software to the user computer 94.
  • a message such as, a 'take file' message
  • a message is transmitted to the user computer advising of the attempted upload, and requests permission from the user to accept the software.
  • the user accepts the software once the downloading and installation of the software are complete, the 'unlock' key is transmitted to the user 96.
  • the user can now play or view the original content file and has also been 'seeded' with the monitoring and tracking software 98.
  • the provider server transmits the 'take file' message, wherein the transmission of the message includes an explanation of the benefits of accepting the software file 100.
  • the server then re- attempts to upload the software file and repeats the transmission of the message requesting permission 94.
  • the user is allowed to opt-out and not accept the software. In this instance, if the user refuses acceptance of the software file a predefined number of times, the license and key are forwarded to the user without the software file.
  • the monitoring and tracking software automatically launches upon start-up .of the user's computer, wherein the monitoring and tracking software runs in the background on the user' s computer and thus, runs virtually invisibly to the user.
  • the software identifies and reports various user behavior; in particular, the user's activities on other third party networks, such as, downloading or copying files from the third party network.
  • the tracking software reports the file name and file attributes of the downloaded file to the file delivery system, including, but not limited to, title of the file, information from the file header metadata, file type and file source information.
  • the file sharing system can monitor whether copies of any content files stored in the file sharing system that are downloaded from other networks are authorized distributions of the content files.
  • a user connects to a network, wherein upon connecting to the network the monitoring and tracking software is automatically opened and executed on the user computer.
  • the user utilizes the network to search for, and select, any content available for download on the network, wherein the user need not be selecting exclusively from content hosted by the file sharing system discussed in the preferred embodiments set forth herein 102.
  • the user selects content and downloads the selected content to the user computer 104.
  • the monitoring and tracking software identifies the file creation activity and records the relevant file information 106.
  • the file information is transmitted to the file sharing system 108, wherein the incoming file information is examined to determine whether the file name or metadata matches information corresponding to content stored in the content database 40, and therefore likely to be property of a client of the file sharing system. If the content is suspected as being a client-content match, the file information is compared to a list of "Authorized" client content, wherein content on the list is known to be distributed directly by the file sharing system, the client or a third party agent.
  • the file delivery system upon receipt of the file information, utilizes the information to select target information to transmit to the user, including, but not limited to, messages, interactive web pages or advertisement relevant to the file being downloaded.
  • the file delivery system searches a second database that contains targeted information previously identified with particular content files, or keywords, t ⁇ determine whether target information can be forwarded to the user, wherein the targeted information relates in some manner to the downloaded file. If the content is authorized, that it is on the Authorized content list, target information associated with, or related to, the authorized content can be retrieved from the second database and transmitted fro the provider computer to the user computer 108.
  • the content owner can indirectly reward the user for the selection of an authorized copy of the content, or can utilize the opportunity to convey other information to the user, such as, an advertisement, or direct the user to additional authorized downloadable content and purchases. For example, if a user is downloading a Star Trek video clip, the file delivery system might forward an advertisement for a Star Trek convention to the user. If the content is not on the Authorized content list, target information, or a message, associated with, or related to, the content can be retrieved from the second database and transmitted to the user computer 110. In this manner, the content owner can alert the user that the downloaded copy is an unauthorized copy of the content, and can direct the user to authorized downloadable content and purchases.
  • a standard or default message regarding copyright infringement and the like can be transmitted to the user. If the content is not suspected as being a client-content match, the file information is further compared to a list of predefined keywords or phrases 112. If a match is detected with regard to file information, target information associated with, or related to, the keywords or phrases can be retrieved and transmitted to the user computer 1 14. It is to be understood that the file delivery system could also predetermine the advertisements to be forwarded depending upon the subject matter of the file downloaded from the file sharing software.
  • the file sharing system searches target information databases 20 associated with affiliates or partners computers 14 in the system.
  • the affiliates maintain a target information database containing interactive content, merchandise offers and other information.
  • the file sharing system transmits the file title information to the search engine of the affiliate 116, wherein targeting information matching, or associated with the file title information is transmitted to the user as URLs 118.
  • the URLs direct the user to dynamically generated pages that contain content, merchandise offers and other information relevant to the file title information.
  • the file sharing system compares and weighs the sets of results in accordance with a plurality of criteria, including, but not limited to, the number of results, the relevance of each result item, prices associated with merchandise offers or the status of the affiliate's business relationship with respect to the file sharing system. Once the results have been weighted, the 'best' affiliate page is transmitted to the user. Selected URLs are then transmitted to the user so that the affiliate's target information, for example, advertisement, is displayed to the user.
  • the file delivery system separately tracks all of the copies of the downloaded content which are subsequently transferred by the user to other users by storing information on the index server 84.
  • information regarding each 'deployed' or downloaded content file is stored on the index server 120, wherein the information in the deployed list includes file attributes, such as, but not limited to, file name, file size, file type, header metadata content and the like.
  • the file delivery system then polls the networks and locates all of the copies of the deployed data files included in the index server 122.
  • the list of locations for each file is stored in association with the identification of each deployed file by any suitable means, including, but not limited to, buffer memory, a text file or a searchable database.
  • the file delivery system ranks the accessibility of the deployed data files based, in part, upon the type of system that stores the file 124.
  • the file delivery system monitors server traffic to determine whether the traffic, that is, the requests for the particular files, are exceeding a predefined level 126. In this regard, if the file delivery system is overloaded with requests for a particular file, the file delivery system can review the index server for the requested content 128.
  • the file delivery system directs the user to one of the third party locations for download, thereby reducing load on the file delivery system and cost to the file delivery system 130. If there is no location acceptable for substitute downloads, the file delivery system directly delivers the requested data file to the user 132. It is to be understood that redirection of traffic is based only upon requested content and is not redirected due to a general monitoring of the quality of service. It is to be further understood that the file delivery system only indexes content files registered within the system.
  • the network injector system seeks to expand the file delivery system's communication with other networks.
  • the file delivery system injects itself into other networks by collecting lists of other hosts that exist on other networks.
  • the file delivery system accesses other network nodes, or reflectors.
  • the reflectors list the other hosts that communicate with that network.
  • the file delivery system simply copies the host list.
  • the file delivery system then contacts the hosts listed on the list, via the computer, and identifies itself as an existing host.
  • the new host is now aware of the file delivery system, such that, searches conducted on the host's computer can now access the file delivery system and therefore, its database.
  • network injection will be installed on multiple provider computers, wherein each of the provider computers will target a predefined section of a network to perform the injection function. In this manner, more efficient expansion of the file delivery system can occur without redundancy of effort by the system.
  • the file sharing network receives content files from the owners of the content, wherein the content files are intended to be shared with other users.
  • the received content is pre-processed and stored in a content database.
  • the database of the file sharing network is exposed to other networks and made available to users.
  • a user accesses a network, the file sharing network, or some other network to which the file sharing network is known, and conducts a search for content on the network, the content database is reviewed for matches to the query terms input by the user. If matches are found, the matches, which include the clone identifiers associated with the query terms are presented to the user in the search result list. If the user selects one of the clone identifiers, the file sharing system transmits the request to the clone processor, wherein the clone identifier and the original content file identification is resolved. Once the content file is identified, the content file is downloaded to the user. When the user attempts to open or play the content file, the user is presented with a rights acquisition licensing page and the system further attempts to upload the monitoring and tracldng software. Further, the content file transmits a request for a key to unlock the encrypted file.
  • the monitoring and tracking software is uploaded to the user computer and the key is transmitted to the user such that the file can be opened.
  • the software remains open, in the background on the user computer, wherein the software waits for new download activity from other networks by the user. If the user conducts further searches and downloads or transfers content from other networks, the new activity is reported to the provider computer, which utilizes the file information to select target information, such as, advertising, from the target information database or to transmit requests to affiliate or partner computer databases. If desired, the user can respond to the target information.

Abstract

La présente invention, dans divers modes de réalisation, concerne un système de partage de fichiers (16), un procédé et un appareil fonctionnant sur un réseau et assurent le partage de fichiers entre homologues. Le système de distribution de fichiers reçoit des fichiers de données en provenance de tiers (42), effectue le chiffrement des données et le stockage du fichier dans une base de données (40). Une fois le fichier stocké, le système de distribution de fichiers réalise la création d'identifiants clonés, ou des termes d'interrogation cibles variants pour le fichier, dans lesquels les identifiants clonés sont des raccourcis ou pseudonymes pour l'identification de fichier qui créent un ensemble de variations par lesquelles le fichier peut être identifié. Les identifiants clonés sont stockés dans une base de données (40) et sont associés à un fichier spécifique. Lors d'une requête en provenance d'un utilisateur pour un fichier, le fichier est transmis vers l'utilisateur. En outre, un logiciel de localisation est transmis avec le fichier de sorte que le téléchargement ultérieur d'autres fichiers en provenance d'un tiers (42) vers l'utilisateur peut être contrôlé et des publicités ciblées peuvent être affichées.
PCT/US2003/005164 2003-02-19 2003-02-19 Procede, appareil et systeme pour le partage de fichiers entre ordinateurs WO2004075076A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2003217613A AU2003217613A1 (en) 2003-02-19 2003-02-19 A method, apparatus and system for file sharing between computers
PCT/US2003/005164 WO2004075076A1 (fr) 2003-02-19 2003-02-19 Procede, appareil et systeme pour le partage de fichiers entre ordinateurs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2003/005164 WO2004075076A1 (fr) 2003-02-19 2003-02-19 Procede, appareil et systeme pour le partage de fichiers entre ordinateurs

Publications (1)

Publication Number Publication Date
WO2004075076A1 true WO2004075076A1 (fr) 2004-09-02

Family

ID=32907020

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/005164 WO2004075076A1 (fr) 2003-02-19 2003-02-19 Procede, appareil et systeme pour le partage de fichiers entre ordinateurs

Country Status (2)

Country Link
AU (1) AU2003217613A1 (fr)
WO (1) WO2004075076A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2171666A2 (fr) * 2007-06-11 2010-04-07 Tiversa Inc. Système et procédé pour passer des annonces publicitaires dans un réseau de pairs
WO2011021993A1 (fr) * 2009-08-19 2011-02-24 Thomson Licensing Publicité ciblée dans un réseau homologue à homologue

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4821230A (en) * 1986-01-14 1989-04-11 Kabushiki Kaisha Toshiba Machine translation system
US5802518A (en) * 1996-06-04 1998-09-01 Multex Systems, Inc. Information delivery system and method
US5864871A (en) * 1996-06-04 1999-01-26 Multex Systems Information delivery system and method including on-line entitlements
US6075943A (en) * 1997-08-13 2000-06-13 International Business Machines Corporation System and method for client server software installation
US6263328B1 (en) * 1999-04-09 2001-07-17 International Business Machines Corporation Object oriented query model and process for complex heterogeneous database queries
US6289353B1 (en) * 1997-09-24 2001-09-11 Webmd Corporation Intelligent query system for automatically indexing in a database and automatically categorizing users
US6327594B1 (en) * 1999-01-29 2001-12-04 International Business Machines Corporation Methods for shared data management in a pervasive computing environment
US6327589B1 (en) * 1998-06-24 2001-12-04 Microsoft Corporation Method for searching a file having a format unsupported by a search engine
US6341277B1 (en) * 1998-11-17 2002-01-22 International Business Machines Corporation System and method for performance complex heterogeneous database queries using a single SQL expression

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4821230A (en) * 1986-01-14 1989-04-11 Kabushiki Kaisha Toshiba Machine translation system
US5802518A (en) * 1996-06-04 1998-09-01 Multex Systems, Inc. Information delivery system and method
US5864871A (en) * 1996-06-04 1999-01-26 Multex Systems Information delivery system and method including on-line entitlements
US6075943A (en) * 1997-08-13 2000-06-13 International Business Machines Corporation System and method for client server software installation
US6289353B1 (en) * 1997-09-24 2001-09-11 Webmd Corporation Intelligent query system for automatically indexing in a database and automatically categorizing users
US6327589B1 (en) * 1998-06-24 2001-12-04 Microsoft Corporation Method for searching a file having a format unsupported by a search engine
US6341277B1 (en) * 1998-11-17 2002-01-22 International Business Machines Corporation System and method for performance complex heterogeneous database queries using a single SQL expression
US6327594B1 (en) * 1999-01-29 2001-12-04 International Business Machines Corporation Methods for shared data management in a pervasive computing environment
US6263328B1 (en) * 1999-04-09 2001-07-17 International Business Machines Corporation Object oriented query model and process for complex heterogeneous database queries

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9922330B2 (en) 2007-04-12 2018-03-20 Kroll Information Assurance, Llc System and method for advertising on a peer-to-peer network
EP2171666A2 (fr) * 2007-06-11 2010-04-07 Tiversa Inc. Système et procédé pour passer des annonces publicitaires dans un réseau de pairs
EP2171666A4 (fr) * 2007-06-11 2012-05-09 Tiversa Inc Système et procédé pour passer des annonces publicitaires dans un réseau de pairs
WO2011021993A1 (fr) * 2009-08-19 2011-02-24 Thomson Licensing Publicité ciblée dans un réseau homologue à homologue
KR20120042937A (ko) * 2009-08-19 2012-05-03 톰슨 라이센싱 피어-투-피어 네트워크에서의 타겟 광고
CN102474524A (zh) * 2009-08-19 2012-05-23 汤姆森特许公司 对等网络中的针对性广告
US8719095B2 (en) 2009-08-19 2014-05-06 Thomson Licensing Targeted advertising in a peer-to-peer network
KR101634215B1 (ko) 2009-08-19 2016-06-28 톰슨 라이센싱 피어-투-피어 네트워크에서의 타겟 광고

Also Published As

Publication number Publication date
AU2003217613A1 (en) 2004-09-09

Similar Documents

Publication Publication Date Title
US20030078918A1 (en) Method, apparatus and system for file sharing between computers
US9348918B2 (en) Searching content in distributed computing networks
US9639556B2 (en) Methods and systems for sharing database content
US7797295B2 (en) User content feeds from user storage devices to a public search engine
US9569550B1 (en) Custom search index
EP1407358B1 (fr) Systeme et procedes de controle d'acces a un contenu numerique y compris des medias de diffusion en continu
US10585866B2 (en) System and method for exposing internal search indices to internet search engines
CA2668293C (fr) Distribution et gestion de listes de diffusion utilisant le contenu
CA2278727C (fr) Systeme de distribution d'informations accordant des autorisations en ligne et procede correspondant
US7035828B2 (en) Method and system for modifying and transmitting data between a portable computer and a network
US8438469B1 (en) Embedded review and rating information
US8024313B2 (en) System and method for enhanced direction of automated content identification in a distributed environment
US7895123B1 (en) Digital content publication
US20040117376A1 (en) Method for distributed acquisition of data from computer-based network data sources
US20070078832A1 (en) Method and system for using smart tags and a recommendation engine using smart tags
US20020059162A1 (en) Information search method and system therefor
US20060101521A1 (en) System and method for secure usage right management of digital products
WO1997046950A1 (fr) Procede et systeme de distribution d'informations
US20110247084A1 (en) Method and apparatus for authorizing delivery of streaming video to licensed viewers
CN101583945A (zh) 提供虚拟的真正简单聚合(rss)订阅源
EP1766838A2 (fr) Systeme, procede et interface utilisateur client de service de protection contre la copie
US20080104100A1 (en) On-site search engine for the World Wide Web
US20030046239A1 (en) Content management and distribution
JP2008108105A (ja) 情報提供装置、情報提供方法および情報提供プログラム
US20080071830A1 (en) Method of indexing and streaming media files on a distributed network

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP