throbber
US006970886B1
`
`(12) United States Patent
`Conwell et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 6,970,886 B1
`Nov. 29, 2005
`
`(54) CONSUMER DRIVEN METHODS FOR
`ASSOCIATING CONTENT INDENTIFIERS
`WITH RELATED WEB ADDRESSES
`
`(75) Inventors: William Y. ConWell, Portland, OR
`(US); Kenneth L. Levy, Stevenson,
`WA (US)
`
`(73) Assignee: Digimarc Corporation, Beaverton, OR
`(Us)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(0) by 642 days.
`
`(21)
`(22)
`(51)
`(52)
`(58)
`
`(56)
`
`Appl. No.: 09/578,551
`
`Filed:
`
`May 25, 2000
`
`Int. Cl.7 ............................................. .. G06F 17/30
`
`US. Cl. ...................................... .. 707/104.1; 707/3
`Field of Search ............................ .. 707/1—10, 100,
`707/104.1, 200, 205; 709/223—225, 219,
`709/217; 705/10, 14
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`9/2000
`6,122,403 A
`7/2001
`6,269,361 B1 *
`9/2001
`6,286,036 B1
`10/2001
`6,311,214 B1
`6,324,573 B1
`1 1/2001
`5/2002
`6,389,467 B1 *
`6/ 2002
`6,401,118 B1 *
`5/2001
`2001/0001854 A1
`9/2001
`2001/0020242 A1
`12/2001
`2001/0055391 A1
`2001/0056573 A1 12/2001
`2002/0071556 A1
`6/2002
`
`Rhoads
`Davis et al. ................. .. 707/2
`Rhoads
`Rhoads
`Rhoads
`Eyal ......................... .. 709/223
`
`Thomas ....................... .. 707/4
`Schena et al.
`Gupta et al.
`Jacobs
`Kavac et al.
`MoskoWitZ et al.
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`
`W00 1/ 06703
`
`1/2001
`
`OTHER PUBLICATIONS
`
`Ponce, B., “The impact of MP3 and the future of digital
`entertainment products”, WWW Artists consortium, NY,
`USA, Sep. 1999, pp. 68-70.*
`“NSI Commandeers Deadbeat Domains,” Wired NeWs, Jun.
`26, 2000 3 pp.
`“Network Solutions Creates Online Marketplace for
`Customers’ Domain Names,” NetWork Solutions, May 10,
`2000, 2 pp.
`
`(Continued)
`Primary Examiner—Mohammad Ali
`(74) Attorney, Agent, or Firm—Digimarc Corporation
`
`(57)
`
`ABSTRACT
`
`Media content objects, such as audio MP3 ?les, are associ
`ated With identi?ers. The identi?ers can be assigned, or can
`be implicit (e.g., derived from other data in the content
`object, as by hashing). A user of the ?le can utilize the
`identi?er to query a database and thereby obtain the URL of
`one or more internet resources associated With that content
`(e.g., Web sites With fan info, concert schedules, opportuni
`ties to purchase CDs, etc.). Some identi?ers may not be
`associated With URLs in the database. A user Who queries
`the database With such an identi?er (e.g., Which may be
`derived from an independently produced MP3) ?nds that
`there is not yet an associated URL. In this case, the user may
`be given the opportunity to lease this virtual address for a
`predetermined period, With the privilege of specifying a
`URL for that identi?er. Subsequent users Who link from this
`particular MP3 ?le thereafter are directed to the URL
`speci?ed by the ?rst user. In some arrangements, the leasing
`privilege is aWarded through a brief auction, triggered by the
`?rst user’s discovery that the address is not used. Other users
`Who query the database With that identi?er during the period
`of the auction are permitted to bid. When the ?rst lease
`period expires, the privilege can be re-auctioned. Proceeds
`from such auctions can be shared, e.g., With the user Who
`triggered the ?rst action, or With the high bidder of a
`previous auction.
`
`27 Claims, 2 Drawing Sheets
`
`MUSIC CD INPUT TO RIPPER
`
`I
`RIPF‘ER SOFTWARE SENDS
`CD IDENTIFYING INFO
`TO CDDB.COM
`
`I
`
`CDDB.COM REPLIES WITH
`SONG TITLE INFO
`
`I
`HASH SONG TITLE INFO
`RECEIVED FROM CDDB.COM,
`AND ADD TO CONTENT; STORE
`IN MP3 FORMAT
`
`Google Ex. 1009
`
`

`

`US 6,970,886 B1
`Page 2
`
`OTHER PUBLICATIONS
`“InSearchofMy.corn—Frequently Asked Questions,” Net
`Work Solutions, 2000, 3 pp., Jul. 29, 2000.
`“AddressAuction.corn—The World’s Only Truly Interactive
`Market for Secondary Domain names,” Copyright 1999, 1
`page.
`US. Appl. No. 09/476,686, ?led Dec. 30, 1999, Rhoads et
`al.
`US. Appl. No. 09/531,076, ?led Mar. 18, 2000, Rhoads et
`al
`US. Appl. No. 09/563,664, ?led May 2, 2000, Levy et al.
`
`US. Appl. No. 09/574,726, ?led May 18, 2000, Rhoads et
`al.
`US. Appl. No. 09/547,664, ?led Apr. 12, 2000, Rhoads et al.
`US. Appl. No. 09/571,422, ?led May 15, 2000, Rhoads et
`al.
`US. Appl. No. 09/292,569, ?led Apr. 15, 1999, Rhoads et al.
`US. Appl. No. 09/502,542, ?led Feb. 10, 2000, Davis et al.
`US. Appl. No. 60/189,246, ?led Mar. 14, 2000, Levy.
`U.S. Appl. No. 60/134,782, ?led May 19, 1999, Rhoads.
`
`* cited by eXarniner
`
`Google Ex. 1009
`
`

`

`U.S. Patent
`
`Nov. 29,2005
`
`Sheet 1 0f 2
`
`US 6,970,886 B1
`
`AUDIO WITH
`IDENTIFIER
`(EXPLICIT OR
`
`IMPliICIT)
`
`DECODER
`
`IDENTIFIER
`
`REGISTRY DATABASE
`
`I
`URL ADDRESS INFO
`
`BROWSER SOFTWARE
`
`FIG. 1
`
`MUSIC CD INPUT TO RIPPER
`
`I
`
`RIPPER SOFTWARE SENDS
`CD IDENTIFYING INFO
`TO CDDB.COM
`
`CDDB.COM REPLIES WITH
`SONG TITLE INFO
`
`l
`HASH SONG TITLE INFO
`RECEIVED FROM CDDB.COM,
`AND ADD TO CONTENT; STORE
`IN MP3 FORMAT
`
`FIG. 2
`
`Google Ex. 1009
`
`

`

`U.S. Patent
`
`Nov. 29,2005
`
`Sheet 2 0f 2
`
`US 6,970,886 B1
`
`www.sonymusic.c0m/cata|og/05634.html
`
`www.sonymusic.com/catal0g/0O014.htm|
`
`www.supertracks.com/index/artists/taylor. htm
`
`www.emusic.com/0555353x.pdf
`
`www.cdw.com/music/featured_CDs/index.html
`
`www.sonymusic.com/catal0g/0O231.html
`
`www.polygram.com/franklin/adf__234.htm
`
`www.loudeye.com/rap/1999/46755646.htm|
`
`www.sonymusic.com/cata|og/O5634.html
`
`www.sonymusic.com/catalog/00O14.htm|
`
`www.supertracks.com/index/artists/taylor.htm
`
`www.emusic.com/O555353x.pdf
`
`www.cdw.com/musiclfeatured_CDs/index.html
`
`www.sonymusic.com/cata|og/0O231 .html
`
`www.polygram.com/frank|in/adf_234.htm
`
`www.userde?ned.com/OO0O4.html
`
`www.loudeye.com/rap/1999/46755646.html
`
`034
`
`112
`
`198
`
`376
`
`597
`
`612
`
`850
`
`921
`
`FIG. 3
`
`034
`
`1 12
`
`198
`
`376
`
`597
`
`612
`
`850
`
`883
`
`921
`
`FIG. 4
`
`Google Ex. 1009
`
`

`

`US 6,970,886 B1
`
`1
`CONSUMER DRIVEN METHODS FOR
`ASSOCIATING CONTENT INDENTIFIERS
`WITH RELATED WEB ADDRESSES
`
`RELATED APPLICATION DATA
`
`The subject matter of the present application is related to
`that disclosed in copending application Ser. No. 09/476,686,
`?led Dec. 30, 1999; 09/531,076, ?led Mar. 18, 2000; Ser.
`No. 09/563,664, ?led May 2, 2000; and 09/574,726, ?led
`May 18, 2000. The disclosures of these applications are
`incorporated herein by reference.
`
`FIELD OF THE INVENTION
`
`The present invention relates to leasing of virtual
`addresses, as may be associated With music or other media
`content.
`
`BACKGROUND AND SUMMARY OF THE
`INVENTION
`
`For expository convenience, the present disclosure is
`illustrated With reference to audio content. HoWever, it
`should be recognized that the principles described beloW are
`applicable in any media context, including still imagery,
`video, product packaging, etc.
`In the cited patent applications, the present assignee
`disclosed a variety of technologies by Which audio content
`can be associated With corresponding internet resources. In
`some such approaches, the audio content is steganographi
`cally encoded (e.g., by digital Watermarking) to convey an
`identi?er. When a computer encounters such an encoded
`audio object, it discerns the encoded identi?er, forWards the
`identi?er to a remote database (a “Registry database”), and
`receives in response—from a database record indexed by the
`identi?er—the address of one or more internet resources
`related to that audio (e.g., fan sites, concert schedules,
`e-commerce opportunities, etc.) The computer can then link
`to such a resource and present same to a user, e.g., using an
`internet broWser program. Such an arrangement is shoWn in
`FIG. 1.
`There are many variations on this model. For example,
`instead of steganographically encoding the identi?er in the
`content, the identi?er can be added into header or other data
`With Which the content is conventionally packaged.
`The identi?er can be assigned to the content. Or the
`identi?er can be derived, in some manner, from the content.
`In the former, assigned identi?er case, an entity such as a
`music publisher (e.g., Sony) or a music distributor (e.g.,
`emusic.com), selects a number for encoding into the content.
`The number may be selected from a limited range of
`numbers (e. g., a range of numbers allocated to that publisher
`by the proprietor of the Registry database), but the number
`itself is not inherently related to the content With Which it is
`associated.
`In the latter case, the identi?er is derived from the content,
`or from other information associated With the content.
`One Way to derive an identi?er is to employ selected bits
`of the content, itself, as the identi?er. For example, in MP3
`audio, Where the signal is encoded into frames, the Nth bit
`of the ?rst 128 frames of a musical Work can be assembled
`together into a 128 bit identi?er. Or data present in MP3
`headers can be used. In another approach, some or all of the
`content data is processed by a hashing algorithm to yield a
`128 bit identi?er corresponding to that content. In both of
`
`2
`these cases, the identi?er is implicit in the audio itself. That
`is, no data needs to be added (e.g., in a header, or by
`steganographic encoding).
`When deriving the identi?er from associated information,
`one can use the table of contents (TOC) of the CD or ?le
`allocation table of the DVD. The ID can be embedded Within
`the MP3 ?le, if it is being ripped from the CD or DVD at the
`time or ID creation. The method of embedding can be
`embedded via header, footer or frame bits, or via a Water
`mark.
`Some techniques for deriving an identi?er may rely on
`external resources. For example, When “ripping” a song
`from a commercial music CD into MP3 form, many ripper
`softWare programs refer to an on-line disc recognition
`database, found at WWW.cddb.com, to obtain the title and
`length of the song. This “table of contents” information can
`be used to form the identi?er, e.g., by selecting predeter
`mined bits, hashing, etc. In this case, the identi?er must
`generally be added to the audio (i.e., it is explicit, as Was the
`case of the assigned identi?ers). Such an arrangement is
`shoWn in FIG. 2.
`The artisan Will recogniZe that there are an essentially
`in?nite number of algorithms by Which such derived iden
`ti?ers can be generated. (It Will be noted that derived
`identi?ers may not be unique. That is, tWo unrelated audio
`?les may—coincidentally—correspond to the same identi
`?er. But by making the identi?er sufficiently long (e.g., 128
`bits), such occurrences can be made arbitrarily unlikely.)
`When an identi?er is assigned to content, the entity doing
`the assigning (e.g., a record label such as Sony, or a music
`distributor such as Emusic) can ensure that the Registry
`database has a record corresponding to that identi?er. The
`database record contains, e.g., one or more URL(s) leading
`to information relating to the audio content.
`A different situation arises When the identi?er is derived
`from content. No master authority ensures that the Registry
`database has a record corresponding to that identi?er. Thus,
`if a college student rips music from a privately-produced CD
`into an MP3 ?le, the identi?er derived from that music may
`not point to an active database record in the Registry
`database. This can also occur With CDs from major or minor
`labels that don’t register all their identi?ers. For example,
`the Kinks’ CDs may not be registered by the label oWning
`rights to their albums because of their fall in popularity.
`HoWever, a general consumer/business person could register
`the CD’s identi?er to sell Kinks’ paraphernalia. The con
`sumer/business person does not need to make the same
`amount of revenue as the record label to make the registra
`tion process and maintenance Worth his/her time.
`If the MP3 ?le so-produced becomes popular, and is
`Widely spread (e.g., through means such as Napster, Gnu
`tella, etc.) a large potential audience may develop for
`internet resources related to that MP3. The issue then arises:
`Who manages the Registry database address represented by
`the corresponding identi?er?
`The present invention addresses this and related issues.
`In accordance With one aspect of the present invention, a
`user Who encounters an unused Registry database record is
`given an option to manage it, or to participate ?nancially in
`its exploitation.
`For example, in one embodiment, When the Registry
`database ?rst receives a query corresponding to an un-used
`identi?er, the person initiating the query is given an oppor
`tunity to lease that identi?er for a predetermined period,
`such as tWo months. Upon payment of a nominal fee (e.g.,
`$10), the user can specify a URL that Will be stored in the
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`50
`
`55
`
`60
`
`65
`
`Google Ex. 1009
`
`

`

`US 6,970,886 B1
`
`3
`Registry database in association with that identi?er, and to
`which subsequent users will be directed.
`In accordance with another aspect, when a user ?rst
`queries an un-used identi?er in the Registry database, an
`auction commences, with a nominal opening bid (e.g., $10).
`The auction continues for a short period, such as a week or
`a month, allowing other persons who encounter such music
`early in its distribution life to have a chance at gaining the
`leasehold rights. At the end of the auction, the winner is
`granted a lease to that identi?er for a predetermined period
`and can specify the URL with which that identi?er is
`associated.
`At the end of the predetermined period, the identi?er can
`be leased for a subsequent term—either for a ?Xed fee (e.g.,
`a multiple of the fee earlier charged), or through an auction.
`It will be recogniZed that this arrangement has certain
`similarities to the present system for internet domain name
`registration. A user can query a whois database maintained
`by Network Solutions and the like to determine whether a
`domain name is assigned. If it is not, Network Solutions will
`offer to assign the domain name for a term of years in
`eXchange for a payment. But the present invention serves
`different needs and is otherwise different in certain details.
`The foregoing and other features and advantages of the
`present invention will be more readily apparent from the
`detailed description, which proceeds with reference to the
`accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 shows an arrangement by which media content is
`linked to associated internet resources.
`FIG. 2 shows a process employing an eXternal resource
`(here www.cddb.com) to derive an identi?er corresponding
`to audio content.
`FIG. 3 shows a Registry database with which one embodi
`ment of the present invention is illustrated.
`FIG. 4 shows the Registry database of FIG. 3 after entry
`of a new record.
`
`DETAILED DESCRIPTION
`
`Referring to FIG. 3, an exemplary Registry database can
`be conceptualiZed as a large look-up table. Each active
`record includes an identi?er and a corresponding URL.
`When a consumer uses a suitably equipped device (e.g., a
`personal computer, or wireless internet appliance) to decode
`an identi?er from audio content and send the identi?er to the
`database, the database responds by returning the URL cor
`responding to that identi?er back to the user device. The user
`device then directs an internet browser to that URL. By such
`arrangements, music (e.g., in MP3 format) can serve as a
`portal to a web site dedicated to the music artist, a web site
`giving concert schedules for the artist, a web site offering
`CDs, etc.
`In the FIG. 3 eXample, if the device decodes the identi?er
`‘376’ from an MP3 ?le, and queries the database with this
`data, the database returns the URL www.emusic.com/
`0555353X.pdf. The user’s web browser is then directed to
`that URL. (For expository convenience, the identi?ers are
`assumed to be in the range 0—1023. In actual implementa
`tions, a much larger range would usually be used.)
`The just-described sequence of operations is illustrative
`and is subject to numerous variations—various of which are
`detailed in the earlier-cited applications.
`Now assume that an up-and-coming band (“The
`Pinecones”) releases a song in MP3 format. No identi?er is
`
`4
`af?rmatively assigned to the MP3 when it is encoded, but
`compliant players process the MP3 data to derive an iden
`ti?er. (An exemplary algorithm may take the ?rst ten frames
`of MP3 data, and select the 100”1 data bit from each frame,
`to yield a ten bit identi?er.) The derived identi?er may be
`‘883.’ A listener of the song forwards this ‘883’ identi?er to
`the Registry database, hoping thereby to be linked to supple
`mental information about The Pinecones or the song.
`Instead, the Registry reports (e.g., by a default web page)
`that there is no further information related to that MP3 (i.e.,
`there is no database record corresponding to identi?er
`‘883’).
`In this case, the Registry can invite the listener to remedy
`this de?ciency and to create a web page that will be
`associated with that song. In eXchange for a small fee, the
`listener is allowed to specify a URL that will be associated
`with that identi?er for a month. If the user is not equipped
`to design and host a web page, the Registry can provide
`simple web page authoring tools and a hosting service
`permitting the listener to easily create a page on-line.
`If the listener accepts this invitation, he makes the pay
`ment by various known methods (e.g., via credit card, by one
`of several emerging web currencies, etc.). He then composes
`(or speci?es) a web page to correspond to that song. The
`Registry is updated to include a new record for identi?er
`‘883,’ and includes a link to the page speci?ed by the listener
`(e.g., www.userde?ned.com/00004.html). The table after
`updating is shown in FIG. 4.
`If the user wishes, he can complement the substance of the
`linked page with banner advertising, co-op links to on-line
`retailers (e.g., AmaZon.com), or other revenue-producing
`uses.
`Other copies of the same bit-rate Pinecones’ MP3 ?le
`likewise do not have an assigned identi?er. However, com
`pliant players will all derive identi?ers using the same
`algorithm, so all other listeners of the song will be directed
`to the same ‘883’ identi?er in the Registry database. Once
`the ?rst listener activates such a record, later listeners who
`link to the Registry will be linked to the www.userde?ned
`.com/00004.html web page speci?ed by the ?rst listener.
`Since the ID is automatically generated, it may be differ
`ent for each bit-rate MP3 release as well as for each CD
`release. Different bit-rate MP3 releases, such as 128 kbps
`and 96 kbps releases, produce different bits in the resulting
`MP3 ?le; thus, the automatically generated identi?ers may
`be different. CD releases refer to different miXes of the
`music, not copies of the master CD; thus, different CD
`releases have different bits on the CD and, correspondingly,
`the automatically generated identi?ers may be different for
`each CD release. In addition, if the MP3 version is ripped by
`the consumer from the CD, the compliant ripper should
`embed the identi?er generated from the CD into the MP3
`?le. This structure is necessary because various consumer
`rippers produce different bits in the MP3 ?le, since the MP3
`format only de?nes a standard decoder. In all of these cases,
`the server has two options. One option is to check and make
`sure that the same song and artist don’t already eXist. If they
`do, the new identi?er is linked to the same web page. The
`second option is to allow each identi?er, even if from the
`same song but different MP3 or CD releases, to have an
`owner.
`Of course, by suitably designing the algorithm by which
`identi?ers are derived, non-identical versions of the same
`basic content may nonetheless correspond to the same
`identi?er. There is extensive published research on such
`
`10
`
`15
`
`25
`
`35
`
`40
`
`45
`
`55
`
`65
`
`Google Ex. 1009
`
`

`

`US 6,970,886 B1
`
`5
`technology, e.g., hashing algorithms by Which similar or
`related, but non-identical, inputs map to the same hash
`outputs.
`In another embodiment, the ?rst listener does not have an
`absolute right to lease the identi?er. Rather, the ?rst listener
`is given a “?rst mover” advantage in a brief auction for that
`identi?er. By placing a minimum starting bid (e.g., $10), an
`auction for the identi?er is commenced, and continues for a
`Week. Subsequent listeners Who link to that identi?er during
`the auction are given the opportunity to beat the then-highest
`bid. At the end of the auction period, the high bidder is
`charged (typically by pre-arranged means), and given the
`opportunity to specify a link for that identi?er. (Again, the
`Registry operator may offer to host the linked page.)
`In a variant of the foregoing, the ?nal bid proceeds are
`split, With the Registry proprietor sharing a portion (e.g.,
`5—50%) of the proceeds With the listener Who initiated the
`auction. This may create a strong incentive for use of the
`system, as listeners try to ?nd music not already linked by
`the database, hoping to start auctions and share in their
`proceeds.
`Assume the initial lease is for a period of tWo months.
`During that period The Pinecones have become Wildly
`popular, and thousands of listeners are linking to the corre
`sponding Web page daily. The link is noW a hot property. At
`the eXpiry of the initial lease term, the Registry proprietor
`can re-auction the link. The band or its promoters may
`naturally be one of the bidders. This time the auction may
`result in large bids, commensurate With the popularity of the
`music to Which it corresponds. Again, the proceeds of the
`auction may be shared by the Registry proprietor, e.g., With
`the original listener Who discovered the identi?er, or With the
`party Who Was high bidder in the previous (initial) auction.
`In similar fashion, the linking rights can be re-auctioned
`periodically, With the price being proportional to the music’s
`then-current popularity.
`It Will be recogniZed that much of the internet is pornog
`raphy, and some of the persons leasing identi?er links from
`the Registry may seek to promote pornographic or other
`inappropriate sites by such links. Accordingly, the Registry
`may place certain limitations on the linked sites. The sites
`may be checked for RSAC ratings, and only sites With
`non-adult ratings may be alloWed. Alternatively (or addi
`tionally), the sites may be automatically scanned for key
`Words or content (using intelligent search engines, possibly
`based upon trained netWorks and/or arti?cial intelligence)
`suggesting pornography, and those having such Words may
`be manually revieWed. Etc.
`The proprietor may also require that the linked pages
`contain at least a threshold amount of non-advertising con
`tent (e.g., 50% of screen display)—again to encourage use
`of the identi?ers as links to bona?de resources related to the
`corresponding audio content.
`The problem of automated “bots” querying all possible
`identi?ers in the Registry in an attempt to identify and usurp
`the inactive entries is mitigated by (a) the huge universe of
`such identi?ers, and (b) the costs of registering.
`The maintenance of the table 12 is Well understood by
`those skilled in data structures. For ease of description, the
`present disclosure assumes that the entries are sorted, by
`identi?er. In actual implementation, this may not be the case.
`The system may be keyed by identi?er, song and artist, thus
`increasing the speed at Which the system can ?nd duplicate
`songs With different identi?ers.
`From the foregoing, it Will be recogniZed that embodi
`ments of the present invention can be utiliZed to spur
`grassroots development of internet resources associated With
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`6
`a Wide variety of media content objects. Commerce in a neW
`class of virtual assets is enabled—offering the possibility of
`signi?cant ?nancial returns to individuals Who have a knack
`for identifying popular music before it becomes popular. A
`link that Was ?rst leased by a high-schooler for $10 may later
`be re-leased to Sony Music for $10,000. The virtual real
`estate represented by these identi?ers is priced, over time,
`commensurately With their changing commercial impor
`tance.
`Having described and illustrated the principles of the
`invention With reference to illustrative embodiments, it
`should be recogniZed that the invention is not so limited.
`For eXample, While the discussion contemplated that the
`unassigned identi?ers Were derived from the content, the
`same or similar approaches can be applied With assigned
`identi?ers.
`LikeWise, it Will be recogniZed that the universe of
`identi?ers may be segmented in various Ways to achieve
`various purposes, and only a subset of the entire universe of
`possible identi?ers may be made available in the manners
`here described. For eXample, derived identi?ers may be
`designed to map into a loWer half of a universe of possible
`identi?ers, With the upper half being reserved for assigned
`identi?ers, i.e. setting the most signi?cant bit to determine
`Whether the identi?er is assigned or automatically generated.
`The principles described herein are applicable in other
`conteXts and in other applications, e. g., Wherever there eXists
`a large universe of identi?ers, some of Which correspond to
`objects, and that correspondence is not initially knoWn to an
`entity controlling usage to Which the identi?ers are put. To
`name but one alternative, When video compression and
`Internet bandWidth improve, this auction system can be
`applied to videos.
`While the eXplicit identi?ers detailed above took the form
`of Watermarks and header data, these are illustrative only;
`any form of identi?er can be similarly treated as virtual real
`estate and granted to its discover. Thus, systems based on
`barcodes and other identi?ers may make use of the prin
`ciples of this invention.
`To provide a comprehensive disclosure Without unduly
`lengthening this speci?cation, the patents and applications
`cited herein are incorporated herein by reference.
`It should be recogniZed that the particular combinations of
`elements and features in the above-detailed embodiments
`are exemplary only; the interchanging and substitution of
`these teachings With other teachings in this and the incor
`porated-by-reference patents/applications are also contem
`plated.
`In vieW of the Wide variety of embodiments to Which the
`principles and features discussed above can be applied, it
`should be apparent that the detailed embodiments are illus
`trative only and should not be taken as limiting the scope of
`the invention. Rather, I claim as my invention all such
`modi?cations as may come Within the scope and spirit of the
`folloWing claims and equivalents thereof.
`
`We claim:
`1. A method of operating a database that has plural
`records, the method including receiving queries, each
`including an identi?er, and replying to said queries by
`reference to information from database records associated
`With said identi?ers, said identi?ers being draWn from a
`universe of possible identi?ers, a majority of Which do not
`have active database records associated thereWith, the
`method including:
`
`Google Ex. 1009
`
`

`

`US 6,970,886 B1
`
`7
`receiving a query from a user including an identi?er that
`has no active database record associated thereWith, said
`identi?er being derived from an eXisting media content
`object; and
`permitting the user to create an active database record
`corresponding to said identi?er.
`2. The method of claim 1 that includes alloWing the user
`to pay a fee, said fee entitling the user to specify at least a
`portion of the database record corresponding to said iden
`ti?er.
`3. The method of claim 1 that includes alloWing the user
`to make a ?rst bid in an auction, said auction continuing for
`a predetermined period commencing With said ?rst bid.
`4. A method comprising:
`deriving an identi?er corresponding to an eXisting media
`content object;
`querying a database With the derived identi?er; and
`if the database has no active record corresponding to said
`derived identi?er, permitting a party Who ?rst queried
`the database With said identi?er to de?ne such a record.
`5. The method of claim 4 in Which the media content
`object is an audio ?le.
`6. The method of claim 4 in Which the media content
`object is an MP3 audio ?le.
`7. The method of claim 4 in Which the media content
`object is a video ?le.
`8. The method of claim 4 in Which the deriving includes
`consulting a resource eXternal of the media content object.
`9. The method of claim 8 in Which the resource is a
`database.
`10. The method of claim 4 in Which the deriving includes
`processing data from the media content object to obtain said
`identi?er.
`11. The method of claim 4 in Which several identi?ers can
`correspond to the same media content object.
`12. The method of claim 11 in Which the identi?ers are
`automatically generated from different releases of an audio
`CD, Wherein the releases have different audio and/or table of
`contents.
`13. The method of claim 11 in Which the identi?ers are
`automatically generated from different versions of an MP3
`?le, Wherein the versions have different bits due to the
`compression and/or bit-rate.
`14. A method of managing a universe of identi?ers, some
`of said identi?ers being active and having internet resources
`associated thereWith, and others of said identi?ers being
`inactive, the method including receiving a query corre
`sponding to an inactive identi?er and, in response, initiating
`a time-limited auction, a Winner of said auction being
`granted the privilege of associating an internet resource With
`said identi?er for at least a predetermined time period.
`15. The method of claim 14 in Which said active identi
`?ers correspond to different audio content, and the internet
`resources corresponding to said active identi?ers correspond
`to said audio content.
`
`10
`
`15
`
`25
`
`35
`
`40
`
`45
`
`55
`
`8
`16. A method comprising:
`auctioning to the highest bidder the privilege of de?ning
`a link that is to be associated, for a predetermined time
`period, With an identi?er through a database; and
`at the eXpiry of said predetermined time period, re
`auctioning said privilege.
`17. The method of claim 16 in Which the proceeds of said
`re-auctioning are shared With the high bidder of a previous
`auction for said privilege.
`18. The method of claim 16 in Which the identi?er
`corresponds to an eXisting media content object.
`19. The method of claim 18 in Which the identi?er is
`derived, rather than assigned.
`20. The method of claim 1 Wherein a primary function of
`the database is to link consumers to internet resources, such
`as Web pages, that promote goods or services that are related
`to the media content objects and that are offered by com
`mercial entities, and said user is one of said consumers,
`Wherein the consumer can participate in such linking in a
`manner customarily reserved to the commercial entities.
`21. The method of claim 1 that includes automatically
`providing the identi?er from a process on a user
`device—such as a computer—to the database, Without
`requiring the user to type or otherWise manually enter the
`identi?er.
`22. The method of claim 4 Wherein a primary function of
`the database is to link consumers to internet resources, such
`as Web pages, that promote goods or services that are related
`to media content objects and that are offered by commercial
`entities, and said party is one of said consumers, Wherein the
`consumer can participate in such linking in a manner cus
`tomarily reserved to the commercial entities.
`23. The method of claim 1 that includes automatically
`providing the identi?er from a process on a device main
`tained by said party—such as a computer—to the database,
`Without requiring said party to type or otherWise manually
`enter the identi?er.
`24. The method of claim 14 Wherein said identi?ers and
`internet resources are associated through a database, a
`primary function of Which is to link consumers to internet
`resources that promote goods or services that are related to
`media content objects and that are offered by commercial
`entities, and said Winner is one of said consumers, Wherein
`the consumer can participate in such linking in a manner
`customarily reserved to the commercial entities.
`25. The method of claim 14 that includes automatically
`deriving the identi?er using a device maintained by said
`Winner, Without requiring said Winner to type or otherWise
`manually enter the identi?er.
`26. The method of claim 16 Wherein a primary function of
`the database is to link cons

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket