SYSTEMS AND METHODS FOR MANAGING CONTENT FROM CREATION TO CONSUMPTION
20230075182 · 2023-03-09
Inventors
Cpc classification
G06Q20/389
PHYSICS
G06Q20/3678
PHYSICS
G06Q20/02
PHYSICS
International classification
Abstract
The present disclosure relates to content management systems and methods that may support, among other things, content storage, content identification, content collaboration, online services, payment settlement, electronic contracts, reputation, recommendation, and/or steganography activities. Consistent with various embodiments disclosed herein, systems and methods are provided to facilitate creation of works of any type, to collaborate with co-creators, to make that work available in the marketplace, and to provide for an architecture where the identities of all the creators involved may be bound to associated objects and/or identifiers associated with them. Being securely bound to certain identities and the identifiers, creative works may be distributed, and the associated credits and contractual obligations may remain with them and the associated remunerations and obligations may be respected and fulfilled.
Claims
1. A method for managing content performed by a system comprising one or more processors and a non-transitory computer-readable memory containing instructions executed by the one or more processors that cause the system to perform the method, the method comprising: receiving, in response to a request to access a content item, a content package link, the content package link being cryptographically bound to the content item, the content package link comprising: at least one content identifier, a content creator identifier, and an indication of first rights conditions associated with the content item; determining, based on the indication of first rights conditions included in content package link, at least one condition for at least one specified use of the content item; resolving the content package link by engaging in at least one electronic content usage transaction to satisfy the at least one condition for using the content item; receiving, from a rights management entity associated with the content item, an indication that the at least one condition for using the electronic content has been satisfied by the at least one electronic content usage transaction; accessing the content item using the content package link; and using the accessed content item in accordance with the at least one specified use of the content item.
2. The method of claim 1, wherein the at least one condition for the at least one specified use of the content item is specified in the indication of first rights conditions associated with the content item.
3. The method of claim 1, wherein the indication of first rights conditions comprises an indication of a location to access the at least one condition for the at least one specified use of the content item from a rights management entity.
4. The method of claim 1, wherein the content package link is cryptographically bound to the content item via at least one cryptographic signature, and wherein the method further comprises verifying the at least one cryptographic signature.
5. The method of claim 1, where the content package link is cryptographically bound to the content item via a hash associated with the content package link, the hash being generated based on the content package link and the content item, and wherein the method further comprises verifying the hash based on the content package link and the content item.
6. The method of claim 1, wherein the content package link is received from an immutable ledger.
7. The method of claim 6, wherein the immutable ledger comprises a blockchain ledger.
8. The method of claim 6, wherein the immutable ledger comprises a distributed immutable ledger.
9. The method of claim 1, wherein the at least one content identifier comprises an indication of a location to access an electronic file corresponding to the content item.
10. The method of claim 1, wherein the at least one content identifier comprises one or more of an International Standard Recording Code identifier, an International Standard Work Code Identifier, a Digital Object Identifier, an International Standard Book Number identifier, an Entertainment Registry identifier, an International Standard Audiovisual Number identifier, and an International Standard Content Code identifier.
11. The method of claim 1, wherein the at least one content identifier comprises a hash of the content item.
12. The method of claim 1, wherein engaging in at the least one electronic content usage transaction and receiving the indication that the at least one condition for using the electronic content item has been satisfied are performed as part of a pre-authentication process.
13. The method of claim 12, wherein the indication that the at least one condition for using the electronic content item has been satisfied comprises at least one authentication token.
14. The method of claim 1, wherein the method further comprises: receiving an update to a content package link; and generating an updated content package link based on the received update to the content package link.
15. The method of claim 14, wherein the update to the content package link comprises an indication of second rights conditions associated with the content item;
16. The method of claim 14, wherein the content package link is received from an immutable ledger and wherein the method further comprises transmitting the updated content package link to the immutable ledger.
17. The method of claim 1, wherein the content item comprises at least one of text content, audio content, video content, image content, 3-dimensional printing content, and digital object content.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0006] The inventive body of work will be readily understood by referring to the following detailed description in conjunction with the accompanying drawings, in which:
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
DETAILED DESCRIPTION
[0047] A detailed description of the systems and methods consistent with embodiments of the present disclosure is provided below. While several embodiments are described, it should be understood that the disclosure is not limited to any one embodiment, but instead encompasses numerous alternatives, modifications, and equivalents. In addition, while numerous specific details are set forth in the following description in order to provide a thorough understanding of the embodiments disclosed herein, some embodiments can be practiced without some or all of these details. Moreover, for the purpose of clarity, certain technical material that is known in the related art has not been described in detail in order to avoid unnecessarily obscuring the disclosure.
[0048] The embodiments of the disclosure may be understood by reference to the drawings. The components of the disclosed embodiments, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the systems and methods of the disclosure is not intended to limit the scope of the disclosure, as claimed, but is merely representative of possible embodiments of the disclosure. In addition, the steps of any method disclosed herein do not necessarily need to be executed in any specific order, or even sequentially, nor need the steps be executed only once, unless otherwise specified.
[0049] Embodiments of the disclosed systems and methods provide for a complete system of creation and consumption. A non-limiting example of the elements involved can be seen in
[0050] A Creator (100) may create a work of any kind (e.g., song, drawing, photograph, news article, 3D object, etc.). This creation may be an iterative process with the ability to store each iteration of the creative development in the Cloud System (“CS”) (101). For example, a songwriter might sing a first melodic idea into their phone and store it in the CS (101) as one or more Content Files. They might modify this over a period of hours or years with each iteration stored, cryptographically signed and hashed and registered in a Distributed Ledger (e.g., a Blockchain).
[0051] A variety of services may be used to facilitate a variety of interactions within the lifecycle of a Creative Work. For example, a Creator may want to work with other Creators on the Creative Work (Collaboration, 110), establish a contractual relationship with one or more of those Creators (Electronic Contracts via Permission Management Services, 109), receive feedback from professionals or other third parties (Reputation and Recommendation, 111, 112), search through their own content or look for material created by others (Search, 113), and/or have granular control regarding who can see their Creative Works and at what stage (Permissions Management, 109).
[0052] When there is desire to distribute the Creative Work commercially, commercial identifiers (Content IDs, 115) may be generated by Identification Bodies. These identifiers may include, for example and without limitation, International Standard Recording Code (“ISRC”), International Standard Work Code (“ISWC”), Digital Object Identifier (“DOI”), International Standard Book Number (“ISBN”), Entertainment Identifier Registry (“EIDR”), International Standard Audiovisual Number (“ISAN”), International Standard Content Code (“ISCC”) and others.
[0053] As a Creative Work travels through its life cycle, new identifiers may be added to the initial files—for example, after a song has an ISWC, if it is recorded for distribution, it may get an ISRC. If it is later added to a video, it may get an EIDR. Consistent with various embodiments disclosed herein, the files themselves do not need to traverse the network but rather all that needs to go from party to party is a Content Package Link (“CPL”) (102). This CPL (102) can point back to the complete package of media, metadata, rights, and/or to any of the individual elements. These elements may be updated and/or may be immutable.
[0054] For example, if a Photograph is licensed to an advertiser for one territory and the advertiser wants to use it in another territory, the identifiers and contracts bound to the content in the Immutable Ledger may be referenced by a CPL (102) which provides links for updating the rights and negotiating with the appropriate parties.
[0055] Following on to the next stage in the life cycle of Creative Content, the CPL (102) can be sent to the appropriate Distributors and Agents (103) who may to resolve the CPL (102) to review the content and the associated terms. The terms could include revenue shares and other financial terms, they could include credit requirements or distribution limits, or they could include a requirement to display a Uniform Resource Locator (“URL”). The contracts can be modified by agreement of all signatories. In some embodiments, there may be no limit to what the contracts (just like in the analog world today) can include and/or restrict. For example, a journalist with a hot story could submit it to a number of journalism outlets using a Real Time Bidding mechanism pointed to in the CPL (102) and the story could be carried exclusively by the highest bidder or the highest two bidders.
[0056] In many content markets, the Content may go from Distributors or Agents (103) to one or another Public Facing Service (104). There could be more stops along the way, for example a photograph could go from the Creator (100) to an Agency and from there to a Brand who would then send it out (perhaps as an advertisement) to a Public Facing Service (104) (e.g., a billboard, a radio station, a TV network, a newspaper, an online aggregator, etc.).
[0057] The Public Facing Services (104) may render content to Consumers (105) who remunerate the Public Facing Services (104) through advertising viewing or direct payment. These services often remunerate the Content Creators (100) through Rights Aggregators or Monitoring Entities (106) and/or Payment Aggregation and Accounting Services (107). Some of the Rights Aggregation and Monitoring Services (106) may comprise a Performing Rights Organization such as, for example and without limitation, the American Society of Composers, Authors, and Publishers (“ASCAP”) and/or Broadcast Music Incorporated (“BMI”). Others may be monitoring organizations that provide ratings like Nielsen or websites or newspapers that can report number of impressions or click-throughs or streaming services that can count plays or streaming services that can count subscribers.
[0058] The Public Facing Services (104) or the Rights Aggregators and Monitoring Entities (106) can remunerate the Content Creators (100) directly but, in many cases, the same creative work can generate revenue from a multiplicity of sources (e.g., a singer songwriter might receive money from: their Publisher, their Performing Rights Organization, the Mechanical Licensing Collective, their Record Company, the AF of M/American Federation of Television and Radio Artists (“AFTRA”) and individual Streaming services all for one song) and so might be aggregated by a Payment Aggregation and Accounting Services (107).
[0059] Having described the elements above let's begin to look in more detail at the CS (101). As shown in
[0060] The kinds of files that may be stored in connection with various aspects of the disclosed embodiments may comprise, for example and without limitation: [0061] Identity (204) may be a reference to an Identity provided by a commercial and/or government Identity Provider. That Identity can be any level of robustness as appropriate. [0062] Creative Works/Content Files (205) like audio, video, text, photography, design documents, etc. [0063] Metadata files (206) such as information about the documents like title, author, date of creation, content fingerprint or steganographic ID. [0064] Electronic Contracts associated with the Creators and Creative Works [0065] Identifiers (208) associated with the Creative Works (205) like ISBN, ISWC, etc. [0066] Bindings (209) of the elements (e.g., as above) and/or a subset thereof associated with each creative work utilizing cryptographic hashes and signatures and the location of these bindings in the distributed ledger [0067] Pointers to the location of the entries in a Ledger (210), which may comprise a Distributed Ledger.
[0068] The kinds of services that are provided by the Services (202) of the CS (200) may comprise, for example and without limitation: [0069] Provisioning of CPLs (211). [0070] Collaboration Services (212) which may provide the ability for Creatives to work together. [0071] Reputation Services (213) which may use algorithms and/or the wisdom of the crowds to quantify the reputations of the participants [0072] Recommendation Services (214) which may help participants find the right content to match their needs. [0073] Permissions Management (215) which may provide access control as prescribed by the Creator (222) or their Contracts. [0074] Search (216) through their own material to find an element (e.g., text string, metadata, etc.) or through the broad base of available Content and Creators (222) throughout the network to find material to license or Creators (222) to work with or distribute.
[0075] In addition to services provided for the creation and distribution of content are services that provide Settlement (203) of obligations or remuneration. These services may track the obligations through the chain from the Consumer (217) all the way back to the Creator. For example, this chain may pass from the Consumer (217) back through the Public Facing Services (218) who may pay Distributors or Agents (219) who then may pay Services that Monitor and Aggregate rights usage (220) and pay the Creators (222) sometimes passing through Services that Aggregate Payments and perform Accounting Functions (221).
[0076] Each individual domain consistent with various embodiments disclosed herein is discussed in more detail below.
[0077] As can be seen in
[0078] This brings us to the Bindings (305). When Binding two or more digital elements, they are taken together, a robust date is applied and then they are cryptographically hashed and digitally signed. These are typically bound with or to an Identity (300). This Identity could be a Person, a group of people or a legal entity of any type. This Binding (305) may create a unique identifier that can be generated by that exact combination of elements and can be used as provenance of the collection of elements, the Creator and the date and time of the hashing and signing. Once we have this robust digital record, it may be placed in an Immutable Ledger (306) such as a Blockchain that may or may not be distributed across multiple instances in multiple locations. Taken together, these content elements with their bindings can be used as proof of deposit or copyright. In various embodiments, the system may provide a mechanism to indicate that a Creative Work was placed in a repository at a particular time by a particular entity and that the data is immutable.
[0079] As can be seen in
[0080] After registering a first version of the Content a Creator may want to collaborate with other Creators. This Collaboration (402) may be first facilitated by messaging systems, text, audio and/or video. A Creator can send a CPL (406) to any entity or group of entities, and this may resolve to the created Content. However, these links may not be followed by anyone but instead by the people intended by the Creator who sends the link. This may be managed by a robust Permissions Management System (407) that controls who and when any entity can follow the link to the Content.
[0081] Creatives, however, may use other services as well. Because the system knows individuals and their histories and profiles (even if anonymous to others) the system can make Recommendations (404) as appropriate and weigh in on the Reputations (403) of the individuals or other entities (e.g., is this newspaper trustworthy). The last Service illustrated in this non-limiting high-level view is Search (405). Creators may be able to search for collaborators, but Creators may also be able to search their own corpus of material. If a writer has written thousands of pages of text (e.g., lyrics, scripts), they may need to be able to search based on content, genre, date and many other query types. Additionally, Services and Aggregators may benefit from the ability to search across large swaths of content from a multitude of Creators to find the appropriate for their needs.
[0082] As can be seen in
[0083] In music, these intermediaries may be complex and can include music publishers, record labels, managers and/or agents. In other domains they can go through advertising agencies, theater owners, book publishers, newspaper and/or magazine publishers, web sites, game publishers, etc. For some industries, there are entities that do rights aggregation and monitoring (504). These include Performing Rights Organizations, unions and guilds, music publishers, mechanical licensing entities, and/or wholesale distributors. When a Creator (506) sells directly to a Consumer (501), the remuneration path may be simple—the Consumer (501) pays the Creator (506). However, in some industries like music and film there may be a need to aggregate payments (505) from multiple services and intermediaries. For example, in music a single singer songwriter might have to aggregate payments from streaming services, record labels, music publishers, Performing Rights Organizations, mechanical licensing collectives from film and TV companies for sync licenses from co-writers or recording artists. There may managers and agents who coordinate and aggregate these payments for high end Creators (506), but part of this disclosure is a mechanism to aggregate these payments using software and a robust chain of handling and control of identities, identifiers and automated electronic contracts.
[0084] Storage
[0085] There are many types of files that may be stored that are associated with a Creator and their Works. Some of them are the creative elements themselves including multiple versions. Others are metadata about those elements, and this may include various identifiers. In addition, there may be pointers or references to multiple elements either stored in the same (virtual) location or stored by others in other locations. What follows is a detailed breakdown of the Storage Components.
[0086] Creative Works Files
[0087] Referring to
[0099] As shown in
[0110] Metadata Files
[0111] As can be seen in
[0119] As can be seen further in
[0120] The key point is that, as a Creative Work travels through its life cycle, there can be much ancillary information whether or not that is captured by the device or format at the original creation or data which is added over time due to transformation or additional uses or identifiers.
[0121] Though there may be no limit to the number and/or kind of Meta-descriptor (605) files, non-limiting examples may include one or more of: [0122] Element Descriptors (808) describe the pieces of a creative work. For example, some element descriptors might be as follows: [0123] For music: chord sheets, music notation, MIDI files, lyric sheets, sample sound files, Digital Audio Workstation files, etc. [0124] For photographs: descriptive location information like “at Joe's bar” (as opposed to an address that might be in the metadata) or “at sunset” or using such and such a lens or a filter or f-stop. [0125] For other graphics files: layer information, palette information, versioning information or references to graphics elements that were imported, etc. [0126] For video files: the name of the actors or camera operator or cinemaphotographer or director or information about the props or costumes. The list of possibilities may be long but information can be associated with other information. This scene footage may be associated with a particular movie or TV show or news event or documentary. Elements of a production can point to each other and to a meta file that contains the meta-information including history and provenance and changes made by whom and when. [0127] For Journalism: the writer can reference the context of the event, others working on the event like photographers, the employment status of the journalist or any other information that might be relevant later. [0128] Location Descriptors (809) are described briefly above for a few different environments but are addressed separately because, in this environment, they may be unbounded. For example and without limitation, the location could be at a conference or at a riot or underwater or at an elevation or at a sister's wedding. [0129] Positioning (810) can overlap with location, but it may often have to do more with location in relationship to another element. For example and without limitation, this leaf is in front or that tree or this ball is on this field or this element is related to this other element or this article should be in the second section of the paper or this violin line should only come in when the karaoke singer is not singing. [0130] Layers and Z-Order (811) may apply to graphics files but can apply to gaming elements like sprites or real-time elements as in augmented reality where something could appear, for example to be partially behind a rock or peering through a window. There can be a Z-order to audio with one element attenuating another. [0131] Steganography and Fingerprints (812) are metadata either in or about media. Steganography like watermarks, can be embedded in audio or visual files such that they can only be found by the appropriate reader. Fingerprints may be snapshots of files so that the metadata associated with the original file can be found even when it is not present in the file itself. Both Steganography and Fingerprints may live in external data structures that need to be bound to the original in an indirect way. This information may be associated with the original files but also with the other associated elements like creators and publishers and distributors and journals and agencies. [0132] Identity Linkages (813) may link to the identities of the people or entities that have either worked on the Creative Work or have a business relationship to it. For example, a recording of a song can point to the identity of the composer, a piece of film can point to the script writer but also to the camera operator or to the director or to the studio or the producer who is funding the project. Any Creative Work can point to the contract that governs it use. The identities or some or all the participants in the creative process or value chain of control or remuneration can be linked. [0133] Agreements, Licensing Terms, etc. (814) may be the mechanisms that govern the use of the Creative elements and are discussed in more detail below.
[0134] Identities
[0135] Identities may be different from Identifiers. Identifiers may typically identify all or part of a Creative Work. Identities may identify the people or entities that are referenced in the metadata or agreements and can exercise control over some aspect of the Work or may be remunerated for its use. As can be seen in
[0136] A Creator (901) may be the entity or entities that have done the actual creation. This may be the songwriter or the photographer or the scriptwriter or the film director or the video game creator. Once a Creative Work is created by a Creator (901), it may have legal protection (though the Creator (901) may have to demonstrate when the Work was created and/or realistically when it was registered). Creators (901) may be one of more individuals who have made the Creation and they may each have some mechanism of Identity. Identities have historically been paper documents such as a Passport or a Driver's License. In the online world, identity usually comprises a unique username like an email address that is associated with a password or a token on some kind on a device. Often, for verification purposes, multi factor authentication is may be used by an entity that wants access to their Creative Works stored online or to the statements associated with their remuneration or to the remuneration itself. Creators (901) can sign documents using digital signatures to implement electronic signatures in a cryptographically protected way. Creator identities can be quite robust as in the case where a Creator (901) has signed up with a payment entity and given photo identification, an email address, a physical address, and a Social Security number. In various embodiments of the system envisioned here, Creator Identities, after a number of reasonably robust assertions, may be stored as part of the CS. These identities can be stored in multiple distributed locations such as in an immutable ledger. These Identities may be bound to a Creative Work by the System so that every Creative Work has one or more Creators (901) associated with and/or cryptographically bound to it.
[0137] Control or a Controlling Entity (902) may be, in this context, the ability to determine what entities may utilize the Creative Work. Control can be ceded to a Governing Entity (903) by agreement or statute. A Governing Entity (903) may be a legal entity that has control over the disposition of the Work. For example, a photographer can license a photograph to an Agency which may then have the right to monetize that photograph by, for example, using it in an advertisement. A scriptwriter typically licenses a script to a film or TV studio and gives them broad license to monetize and modify that script in pursuit of a film. The film may be created very much under the direction of a Director who has given control to a greater or lesser degree to the studio to exploit that film or TV show.
[0138] In many creative fields, control is shared with or given to an entity based on a Contractual Agreement between the Creator (901) and the Controlling Entity (902). However, sometimes the right to exploit a Work can be given by statute. For example, in the case of music copyright once a Work (e.g., a song) has been released to the public by an entity (e.g., typically a recording artist who may or may not have written the song) anyone may record and release or perform that song and the remuneration is determined by statute and by a federally mandated Copyright Arbitration Board which may set the rates for remuneration for all similar Works.
[0139] Another set of entities are those who exploit and consume those rights. These Recipients of Rights (904) may be the consumers—individuals who purchase photographs, listen to music, watch films, etc. and those services that provide Creative Works to those consumers like streaming music services, television networks, movie theaters, advertising agencies, etc.
[0140] In total, looking at
[0141] Electronic Contracts
[0142] Content-to-consumer relationships may be governed either by contractual agreement or by statute (laws). Statutes, set by governments, Copyright Arbitration Boards or International Conventions, can determine the rights, restrictions and rates for the use of copyrighted material and typically vary from territory to territory. Contracts can, of course, say most anything (legal) the parties agree to. Some content can be impacted by both statutory agreements and contractual agreements. This can make for very complex relationships between the Creators and the Distributors. Though difficult for many Creatives to keep track of, if properly encoded, this can be achieved using computer systems. Encoding statutory rates into computers to settle payments may be implemented, though it may rely on the receipt of accurate data to determine those payments. Encoding rates and variables into contracts, which may be based in a multitude of factors, can be arbitrarily complex.
[0143] As can be seen in
[0144] Identifiers
[0145] Creative Works often have standardized identifiers that are provided by various Standards bodies. Non-limiting examples of these are shown in
[0146] Looking at the diagram, we have broken the Identifiers (1100) into domains of content. Part of this disclosure speaks to how these different Identifiers (1100) can be bound together but for now we will just discuss some of the kinds of Identifiers (1100) there are. The Identifiers (1100) described herein are by no means exhaustive but are provided to give a sense of the scope of different Identifiers (1100) to understand the value of binding them to the content and the content Creators.
[0147] First are Music Identifiers (1101). Music is particularly complex in the identifier space because there are multiple creators for the same work and the Work goes through many iterations. First you may have one or more songwriters who create a song which can be identified in multiple ways. The first iteration can be stored in the cloud and hashed and signed. This creates a unique ID that can be used to identify that recording. There could be dozens of versions of the song as the writer(s) go through the writing process and each of those iterations can have its own unique hash and digital signature which creates a unique ID for that version of the song. Once the song is “finished” it can be registered with a Performing Rights Organization (like ASCAP or BMI) and they will send back an ISWC which should theoretically be associated with every recording of that song but is often not.
[0148] When the song is recorded by a performer and prepared for release it may be given an ISRC. It may also be distributed with Digital Data Exchange (“DDEX (”) structured information including Parties identified in the DDEX Party Identifier Registry. A sheet music version of the song or recording can also have an International Standard Music Number (“ISMN”) and the digital release may also have a Global Release Identifier (“Grid”). One non-limiting purpose of the system described in this disclosure may be to bind the identifiers together so that having any one of them will lead to resolution to the other identifiers. This binding could be done in any number of ways. The various IDs could be placed in a database but that would require maintenance by a central party and many agreements regarding access.
[0149] The system proposed here may begin with the Creator having control of their works while providing them the ability to delegate obligations and responsibilities contractually while maintaining dynamic access to and control of those obligations and responsibilities. Various embodiments of the disclosed systems and methods facilitate a Creator-centric architecture. The basic mechanism of binding is described in more detail below but briefly described, a creative work may be stored in the cloud and bound to a Creator's ID by cryptographically hashing and signing the combined elements. This signature and hash may be placed in an Immutable Ledger (like a blockchain, and may be distributed). When another identifier is added, the new compound file may be signed and hashed and placed in the Ledger. The files can be stored anywhere and if long as the hash and signature match the Immutable Ledger, it may be proof of provenance. This process can be applied not only to the addition of identifiers but also to modifications of the Creative Work. If, for example, an artist creates a graphic design using two layers in a Photoshop file format. That file may be stored in the cloud and bound to and hashed and signed with the Creator's ID. Now suppose that artist wants to license that artwork to other artists to add more layers. The artists can agree by digital contract to the terms of that relationship (for example if the second artist sells the resultant artwork the original artist gets 50% of revenue and must be credited) and that contract may be stored in the cloud and bound to the artwork in question and to the two creators and the contract and the whole thing may be signed and hashed and stored in the Immutable Ledger. In this way multiple creatives can work together, and the results of that work can be distributed, and participants can be remunerated.
[0150] To give a few more examples of the kinds of works and identifiers that may be bound, let's look at
[0151] For Books and Articles (1105 & 1106) we have: ISBN, European Book Sector Electronic Data Interchange Group (“EDItEUR”), International Standard Serial Number (“ISSN”), National Information Standards Organization (NISO), DOI, International Press Telecommunications Council (“IPTC”) identifiers and others. For location tracking there is Aeronautical Reconnaissance Coverage Geographic Information System (“ArcGIS”) and latitude and longitude. In architecture there is the National CAD Standard (“NCS”) and a multitude of identifiers for building permits and codes and commissions. Even regarding standards for Immutable Ledgers there are Decentralized Identifiers (“DID”), standards for Verifiable Credentials (tamper-evident credentials that have authorship that can be cryptographically verified) and Self Sovereign ID (“SSID”).
[0152] Additionally, there may be some standardized identifiers that are not limited to one or two different kinds of media like International Standard Name Identifier (“ISNI”) and the ISCC.
[0153] Bindings
[0154] As can be seen in
[0155] Now suppose you register the song with your Performing Rights Organization, and they send you an ISWC identifier. You may add this ISWC to the Ledger entry of the Song and hash and sign the new file. Now our Ledger entry for the Song has all the data associated with the Song, the Contract and the ISWC. I can now send anyone the link that points to the Ledger Entry and know that it points to the latest versions of the associated files and metadata and that they have not been tampered with. This process can continue as more information is added. The song could be recorded by a recording artist and that version could be referenced in the metadata of the original Ledger entry and that recording could be assigned an ISRC that can then be added to the original Ledger entry. The address of the original entry does not have to change and going forward anyone needing to know about the original song for example, for remuneration purposes, can follow the original link to get the identity of the songwriters. If another performer also records the same song, they can link back to the original song data as well and if a Publisher, for example, wants to know what performers have recorded the song, they can link to the original Ledger entry and look up all the performances of that song that have been linked to the original song Ledger entry. These links may represent a perpetual, immutable ledger containing the history of a Creative Work, the associated parties (Identities (1201)), media files, contractual agreements and identifiers with pointers to all of the related files and parties.
[0156] Distributed Ledger
[0157] At least one method of binding the various elements together is to use a Blockchain Distributed Ledger. As can be seen in
[0158] Let's look in detail at how the external repositories, the references to them and the Distributed Ledger (1300) work together. For purposes of explanation and not-limitation, we may treat the Distributed Ledger (1300) as a single entity. There may be typically multiple, often many copies of the Distributed Ledger (1300). In fact, the files that we point to can also be distributed and/or replicated across multiple servers.
Ecosystem Examples
[0159] By way of example, let's follow some Creative Works through their life cycles. These non-limiting examples should be sufficient to make clear how the system works, and we will assume that once the system is understood for some business environments, it can be applied to others.
Ecosystem Example—Music
[0160] Some components of the music example are shown in
[0161] Now let's suppose that I change the song (1401)—say add a bridge. Now I can hash and sign the new version of the song and add it to the ledger. There is now a record of both the original composition and the updated composition and their dates of registration in the Distributed Ledger (1404).
[0162] Next, let's suppose that I have continued work on the song with a co-writer and we have agreed on the shares of ownership of the copyright of the song and have created and stored an electronic contract in a Contract Repository (1405) stipulating that relationship. That contract can be hashed and signed and placed in its own Distributed Ledger (1404) and that ledger address can be added to the ledger for the song or the hash and signature of the contract itself can be added to the ledger. Note that although the diagram shows the Distributed Ledger (1404) as a single item, it may be distributed and there can be many different ledgers (each also distributed) that point to each other. Now whenever someone finds the song, say using the ISWC, it can reference the identities of the songwriters and the contract stipulating the rights associated with the song.
[0163] Continuing with this chain of handling and control, suppose a recording artist records the song. That recording can have its own hash and signature which can be added to the distributed ledger of the song and the song data can be added to the distributed ledger of the recording.
[0164] Now, let's presume I have registered the song and received an ISWC (1406), issued by CISAC, the International Confederation of Societies of Authors and Composers, which may be used by streaming services to pay my representatives for the use of my song. I can add the ISWC to my Ledger and now the ISWC may be immutably bound to that record of my composition. Now, if I want to authorize a use for that work, say to a recording artist, I can just send a link and give access to the file. Now if the Recording artist makes a recording, they can store the recording and hash and sign it and put that in their own blockchain ledger and point back to the ledger of the song. The recording artist may then get an identifier called an ISRC (1407). They can add the ISRC (1407) to their immutable ledger which references the ledger associated with the song and can also include the ISWC. If the recording artist then sends their song to a music streaming service (1408), they can send a link to the entry in the ledger and the streaming service can acquire the song and have access to the whole chain of handling and control and can pay all the parties in the chain as required by agreement or by statute. The same basic architecture may work for other industries.
[0165] Ecosystem Example—Photography
[0166] Let's look next at professional photography as shown in
[0167] Now suppose I am at the consumer brand (1507) and I am looking for a photograph to use in a campaign in Asia. I browse the photographs that we have used before and I see a photograph (1501) created above in our example. Embedded in that photograph may be a link to the agreement (1508) that governs the use of the photograph (1501). I follow the link and learn that we do not have rights to use the photo in Asia. I send the link to the photo (which includes the link to the agreement) to the Ad Agency (1506). They may look at the agreement and negotiate an extension of rights for their photographer, parties sign the agreement, and it may be hashed and digitally signed and added to the ledger and the brand uses the photo in their campaign.
[0168] To reiterate, though these are just examples, people familiar with an industry can apply this approach and architecture broadly to their industry. Let me demonstrate further with two more non-limiting examples.
Ecosystem Example—Movies and TV
[0169] An non-limiting example architecture for the Television and Movie Production industry can be seen in
[0170] Using embodiments of the systems and methods described herein, many of the services previously provided by the major studios can now be provided virtually—kind of like a studio as a service. Let us drill down on an example of a film production. Suppose I have an idea for a movie and have written a script (1601) that may be associated with metadata 1602 and/or one or more Creator IDs (1603). I can store the script in the cloud and copyright is with hashes and signatures in the Distributed Ledger (1604) just as I did in the music example above. Now I can send a link and share the script with a movie producer (1606) who likes it, and we sign an agreement included in a Contract Repository (1605) stipulating my share of final revenue, length of the option, etc. This is now referenced in the Distributed Ledger (1604) for the proposed film. The producer now negotiates with other parties (1606) to work on the film, say a financier who agrees to pay for the production, then a director who agrees to do the film—agreements in the Contract Repository (1605) are added to the Distributed Ledgers (1604). The director contacts other workers (1606) like actors, a director of photography, camera operators, casting directors, grips, etc. Everyone signs an agreement of one kind or another included in the Contract Repository (1605)—hourly (below-the-line) workers accept a simple click license, entities that participate in the profits (above-the-line) have more complex agreements. Now that we have assembled a team, production can begin.
[0171] There are many services (1607) that can be provided (more about this is discussed in the Services section below). For example, automatic timecards facilitated by mobile phone apps that track proximity to the set. Services for doing Visual Effects, storage of Dailies (footage from each day), salary processing for below-the-line workers, etc. The media can be stored in the media repository with hashes and signatures attesting to the date, time, camera operator, script version, lighting, location, etc. The services can have automatic contracts stored in the media repository and attested to by contracts, hashes, and digital signatures. Versions of the film in progress can be shared with people with the appropriate credentials. When it is time to distribute the film, links can be sent to distributors (1608) and from there to theaters and streaming services—all governed by the electronic contracts referenced in the Distributed Ledger (1604).
Ecosystem Example—Journalism
[0172] A further non-limiting example, as can be seen in
[0173] This disclosure imagines a world where there can be a free flow of information from professional and amateur journalists or indeed anyone with the ability to write or photograph or video any event or opinion. Imagine you a journalist and you are there when there is a coup by the people of a small Eastern European country. You capture incredible photos and your friend who is a journalist and is fluent in English describes it in gripping detail. In a universe enabled by the technology in this disclosure, you may store the photos and the article (1701) in the storage component of the Cloud System (1700), you may add the byline in metadata (1702) and author identity information to the file (1703), and a short agreement may be included in a Contract Repository (1705) where the two of you agree that you will split any remuneration. This may then be shared with a News Aggregator or Distribution Network (1706) where various news gathering entities, some using artificial intelligence, see the article and bid on the right to distribute the article. You choose the distributor with the policy you like (e.g., say a small advance and a payment based on number of views) and digitally sign the agreement and the article shows in my news feed minutes after it occurred.
[0174] Again, the basic principles associated with this disclosure are that anyone can create a Creative Work, share it in an open marketplace and control and be remunerated for its consumption as defined by statute or agreement.
[0175] Services
[0176] What follows is a detailed breakdown of the Service Components. As can be seen in
[0177] Provisioning of Content Package Links
[0178] CPLs may be the connective tissue that holds together certain elements of the system and that allow for the resolution of content to the participants in the value chain. In some embodiments, they may be like URLs on the Internet except that are smart and/or governed. A composer may be associated with the songs they have written, the contracts they have signed, the publishers and Performance Rights Organizations they have deals with, the recording artists who have performed their songs and the distributors who have distributed them. Sending a CPL to an entity may assure that, if they have sufficient permissions, they can access the current and accurate data. To say it another way, content and associated rights and obligations can be easily referenced and can be accessed by those with the proper permissions.
[0179] Elements can be linked to associated elements. Looking at
[0180] Media elements (including the Contracts, identifiers, etc.) can be virtualized so that the relationships among the various elements can be dynamically updated. As described above, this means that additional elements like standardized identifiers can be bound after the fact to the original elements. This also means that different versions of content can have different agreements associated with them and agreements can supersede previous agreements. To explain by a non-limiting example: suppose I have a graphic that I have licensed to an advertiser for use in North America. Now suppose that advertiser wants to use that graphic in Europe. That graphic may be stored in the Distributed Storage (1903). Associated with that graphic may be a contract which stipulates the rights associated with it as between the advertiser and the graphic creator. This graphic and the related contract may be bound together in the following way: the graphic and its CPL may be hashed and signed, contract and its CPL may be hashed and signed, the graphic CPL and the contract CPL together may be hashed and signed.
[0181] When the agency representative is logged in to the Agencies system, they may be given credentials. The credentials may be associated with their role at the agency, let's assume for this example that they have the rights to see the graphics and the contract (or more likely a short abstract of the contract explaining the rights the agency has). They may pull up the graphic in their directory, probably by searching on the campaign associated with the graphics. To them, it is just like searching and viewing a directory—the permission granting is invisible, however, they may see in the directory, those graphics, and agreements which they have permission to view. So, browsing the graphics in the directory they may see the graphics from the old campaign used in North America.
[0182] When they select the graphic, they may be selecting a CPL which points to the entry in the Distributed Ledger. That CPL may bring up a list of elements associated with the CPL. If this were a song, it might bring up the composer, the publisher, the ISWC, the Performing Rights Organization and a list of ISRCs and their associated artists, record labels and legal representatives. In this case, the list of elements may be the name of the graphic artist and a link to the contract (and abstract of the contract), the legal representatives, and their location in the Distributed Storage.
[0183] Now when the agency representative views the abstract of the agreement, they may see that the rights do not include rights for Europe. They may select “modify rights” as a choice associated with the agreement and then select “territory of use” and from there select “add Europe.” This may generate a new agreement and stores the agreement in the Distributed Storage, creating a CPL which is then appended to the CPL for the original contract in the Distributed Ledger. The agency representative may now send the new CPL to the graphic designer's representative who resolves the CPL, looks at the new contract, shares it with the graphic designer who looks at the agreement and approves.
[0184] The agreement may now be signed and routed back to the agency representative who routes it to the correct party internally who signs it. Now this new signed agreement may be hashed and digitally signed and written to the Distributed Ledger as an addendum to the original agreement. Now, when the agency representative looks at the graphic, the CPL which points to the original graphic includes the CPL to the new contract and the abstract brought up by following that CPL states that the graphic may be used in Europe and the campaign can proceed with the appropriate remuneration flowing back to the graphic artist.
[0185] CPLs may point to the aggregation of the data associated with any Creative Work filtered through the lens of access permissions.
[0186] Collaboration Services
[0187] Creatives often work together in pairs and groups of all sizes. In music, songs are often written by 2, 3, 5 or even 10 writers. In films, there is even more collaboration between the original writer or writers, the producer, the director, the director of photography, the actors, the editors, studio executives, and others. In journalism there is collaboration between the journalist, the photographer, and the editor and perhaps the news service that may want to extract parts of the story. Because there are many kinds of collaborators, there are many kinds of collaborations that may be supported by the system.
[0188]
[0194] People working in the creative fields often perform multiple roles. For example, a photographer might be Creators, the Co-worker, the Editor, the Reviewer, and the Approver all in one. Though a film production might have hundreds of workers performing different functions, the Director might perform multiple roles (in fact, a single person might have multiple roles listed in the credits). Additionally, the names mean different things in different marketplaces. For example, an editor in film performs a different function than a magazine editor. However, for the purposes of this disclosure, the names represent relationships to the development of a creative work and one practiced in the art should be able to apply to the specifics of their use.
[0195] To demonstrate Collaboration Services, a good example to start with—because it is historically the most collaborative and complex, is film (examples of which are illustrated in
[0196] Looking at
[0197] As film is shot, it may be SSLed to a repository of footage where it can be viewed by Editors (2105). Comments can be added and SSLed to other Editors (2105) or Co-workers (2104) as necessary. This process may continue until the Editors (2105) believe the film is completed. The film may be SSLed to the Reviewers (2106) who may approve it or suggest changes. In the film universe, Editors (2105), Reviewers (2106) and Approvers (2102) are often many or even all the same people, but the distinctions are good to keep in the architecture because (a) other industries have different roles in these processes and (b) from a functional and permission granting perspective, it is useful.
[0198] Now, let us map these domains to other industries starting with Journalism as shown in
[0199] In our universe, just as in traditional news organizations, correspondents (2201) report news from where they are located, typically electronically. However, in our universe, media may be SSLed during various steps of the process. Breaking stories may be written by staff members (2202), using information collected by reporters (2201) in the field. Radio and television reporters often report “live” from the scene. Commentators or columnists (2202) may interpret the news and offer interpretation, opinion, or analysis.
[0200] Reporters (2201) may take notes and/or take photographs or shoot videos, Material is organized, and the focus or emphasis is determined, and the stories are written. The story is then edited by news or copyeditors (2203), who function from the news desk (2202, 2203). The headline of the story may be typically decided by the news desk. The news desk also re-writes or changes the style and tone. Note that even within one section like the Co-workers (2202) internal communications may be SSLed. Next, the chief editor approves the content (2203). Finally, a collection of stories is laid out on dummy pages, then final review by the editor (2204) and it is sent for publishing. The writer's byline has been attached from the beginning just as the identities of all the co-workers have been attached. This enables a couple of possibilities: 1) in the event there are questions after the fact, forensic analysis is easily performed and 2) if new business models pay workers for their work based on consumption, the data is available. In fact mechanisms based on contributions can be automatically embedded in electronic contracts in the Media Storage (2207) and payments can be automated.
[0201] The news universe may include aggregators (2206). There are news agencies that gather news and distribute it to local outlets who typically do not have international reporters. Now there are further paths as there are countless “Citizen Journalists”—people who are in the right place at the right time with a camera phone or travelers who write about their travels or bloggers who typically comment on life. There is a multiplicity of news aggregators like Browser companies and social networks that can distribute news from professional news organizations as well as from Citizen Journalists. Based on the architecture in this disclosure, payments can be made to journalists and news organizations defined by contractual agreements using any number of different mechanisms. For example, Journalists could be paid based on number of views or based on a monthly exclusive arrangement or salaried for their full output. The architecture can support arbitrarily complex models because the participants and the paths and their identities and identifiers may be maintained in an Immutable Ledger.
[0202] Multimedia Collaboration
[0203] When Creatives work together, they may use many tools. They may exchange scripts, parts of songs article ideas, photographs, etc. Collaboration environments are often local and ephemeral. By local, we mean that people are in the same place writing on a whiteboard or looking at printed photos or presentations on a projected screen. Many of these working sessions are also ephemeral. Maybe someone takes a photo of the whiteboard or writes notes that they share afterword, but the creative process mostly happens in person. With current technology, there is no reason the sessions cannot occur virtually with all interactions recorded, stored, and copyrighted and accessible after with all the participants noted and all actions recorded.
[0204] Looking at
[0205] Bidding
[0206] One form of distribution agreement is Bidding. As shown in
[0207] Reputation Services
[0208] Reputation Services may be useful for determining the applicability of hiring people, reviewing their abilities, their Creative Works, or their opinions of the Works of others. As can be seen in
[0209] Reputation services may add an additional layer to the information about the creators, the collaborators, and their creations. If one is looking for a creator or a collaborator, it is useful to know their abilities. Their abilities may be different on different axes and these are separated based on looking at the axes of the capabilities and filtering (2505) out those measures that are less relevant. Looking at these four non-limiting example components of reputation individually, we have:
[0210] 1. Imputed from Profile (2501): There can be assumptions made about the capabilities of the various participants in our ecosystem based on their background. Some examples: A Director of Photography is probably a good judge of the quality of the camerawork or lighting in a film. A drummer is probably a good judge of the rhythm of a recording. An experienced editor at a major newspaper is probably a pretty good judge of the veracity of a news source. Axes of imputed capability can be applied as the first axis of a creator's reputation.
[0211] 2. Peer Ratings (2502): Additionally, the rating of an individual participant can be made more robust by considering the opinions of others in the network. So, just as with other social networks if most commentors think that a script is rated 10 out of 10, the odds of that script being pretty good are high and the inverse may also be true. However, this is only the first step in this axis of the ratings system. We can weigh the ratings of the reviewers. So, if we are rating a camera operator, we have the opinions of others in the system about that camera operator, but we would weight the opinions of a Director of Photography more heavily than say a Location Scout.
[0212] 2. Historical Accuracy (2503): The third axis of ratings weighting is historical accuracy. We can look at people's ratings in the past and see how accurate they were and weight the opinions of those with more historical accuracy, higher. To clarify by way of example: suppose we are interested in finding the next big comedian. We would look through our records and see which comedians became popular and when they became popular. Now we would look at the people who were rating them highly 3 months before they became popular. This group of “Comedy Raters” would be our bell weather group and we would look at the unknown comics they are currently rated highly by our Comedy Raters in anticipation that they might be popular 3 months from now. This can work across all fields and all participants. For example, if a group of journalists had accurately predicted price fluctuations in the Ruble, we might rate their opinion on Ruble exchange rates more highly than others.
[0213] 4. Capabilities Axes and Filters (2505): What is left to do is to take the three elements above (Imputed from Profile (2501), Peer Ratings (2502), and Historical Accuracy (2503)) and put them together into a ratings matrix for individual Creators and Co-creators within a particular set of requirements. So, if we are looking to hire a camera operator, we may use multiple axes to determine a reputation score regarding that capability. Of course, one Creator might be highly rated, for example on script writing but not well rated on writing song lyrics.
[0214] Recommendation Services
[0215] Recommendation Services may be provided as a window into or corollary to—almost the inverse of Reputation Services. As noted briefly above the Capabilities Axes and Filters (2505) may be how we tailor the reputation analysis regarding specific capabilities. Conversely, if we are looking for Creators or their Works, we can use the Filters to optimize for those Creators or Works that fit with our needs like the comedian search example above. This can be used to assemble complete teams, to find potentially good songs for a recording artist, to find good journalists to hire or weigh the probable accuracy of a story, to find a promising new novelist or poet or a great up and coming photographer, and/or the like.
[0216] Permissions Management
[0217] As noted above, Creators and their representatives may be able to control who can view or listen to their Creative works and when they can. Looking at
[0218] Permissions can be allocated to individual Users, Personae, or Groups. A Group may be a set of Personas that allow operations to be performed for the entire group such as giving visibility, sending messages, etc. Groups can be created by an Entity and may be visible to Entities that have been invited to join the group. Groups can be used for controlling access to titles or sending messages to all entities in a group. For example, if I am working on a film, I might have a group of all the people working on the film and a group of people with editorial responsibility. If I am a journalist, I might have a group that includes the News Desk, Copy Editors, and the Chief Editor. If I am a student at a Music University, I might have one group that is all the students in the university and one that is the members of my ensemble and one that is members of my harmony class.
[0219] The system also may have Visibility Rules. Visibility Rules may provide a mechanism of specifying the visibility (2608) of items to other users of the system. For example, as in the music example above, I might share some things with only my band mates and other things with everyone in the university. The system may support very granular visibility rules. The visibility can be broken down by inclusions or exclusion. Inclusion examples may be visible to all, visible to one or more specific entities, and/or visible to all entities in a specific group. Examples of exclusions may be excluding all, meaning the Item is only visible to the Entity, and/or that the item is not visible to a specified entity or the item is not visible to any entity in a specified group.
[0220] Multiple visibility rules can be specified. Inclusions and Exclusions may be evaluated together. The exclusions may remove visibility, Exclusions may override Inclusions, but the reverse is also possible.
[0221] Groups can be used for controlling access to titles or sending messages to entities in a group. Entities can communicate using text or audio with other Entities in the system via messaging to their Display Name allowing one to send messages for example, to one group, from one Persona and to another group from a different Persona.
[0222] The owner of a Title can provide access rights to other Entities and or Groups including the right to consume (e.g., listen to or view), a Title or Artifact, and or the right to update or edit a Title or Artifact (e.g., including change title/metadata, add new version, register it, etc.)
[0223] Internet search has evolved over the years and it has been bent to the purpose of generating revenue based on selling ads. Search mechanisms consistent with various aspects of the disclosed embodiments may be designed to give Creatives and those in search of Creative Works the tools to find the content that is right for their purpose, not necessarily the purpose of a vendor or advertiser. Consequently, an intuitive yet powerful user interface that improves search capabilities for the searcher may be used.
[0224] As can be seen in
[0225] The next layer of Filtering may be referred to as Field Filters (2703). These may be broken into to general domains. The first are the people or entities that make, approve, or review the Creative Works (2704) including, for example and without limitation, one or more of Creators, Co-workers, Editors, Reviewers, and/or or Approvers. The other group of Field Filters (2703) are the various Metadata (2705) including, for example and without limitation, one or more of Metadata, Contracts, Identifiers and/or Meta-descriptors.
[0226] One of the more valuable Search Filters/Optimizers is using the Recommendation and Reputation engines (2706) defined above. In this way, content can be found with the appropriate applicability/quality based on the recommendation/reputation axes described above. For example, you might want only camera operators with rating of 4 or above as rated by Directors of Photography or songs that are highly rated by drummers because you are looking for great grooves.
[0227] In combination with all these filters, Boolean Operators (2707) may integrate the various filters in combination. The supported Boolean Operators (2707) may include, for example and without limitation, one or more of: [0228] OR: Either term (or both) will be in the returned document. (Broadens the search) [0229] Quotes: Quotation marks are used when you are searching for a specific word combination or an exact phrase. [0230] AND: Requires both terms to be in each item returned. If one term is contained in the document and the other is not, the item is not included in the resulting list. (Narrows the search) [0231] NOT: The first term is searched, then any records containing the term after the operator is subtracted from the results [0232] Parentheses: Deal with search statements within the parentheses first, then apply any statements that are not enclosed.
[0233] Boolean Operators may be applied to the current text in a field within the context of a Domain. If you are looking for Songs or Songwriters, the search may be in that domain. If you are searching for Journalists, the field may be in that Domain and likewise for Film, Photography, etc. Within Domains there may be other filters so if you are searching in music, you can look for titles or lyrics or tempo markings or writers. You can also search on Mood or Genre. If you are in film the choices would be similarly relevant (e.g., Camera Operators, Directors, Text in scripts, date filmed, etc.). The basic principle is that, based on the domain of the User expectations, the appropriate fields may be available, and the default Boolean behaviors may be appropriate.
[0234] The interface may provide the ability to go backwards and forwards through the Search History (2708) showing the results, not just the queries. One can also search within previous searches and perform meta searches within the search results. For example, yesterday you searched for highly rated Camera Operators and today you want to rank them based on having worked with a select set of Directors of Photography. A user may interact with various functionalities of Search services consistent with various disclosed embodiments via one or more Interfaces (2709).
[0235] 3.sup.rd Party Services
[0236] As can be seen in
[0237] Settlement
[0238] What follows is a breakdown of payment flows and the settlement of other obligations. There is a high-level view in
[0239] Content Package Links
[0240] CPLs (2902) may be the glue that connects the various elements. A CPL (2902) may reference the Content, its Creators, their Rights and Identities, and the Identifiers associated with each Content element.
[0241] To understand the power of the CPL (2901), let's look at a couple of non-limiting examples. Suppose a successful photographer has recently died and her heirs have decided to sell the right to license those photographs to a large Photo Aggregator (2906). Before her death, an entity that wanted to use a photograph would have signed a license. That license would have lived in the CS Storage (2903) and been referenced on the Immutable Ledger (2904), which may be distributed. That contract and the images it covered would have referred to the original photographer. Now there is a new contract that points to the Photo Aggregator (2906). The new Agreement with the Aggregator (2906) would reference the old Agreements (e.g., Contracts) and those clauses that were still in force (e.g., existing licenses to use the images) would still be executed. Now suppose someone finds the photo on the Internet or on a billboard (perhaps using a watermark) and want to license that image for an advertising campaign in Japan. That image's metadata may point to its CPL (2902) which would have connected to the original photographer, but which now is dereferenced through the new contract to the new Aggregator (2906).
[0242] The terms for licensing the image in the desired territory may be embedded in a smart contract, the new licensee agrees to the terms. Now imagine part of that agreement includes exclusive rights to use the image in Japan for 10 years. Now if a new entity finds the image and follows the CPLs, they will find that they are not able to license in Japan because of the exclusivity of the contract with the advertiser in Japan. Anyone practiced in the art can see how this would work for any kind of content or creator. This could apply to a song or a newspaper article or a script or a novel or a movie or TV show. In this manner, the Creative Objects and their Creators may be linked through the Storage and the Ledgers to dynamically maintain the rights and agreements of the parties.
[0243] Let us use another hypothetical example to demonstrate the power of CPLs. Suppose that France has passed a law which governs sync licenses to synchronize songs to Movies and TV shows. Imagine that the law stipulates that, if someone wants to license a song, they must notify the licensor and that if no other licensee is interested in licensing that song, it is licensed at the statutory rate which is 5% of the revenue divided by the percentage of the show in which it is used (this is just a random example but for the sake of argument, say the movie earns $2,000,000 in the 2nd quarter and the music is in 1% of the movie, then 5% of 1% of the $2M is $1,000).
[0244] Now when the CPL of the song or of the movie is resolved in France, it may invoke the statute which is in the storage and in the Distributed Ledger. Now suppose the law also stipulates that, if the entities agree on a different rate, that will override the statutory rate. Now suppose, further that the licensor of the song has put it up for bidding with an agreement linked to the CPL of the song and various TV productions bid for the exclusive right to use this song and the highest bidder agrees to a flat fee of $20,000. This may now be embedded in an agreement that (a) overrides the statutory rate and (b) may be linked to the TV show and the song and the performer.
[0245] Consumers
[0246] Let's look at how this infrastructure may influence Consumers (2907). For purposes of this discussion, a Consumer (2907) may be anyone who consumes content. They might have a music or TV subscription service, or they might view or listen to something that is supported by advertising or receive it as part of a bundle with the purchase of a product or another service. Their consumption of the product could be monitored directly, say by a service that serves the content up to subscribers or approximated based on unmonitored advertisements on say a billboard or on a radio station. The Consumer (2907) might have an explicit agreement as in, say, a subscription service or an implicit one, say with the purchase of a bundled product or a very loosely implied relationship as in the example of driving by a billboard. Further the Consumer (2907) might have negotiated different relationships based on their choices. They might choose to pay a very low or no subscription fee if let themselves be monitored for targeting advertisements. Or they might pay a higher fee for absolute privacy. They might agree to pay a subset of the artists directly when they listen to their music but be allowed to listen to the rest of the music at a bundled price. The point is that embodiments of the system described in this disclosure may support almost any business model—specifically allowing remuneration and data to flow from the consumer to the creator with a detailed degree of control over financial and data flow. A famous actor could allow consumers to follow their personal Vlogs not by having a subscription to them but by stipulating that agreement for any distribution channel to follow. A subscriber could access the Vlog from any service which would have their commission prescribed by the Contract referenced in the Ledger (2904).
[0247] Public Facing Services, Distributors, and Agents
[0248] The barrier to entry for Public Facing Services (2908) could be extremely low. Once a Content Creator makes their Content available with their stipulated terms, they could allow and public facing service to license that content under those terms (say, for example, an advance against a revenue share valid for a period of x years with a guaranteed renewal rate of y dollars). Public Facing Services (2908) can offer any number of business models to their consumers who can choose freely from any number of different offers.
[0249] In the same way Distributors and Agents can offer content from their clients at terms that are defined by their Creators or can create a business model and allow Creators to sign up for distribution services based on that model—either exclusively or not.
[0250] Rights Monitoring Entities
[0251] Content rights are often monitored by external entities (2909). Some are given this right by statute and some by agreements. Finding the appropriate Creators and their representatives can be challenging. If, for example, a song is recorded by a performer and the performer does not associate that performance with the song, it can be extremely difficult (sometimes nearly impossible) to pay the composer. This may be referred to as “black box” money and can be in the 100s of millions of dollars in the US.
[0252] If the system proposed in this disclosure is utilized, there may be no orphaned works as they will be connected from the start. In other industries, there may be limited infrastructure to support individual creators. Journalists can be paid by a news organization but Citizen Journalists (now making a high percentage of news stories) have limited ways to monitor their Works and be remunerated. Utilizing this system may provide an open exchange where Creators can set their own terms and Aggregation Services and Consumers can opt in.
[0253] The common rights monitoring entities of today are mostly in the media space. In music they are Performing Rights Organizations (like BMI and ASCAP), in video they are consumer usage monitoring services like the Nielsen Corporation. Aside the lost connections and Black Box monies, these services work reasonably well but they do not readily enable new business models. Digital Rights Monitoring Entities (2909) can aggregate performance or display of Creative Works and remunerate Creators directly under any business model that can be supported by automated contractual obligations. Rights Monitoring entities (2909) can pay Creators directly or pay Content Aggregators (2906) or Content Distributors (2905) or combinations of multiples of the above.
[0254] Payment Accounting and Aggregation Services
[0255] In
[0256] Using a system like the one proposed in this disclosure, the Creator (3002) of a Creative Work may have the references (CPLs) to their Works available to be aggregated into a dashboard showing all the revenue streams and the remuneration. Beginning with the Consumer (3001), remuneration is paid—either with money or with engagement (e.g., looking at ads, etc.) ultimately to the Creative Workers (3002). However, this remuneration can be captured by multiple parties. First there may be the Service Providers (3003) including entities like Music Streaming Services, Video Streaming Services, TV Networks, Movie Theaters, Newspapers, Magazines, Billboards, Agencies, etc. There are also Rights Monitoring Entities. In Music there may be Performing Rights Organizations and Collective Management Organizations that monitor consumption and pay Creators Directly. In Film and TV there may be Monitoring Entities like Nielsen that track consumer usage which other entities like networks use to determine payments to be made. In Journalism and in other direct to consumer industries like web sites, VLOGs, BLOGs, Podcasts and Social Media payments can come directly from the service provider but Rights Monitoring Entities (3005) can be used to make payments directly through guilds or can be used to influence collective bargaining negotiations.
[0257] Some of these services don't pay Creatives directly but pay them indirectly either through Content Aggregators (3005) or through the Content Distributors (3006) like Record Labels, Film Studios, News Services, etc. It may be difficult for Creatives to keep track of all the potential payment entities and to know if they are being properly remunerated. Hence the role of Payment Accounting and Aggregation Services (3004). Because the distribution mechanisms described in this disclosure may be trackable, the services can automatically track payments and aggregate all the payments (3007) from different sources and give Creatives accurate and detailed Accounting (3008) from all the different services. Using historical data (like say, this movie was in x theaters in y territory and so should have an expectation in this time-period of generating z income), Projection Analysis Services (3009) can predict payment expectations for planning purposes and also flag anomalies that might indicate missing payments.
Recommendation Ecosystem Implementation Examples
[0258] As discussed above, various embodiments of the disclosed systems and methods may provide techniques for managing recommendation services and/or compensating participants. In some embodiments, recommenders together may create an ecosystem with their own hierarchy and value. For those recommenders who can correctly recommend creators that end up generating revenue for the system, there can be revenue participation. For example, if a Recommender finds a great songwriter and that songwriter goes on to generate revenue, the application that facilitates that revenue can share a portion of that revenue with the Recommender.
[0259] In order to improve and/or otherwise optimize the system, we cannot go on volume alone—one could not, for example, succeed by giving everyone a top rating. Accordingly, recommendation compensation algorithms may take incorrect ratings into account. Also, there may be numerous people who rate a very talented person highly and so any remuneration generated from those ratings may be shared but not necessarily evenly. Various embodiments of the disclosed systems and methods may value a Recommender based on how many Recommendation Credit Points they have.
[0260] Further embodiments may offer a mechanism whereby creators of a basic creative element like a drawing or a textual story allow others to use that basic as part of their own creation and the creator of the original component may be credited and/or remunerated for further uses of that element.
[0261]
[0262] Consistent with various disclosed embodiments, the following elements may determine a number of Recommendation Credit Points:
[0263] Creator Minimum number of recommendations required (3101): In some embodiments, to have the scale for the system to work, any Creator considered may have a minimum number of Recommenders. We will call that C.sub.M.
[0264] Recommender Minimum number of recommendations required (3102): In some embodiments, for a reviewer to be considered a viable Recommender, they may have at least one recommendation. However, to limit the noise, in some embodiments that number may be higher or perhaps much higher than 1. We will call that R.sub.M.
[0265] Recommender Minimum and Creator Minimums (3103): These establish minimums to be met in order for a Recommender to earn points. In some embodiments, these established points are also limited by the Domain of the recommendation.
[0266] Recommender Domain (3104): A Rater might have very high marks in predicting great songwriters but lower marks in predicting great camera operators. Accordingly, in some embodiments, ratings may be limited to the Domain of Inquiry—D.sub.(I) where I is the name of the domain (e.g., Songwriter, Director of Photography, Screenwriter, etc.)
[0267] Creator Rating Value (3105): Based on the historical accuracy of the Reviewer, a rating value, R.sub.V may be generated. This may be a reflection of how accurate the Reviewer has been in predicting talent within a specific domain.
[0268] Recommendation Elapsed Time (3106): Earlier recommendations may, in some embodiments, be worth more. For example, the value of the recommendation may be weighted based on how many minutes have elapsed between the recommendation and the Cutoff Time—that is when the analysis is done. In certain implementations, the more time is better. R.sub.T may represent the number of minutes between the time of the recommendation and the time.
[0269] Recommendation Credit Points (3107): The number of Credit Points (C.sub.P) associated with a Creative Work or with a Creator is calculated by a using one or more algorithms that take into account one or more of: Creator Minimum (C.sub.M), Reviewer Minimum (R.sub.M), Creator Rating Value (C.sub.V), Recommender Domain (D.sub.I), and/or Recommendation Elapsed Time (R.sub.T).
[0270] Though there are many possible formulas that can be created by using this data in different ways, at least one non-limiting example may be:
IF: Creator Minimum is >C.SUB.M
AND: Reviewer Minimum is >R.SUB.M
THEN: Recommendation Credit Points (C.SUB.P.)
WILL BE A FUNCTION OF: Creator Rating Value R.SUB.V
[0271] TIMES: the % of proximity to the Recommender Domain (D.sub.I)
TIMES: the inverse of the Recommendation Elapsed Time R.sub.T
[0272]
[0273] In the illustrated example worksheet, the first row (IF, 3201) may represent the threshold minimum number of Creator recommendations to be considered. In example 1, that number should be greater than 10 and since the Recommender in example 1 has less than 10 recommendations, it may fail the test and be associated with a Boolean value of 0. In the second example, the Recommender should have more than 20 recommendations and since they have this number, they may pass and be associated with a Boolean of 1. Examples 3, 4, and 5 have above the threshold number of Creator Recommendations and so they pass and may be associated with a Boolean value of 1.
[0274] The second row (AND, 3202), may represent the threshold minimum number of Reviewer recommendations the Reviewer has made. For example, if the Reviewer has only made one recommendation, one might decide that a successful recommendation was just luck and not include it. In
[0275] The third row (FUNCTION OF, 3203) may represent the Creator Rating Value, which may be similar in some respects to a batting average of accuracy. If the recommender correctly picked every recommendation they made, the would be batting 1000. If they were right half the time, the would be batting 500. In our example, the rating value for example 1 is 200, example 2 is 300, example 3 is 800, example 4 is 400 and, example 5 is 900.
[0276] The fourth row (WITHIN, 3204) may be to consider how close to the domain the recommenders area of expertise is. For example, a Director of Photography is particularly expert at knowing a good camera operator whereas an accountant's opinion might be less relevant. In our grid, the relevance of domain is treated as a % from 0 to 100. In our example, the rating relevances are for example 1 is 95, example 2 is 0, example 3 is 55, example 4 is 60 and, example 5 is 90.
[0277] The fifth row (AND, 3205) may represent the inverse of the elapsed time in hours. That is, in some embodiments, the earlier one makes a positive recommendation, the more value it has. The 3rd cell in that row represents a multiplier. One using the system might determine the earliness has a relative low value for some things but for others, being early has more value. In our example, the value in this cell is 5 which means that the cell multiplies the relevance by ⅕.sup.th. As a result, the values for our examples 1 through 5 are: 28, 288, 10, 20 and 10. Though not in this example, earliness could be a variable function. For example, the most valuable amount of time to choose a comic might be 3 months. 3 months could be the top of a bell curve (e.g., most valuable) with the curve falling to a very low value if the recommendation is very recent (e.g., because they are already hearing from others) and a very low rate earlier than a certain date. These algorithms could be tried in different ways over time to provide value and could be developed using AI to determine retroactively (e.g., based on success data) what the shape of the curve should actually be—and it could easily be different for different categories of workers or reviewers.
[0278] The last row (RESULT, 3206) is our results row where we show the number of Recommendation Credits. Examples 1, 2 and 4 are zero because one or both of their Boolean values was zero.
[0279] The value of Recommendation Credits for example 3 is 8,800, for example 4 is 4,800 and for example 5 it is 16,200. So the recommender's recommendation with regard to the person or item being recommended for example 5 is higher.
[0280] In various embodiments, the Recommendation Credits may be calculated according to formula (3207):
If C.sub.M*R.sub.M is >0
Then C.sub.P=R.sub.V*D.sub.I*1/R.sub.T
It will be appreciated, however, that Recommendation Credits may be calculated in a variety of other suitable ways.
[0281] Next is to take the Recommender Credit Points (C.sub.P) and apply them to the creators. The example we are using is applied to songwriters but one practiced in the art could easily apply the same logic to filmmakers or journalists or photographers.
[0282]
[0283] Drilling down a bit more in the details of the example shown in
(R.sub.v)*(R.sub.S)/# of songs rated.
[0284] To demonstrate in connection with the illustrated example Song AA1 was rated by raters with the associated Credit Points A (6,600), B (4,234), C (3,150), and E (885) with the following ratings for AA2 of (8) (10) (6) (70), yielding the average song rating for song AA1 of 7,515.
[0285] In some creative disciplines (like song writing or screenplay writing, or others), a straight mean, median or mode may not give a desired result. If you write 100 flops but 3 smashes, you are a genius but if you write 100 “good” songs or plays or whatever, you are just OK. One approach would be to discard a percentage of lowest rated songs when determining writer rating. So the averaging algorithm may be variable. Even if you do this with AI, you may need to know what you are looking for. A straight average that is good might be valuable if you are looking for a co-writer who will be a solid participant while the occasional genius might be more what is wanted if you are willing to take high risk with potential high return. Note, this may not affect the value of the individual creative work (song, play, painting, etc.) which may be based on the value of the reviews and the reviewers.
[0286] Again, we are using songs as our example but one practiced in the art can easily apply the same logic to other fields such as film, graphic design, photography, journalism or any other creative endeavor.
[0287] Recommenders and Remuneration
[0288] Now that we know how accurate each reviewer is, we can use that to determine the value of their recommendations with the idea being that recommenders who are more accurate in their recommendations, and who's recommendations result in the discovery of creatives who generate revenue, can participate in some share of that revenue.
[0289] We may take much of the data from
[0290] In order to simplify the diagram, we have removed all the raters that were in the worksheet of
[0291] It could be on net as opposed to gross or literally any metric that experience brings about. For this example, we chose a straight 4% for simplicity. There may be a column (3405) taken from the previous worksheet that shows the cumulative points generated in favor of each song (3406). The final column is the Total Revenue (3407) generated by each song. Rater Name columns A, B, C and D (3407) show the Rating Points on a scale from 1 to 10 (3408) that each rater has given each work (e.g., a song, 3406) or a graphic design or newspaper article or a photograph, etc. In the second row, near the top of the Rater Name Column (3402) are the Rater Credit Points. In the case of Rater D (3409), it is 2,800. The next column D*CP (3410) is the Song Rating given to a song by reviewer D multiplied by Reviewer D's Rater Credit Points. So, for the four Raters represented in this figure (A, B, C and D) we show the product of their song ratings times their rater rating (Rater Credit Points) in the four columns: A*CP, B*CP, C*CP, and D*CP.
[0292] Looking down the column D*CP for Rater D to the row for song BB1, we see the rating, 8, which is multiplied by D's Rater credit Point score which is 2,800 totaling 22,400 (3411). The columns to the right of the product columns (3412) serve two purposes. This column (3413) shows the percentage of the Rater's share of the sufficiently positive recommendation and below it (3414) is the revenue that it represents as a percentage of the total revenue (column 3407). So, for example, looking at the row for song AA1 by writer AA, we see that Rater A rated the song as an 8 on a scale of 10, Rater B rated it a 10. Rater C rated it a 6 but since 6 falls below the Minimum Rating Setting of 3,200, Rater C may not participate in the revenue calculation. In this simplified example (it will be appreciated that in further implementations, there might be hundreds or thousands of Raters participating in the revenue calculation), Rater A earns 55.5% of the revenue share (4%, 3404) or $46.75 and Rater B earns 44.5% or $37.49. In this example, we can see that Rater A has the best record across multiple songs and earns a total of $149.64 (3415).
[0293]
[0294] Now, looking at
[0295] For example, using a Smart Contract, I might define the terms that there is a small fee for using the artwork and percentage of any revenue generated from using it. Suppose I have created the background sky that is used as the logo for a major airline. When they hire an artist to create an ad campaign, they might hash them to use their standard background and when the new artist is paid, the original artist might receive a percentage of the fee or a separate fee or a credit—anything that has been agreed to in the smart contract.
[0296] Let's further imagine that I have taken my Layer 1 Artwork (3602) and I have put it out in an Artist Social Network (3605) where others an find it and license it for use in their own creations. They would be able to see the terms stored in the Storage and CPL Cloud (3604) and agree to the terms. Now this second artist—Graphic Artist 2 (3606) creates a derivative work we are calling Artwork Layer 2 (3607)—it might be a separate Layer as that is how many graphics programs work but it might also be a metaphorical layer. For the purposes of this disclosure, either apply. The last step in this process is to create Credentials (3608) that immutably represent both the combined work and also just the new portion of the work—say Graphic Artist 2 (3606) want to license their layer to other artists—embodiments of the disclosed system may facilitate that.
[0297] In order to clarify the construction, let's look at
[0298] For our first creative layer, let's start with a content creator who creates a drum track based on an original groove (rhythm plus feeling). This is Music Layer 1 (3702) created by the Groove Creator musician (3701). Just like in the graphics example, the media—in this case audio—perhaps multiple channels of different instruments making up a single groove—may be hashed and signed and perhaps watermarked (3703) and stored in the cloud (3704) and CPLs are created. These CPLs may be stored in a Music Creation Network (3705) where people with permissions can hear the groove. When the select the CPL it may actually trigger a stream from the Storage (3704). Of course, the files themselves could be stored in the Music Creation Network (3705) but may not necessarily change the basic mechanism. This could be like a cache that was periodically synchronized with the primary and “official” file that lives in the Storage and CPLs repository (3704) which is often, of course distributed with the CPLs likely living on the block chain though there is nothing in the architecture that requires a distributed ledger and the same functionality could be acquired with a simple database but an efficient and secure method would be to use a distributed ledger like a block chain.
[0299] Now, let us assume for the second layer that a guitarist/composer (3706) likes the groove in Music Layer 1 and decides to write a set of chords and melody to that groove this creating Music Layer 2 (3707). This new layer and the combination of both layers are hashed and signed in a new set of credentials (3708) and stored in the Storage and CPLs (3704). There is now a digital record of not only what the guitarist/composer added but when it was added.
[0300] Following a similar approach as before, this new work—the groove plus the chords and melody—is referenced and possibly stored in the Music Creation Network (3705) perhaps with a message asking for a singer and/or a lyricist to complete the song. Now suppose a singer/lyricist (3709) writes some lyrics and sings them and creates Music Layer 3 (3710). This individual element may be stored, hashed and signed, and perhaps watermarked (3711) as is the combination of the three elements.
[0301] There is now, as registered on the distributed immutable ledger (or in a database) a complete record of the chain of creation of the collective work. In the process, there would also be licenses signed ascribing attribution and potential revenue share that would also be stored in the Storage and CPLs and the Distributed Ledger. To be clear, the elements do not have to be stored in the same location and there could be one ledger with contracts and another with files and yet another with metadata and/or credentials.
[0302] Various aspects of the disclosed systems and methods and/or associated disclosed embodiments may be applied in a variety of markets, contexts, examples, and/or use cases including, for example and without limitation, one or more of: [0303] 3D printing; I make a cup, you make a saucer, I design a house frame, you design windows and doors, I make a carburetor, you design an engine. [0304] Film; I take your script and get funding, I upload a scene and you add the VFX, I upload the dialog and you do the translation. [0305] Journalism; I upload the picture, you write the story, I upload the story you edit it (the same works for books, magazines and journals). [0306] Game design; I design a game and you create characters (or vice versa).
[0307] In short, various aspects of the disclosed systems and methods may add accountability to a variety of creative arts.
[0308]
[0309] At 3802, a CPL may be received in response to a request to access a content item. In various embodiments, the CPL may be cryptographically bound to the content item using a variety of techniques. For example and without limitation, the CPL may be cryptographically bound to the content item via one or more digital signatures and/or generated hashes, which may be verified and/or otherwise authenticatable.
[0310] In certain embodiments, the CPL may be received from an immutable ledger, which in some embodiments may comprise a distributed immutable ledger. In some embodiments, a blockchain ledger may be used.
[0311] The CPL may comprise, for example and without limitation, at least one content identifier, content creator identifier, and/or indication of first rights contentions associated with the content item. The at least one content identifier may comprise, for example and without limitation, one or more of an ISRC identifier, an ISWC identifier, a DOI, an ISBN, an EIDR identifier, an ISAN, and ISCC identifier, and/or any other identifier, which may be a standardized identifier. It will be appreciated that a wide variety of identifiers may be used in connection with content items consistent with various aspects of the disclosed embodiments, and that any suitable content identifier and/or identifiers may be used. In certain embodiments, the at least one content identifier may comprise an identifier unique to the content item that may be generated, at least in part, based on the content item (e.g., a hash of the content item and/or the like). In some embodiments, the content identifier may comprise an indication of a location to access an electronic file corresponding to the content item.
[0312] Based on the indication of the first rights conditions included in the CPL, at least one condition for at least one specified use of the content item may be determined at 3804. In certain embodiments, the at least one condition may be specified in the indication of the first rights conditions. In further embodiments, the indication of the first rights conditions may specify a location to access the indication of first rights from a rights management entity.
[0313] At 3806, the CPL may be resolved by engaging in at least one electronic content usage transaction (e.g., rental, purchase, engaging in a transaction to obtain certain rights to the content, etc.) to satisfy the at least one condition for using the content item. An indication may be received from a rights management entity associated with the content item (e.g., a digital rights management service and/or the like) that the at least one condition for using the electronic content has been satisfied by the content usage transaction. In certain embodiments, pre-authentication processes may be performed. For example, as part of a pre-authentication process, a user system may receive a token and/or other electronic credential, which may be used to satisfy certain rights and/or obligations determination processes. Consistent with various embodiments disclosed herein, possession of the token and/or electronic credential may be used to demonstrate that certain usage conditions for the electronic content item have been satisfied.
[0314] The content item may be accessed using the CPL and may be used in accordance with the at least one specified use of the content item at 3810. In various embodiments, CPLs may be updated. For example, in some embodiments, an update to a CPL may be received (e.g., an update comprising an indication of second rights conditions associated with the content item). An updated CPL may be generated based on the received update to the CPL and provided to a ledger managing CPLs associated with content items.
[0315] Computer and/or Software Implementations
[0316] Various aspects of the disclosed systems and methods may be implemented by one or more computing devices and/or systems. The various systems and/or devices used in connection with aspects the disclosed embodiments may be communicatively coupled using a variety of networks and/or network connections (e.g., network). In certain embodiments, the network may comprise a variety of network communication devices and/or channels and may utilize any suitable communications protocols and/or standards facilitating communication between the systems and/or devices.
[0317] The various systems and/or devices used in connection with aspects of the disclosed embodiments may comprise a variety of computing devices and/or systems, including any computing system or systems suitable to implement the systems and methods disclosed herein. For example, the connected devices and/or systems may comprise a variety of computing devices and systems, including laptop computer systems, desktop computer systems, server computer systems, distributed computer systems, smartphones, tablet computers, and/or the like.
[0318] In certain embodiments, the systems and/or devices may comprise at least one processor system configured to execute instructions stored on an associated non-transitory computer-readable storage medium. The systems and/or devices may further comprise software and/or hardware configured to enable electronic communication of information between the devices and/or systems via a network using any suitable communication technology and/or standard. The operation of the one or more systems and/or devices in connection with various aspects of the disclosed systems and/or methods may be generally controlled by a processing unit operating by executing software instructions and programs stored in system memory (and/or other computer-readable media, such as memory, which may be removable).
[0319]
[0320] As illustrated, the computer system 3900 may include, among other things, one or more processors 3902, random access memories (“RAM”) 3904, communications interfaces 3906, user interfaces 3908, and/or non-transitory computer-readable storage mediums 3912. The processor 3902, RAM 3904, communications interface 3906, user interface 3908, and computer-readable storage medium 3912 may be communicatively coupled to each other via a data bus 3914. In some embodiments, the various components of the system 3900 may be implemented using hardware, software, firmware, and/or any combination thereof.
[0321] The user interface 3908 may include any number of devices allowing a user to interact with the system 3900. For example, user interface 3908 may be used to display an interactive interface to a user, including any of the visual interfaces disclosed herein. The user interface 3908 may be a separate interface system communicatively coupled with the system 3900 or, alternatively, may be an integrated system such as a display interface for a laptop or other similar device. In certain embodiments, the user interface 3908 may comprise a touch screen display. The user interface 3908 may also include any number of other input devices including, for example, keyboard, trackball, and/or pointer devices.
[0322] The communications interface 3906 may be any interface capable of communicating with other computer systems and/or other equipment (e.g., remote network equipment) communicatively coupled to system 3900. For example, the communications interface 3906 may allow the system 3900 to communicate with other computer systems (e.g., computer systems associated with external databases and/or the Internet) via one or more network connections 3910, allowing for the transfer as well as reception of data from such systems. The communications interface 3906 may include, among other things, a modem, an Ethernet card, and/or any other suitable device that enables the system 3900 to connect to databases and networks, such as LANs, MANs, WANs and the Internet.
[0323] The processor 3900 may include one or more general purpose processors, application specific processors, programmable microprocessors, microcontrollers, digital signal processors, other customizable or programmable processing devices, and/or any other devices or arrangement of devices that are capable of implementing the systems and methods disclosed herein. The processor 3902 may be configured to execute computer-readable instructions stored on the non-transitory computer-readable storage medium 3912. The computer-readable storage medium 3912 may store other data or information as desired. In some embodiments, the computer-readable instructions may include computer executable functional modules configured to implement various services, functions, and/or activities disclosed herein. For example, the computer-readable instructions may include one or more executable modules configured to implement all or part of the functionality of the systems and methods described above.
[0324] It will be appreciated that embodiments of the system and methods described herein can be made independent of the programming language used created the computer-readable instructions and/or any operating system operating on the computer system 3900. For example, the computer-readable instructions may be written in any suitable programming language, examples of which include, but are not limited to, C, C++, Visual C++, and/or Visual Basic, Java, Perl, or any other suitable programming language. Further, the computer-readable instructions and/or functional modules may be in the form of a collection of separate programs or modules, and/or a program module within a larger program or a portion of a program module. The processing of data by system 3900 may be in response to user commands, results of previous processing, or a request made by another processing machine. It will be appreciated that system 3900 may utilize any suitable operating system including, for example, Unix, DOS, Android, Symbian, Windows, iOS, OSX, Linux, and/or the like.
[0325] The systems and methods disclosed herein are not inherently related to any particular computer, electronic control unit, or other apparatus and may be implemented by a suitable combination of hardware, software, and/or firmware. Software implementations may include one or more computer programs comprising executable code/instructions that, when executed by a processor, may cause the processor to perform a method defined at least in part by the executable instructions. The computer program can be written in any form of programming language, including compiled or interpreted languages, and can be deployed in any form, including as a standalone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. Further, a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
[0326] Software embodiments may be implemented as a computer program product that comprises a non-transitory storage medium configured to store computer programs and instructions, that when executed by a processor, are configured to cause the processor to perform a method according to the instructions. In certain embodiments, the non-transitory storage medium may take any form capable of storing processor-readable instructions on a non-transitory storage medium. A non-transitory storage medium may be embodied by a compact disk, digital-video disk, a magnetic disk, flash memory, integrated circuits, or any other non-transitory digital processing apparatus memory device.
[0327] Although the foregoing has been described in some detail for purposes of clarity, it will be apparent that certain changes and modifications may be made without departing from the principles thereof. For example, it will be appreciated that a number of variations can be made to the various embodiments, systems, services, and/or components presented in connection with the figures and/or associated description within the scope of the inventive body of work, and that the examples presented in the figures and described herein are provided for purposes of illustration and explanation, and not limitation. It is further noted that there are many alternative ways of implementing both the systems and methods described herein. Accordingly, the present embodiments are to be considered as illustrative and not restrictive, and the embodiments of the invention are not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims.