Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling
Reexamination Certificate
2000-08-08
2004-05-04
Alam, Hosain (Department: 2155)
Electrical computers and digital processing systems: multicomput
Computer-to-computer session/connection establishing
Network resources access controlling
C709S203000, C709S213000, C705S051000, C705S057000, C707S793000, C713S152000
Reexamination Certificate
active
06732180
ABSTRACT:
REFERENCE TO PENDING APPLICATIONS
This application is not related to any pending applications.
REFERENCE TO MICROFICHE APPENDIX
This application is not referenced in any microfiche appendix.
TECHNICAL FIELD OF THE INVENTION
The present invention relates generally to automated information processing systems, and more particularly, to a method and article of manufacture to deter and inhibit the use of search engines in locating and retrieving proprietary media throughout a computer compatible communications network.
BACKGROUND OF THE INVENTION
The proliferation of digital formats and compression technologies for audio and video has shaped primarily the Internet, but other computer accessible communication networks as well, as conduits for worldwide sharing of music, movies, software, and digital information (in the instance of the Internet). Thanks to digitization and perceptual coding techniques, files, without limitation, containing entire songs and even feature-length films can be easily transmitted over wide-area networks and internetworks such as the Internet.
MPEG-1 Audio Layer-3 (MP3) is a technology for compressing audio data into a standard format, while preserving sound quality. MP3's perceptual coding technology can shrink digital audio data by a factor of 12 without sacrificing any sound quality. Thus, it is practical to transfer audio content encoded as MP3 files over computer networks. Other applications called “rippers” permit users to extract audio from compact discs and store extracted audio content on hard drives, where they can be transformed by an “encoder” application into the MP3 format. Furthermore, such “encoder” and “ripper” processes have recently been bundled into “1-Step” software, making duplication and distribution of MP3 files even simpler.
MP3 files are commonly available on the World Wide Web (WWW) for downloading using conventional browsers. Non-limiting examples of such browsers would include, but not be limited to Microsoft's Internet Explorer and Netscape's Communicator. Moreover, numerous special network client applications, including Napster, Gnutella and Scour Exchange, now exist, engaging powerful search engines to make sharing, distributing and locating MP3s (and other forms of digital media) even more convenient. This confluence of technology, particularly the powerful media search engines used in client software, has fostered the development of anonymous network communities, whose users are primarily engaged in the illegal sharing of proprietary media.
For example, Napster uses a client-server architecture to share media over the Internet and a Napster client permits users to log on to a server, to add media (i.e., MP3 files) to be recorded to Napster's global index, and to search the global Napster index for sought after shareable media.
For purposes of disclosure and discussion, reference will be made to a media sharing community such as, but not limited to, a Napster media sharing community. As will be discussed, the present invention's disclosure and claims extend far beyond the limitations of one specific media sharing community such as Napster and address other such communities including but not limited to Gnutella and Scour Exchange. It is expressly intended by the inventor that the term “Napster” as discussed herein is provided solely for illustrative and descriptive purposes and not intended to be construed as a limitation of community type to which the benefits of the instant invention are to be extended.
FIG. 1
illustrates the use of Napster like client-server network software utilized for locating and downloading media. A login process
1
.
03
entails launching Napster client software on a computer, which in turn registers the user as active in the Napster community. The registration protocol dictates that a Napster client send a list of MP3 files shared by the client along with client host information used to establish download connections to a Napster server. The login process assists in maintaining an active global index for media shared by Napster clients over the Internet. The logout process
1
.
06
removes client media records from the global index. Searching for media in Napster is a three-step process: (1) The user issues a query, e.g., a string such as “Metallica,” to the Napster client search engine interface
1
.
09
, which forwards the request to the Napster server
1
.
11
. The Napster server
1
.
11
compares the query against its global index and returns a list of matching records to the requesting client (a.k.a. user)
1
.
14
. Record data typically includes the full title, artist name, as well as a Napster user-name, the network connection type and a ping-response time (to estimate data transfer latencies) for the individual sharing the MP3 file. The user then selects a file to download and a client-client network connection is made to transfer the media file from the remote client host
1
.
17
. Note that downloading occurs directly between Napster clients. Consequently, the Napster server is not involved in the downloading process.
While Napster engages a predominantly centralized client-server network software architecture, Gnutella minimizes the role of centralized servers. Gnutella servers do not contain a global index of shared media. Rather, they only provide remote client addresses and connection data. A Gnutella client retrieves a list of clients actively sharing media from the server and polls them directly in a search.
FIG. 2
illustrates the operation of Gnutella network software. The login process for Gnutella clients registers client host identity with a Gnutella server
2
.
03
. Unlike Napster servers, Gnutella servers maintain no index of shared media. Rather, they only contain DNS/IP address information. The server creates a “horizon” for new clients, which defines the other clients visible to them. A Gnutella client search polls other members the of the client's horizon directly for matches
2
.
05
and results are returned to the requesting client
2
.
07
. The user can then select a file and location for download. The client then initiates a direct file transfer from the remote client
2
.
09
. Further, media content broker servers such as, but not limited to Gnutella servers
2
.
03
, provide services which allow users to continually receive evolving information related to their particular horizon
2
.
11
. It is also important to note that Gnutella is not restricted to sharing digital audio. Video, software, text and other forms of digital information, irrespective of media content and type, can be shared as well.
Universities, corporations and other enterprises have sought technical means to reduce the potential for intellectual property right infringements committed on their networks and systems by blocking the use of Napster and other similar media sharing network clients. Absent the present invention, such blocking represents the only viable, technical solution towards preventing the unauthorized procurement copyright of proprietary media utilizing a shared communication's network. Typically, media sharing network clients are blocked at a firewall by filtering (discarding) key packets used in client-server or client-client communication protocols. For example, a firewall can be configured to discard outgoing packets sent to Napster servers, thus inhibiting local users from registering media. Similarly, a firewall can be configured to filter selected incoming packets to inhibit searching or downloading media files.
While blocking appears to be the lone technical solution to prevent the use of media sharing network software to facilitate unauthorized procurement of proprietary media, it has a number of drawbacks that limit its practicality and universal adoption. First, blocking the use of Napster and similarly intended network software may be overly restrictive. Indeed, there are legitimate uses for such applications—not every piece of shared media represents a copyright infringement in the making. Second, blocking is easily rendered ineffect
Hale John C.
Manes Gavin W.
Alam Hosain
Head Johnson & Kachigian
Lazaro David
The University of Tulsa
LandOfFree
Method to inhibit the identification and retrieval of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method to inhibit the identification and retrieval of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to inhibit the identification and retrieval of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3234283