@@ -51,7 +51,7 @@ COALA IP's vision will be realized through three key efforts:
51
51
to represent intellectual property rights on distributed ledgers (see [ Introduction] ( #introduction ) );
52
52
1 . Defining a technology-specific, but ledger-agnostic, free and open messaging and communication
53
53
protocol for intellectual property rights and licensing transactions (see [ Implementing the
54
- RRM] ( #coala-ip-implementing-the-lcc-rrm-with-linked-data ) ; and
54
+ RRM] ( #coala-ip-implementing-the-lcc-rrm-with-linked-data ) ) ; and
55
55
1 . Building a community to define a minimally-viable set of data for the description of intellectual
56
56
property rights and licensing agreements.
57
57
@@ -743,53 +743,49 @@ content-addressed location on IPFS, etc.).
743
743
744
744
# ## Fingerprinting
745
745
746
- Determining the originality and provenance of a physical object is challenging, but there are
747
- almost always subtle differences between an original physical object and copies. Digital files
748
- can be copied perfectly, down to the bit. Furthermore, it is difficult for a computer to determine
749
- that two files actually represent the same photograph or song if the files are different sizes or
750
- other subtle modifications have been made, while a human would have no difficulty making the
751
- connection.
746
+ Determining the originality and provenance of a creation is challenging. This is true of physical
747
+ creations, but even more so for digital creations which face the challenges of being perfectly
748
+ copyable as well as easily modifiable. Although computers are good at determining perfect copies,
749
+ they struggle if subtle modifications, such as compressing image quality or cropping an image, are
750
+ made–even if a human would have no difficulties in making a connection.
752
751
753
- The LCC takes these problems into account. In their " Ten Targets" document, they propose
754
- cross- standard identifiers that can, if needed, be * transformed* into alternative identifiers. This
755
- section discusses a similar idea: the existence of an arbitrarily complex vector that can be used
756
- to link all the alternative identifiers of a single work to a single identifier on a global
757
- rights registry.
752
+ The LCC takes these problems into account. In their [ " Ten Targets" document]( # the-lccs-ten-targets),
753
+ they propose cross- standard identifiers that can, if needed, be * transformed* into alternative
754
+ identifiers. This section discusses a similar idea: the existence of an arbitrarily complex graph
755
+ that can be used to link all the alternative identifiers of a single work to a single identifier on
756
+ a global rights registry.
758
757
759
758
Any function that takes a digital asset as an input and yields a fixed- length value could
760
759
potentially be used as a ** fingerprinting function** . This could be as simple as a hash function
761
760
that inspects the arrangement of bytes in a digital asset and returns a integer, but there are more
762
761
elaborate versions:
763
762
764
763
- [Image- match](https:// github.com/ ascribe/ image- match): An approximate image match algorithm
765
- implemented in Python.
766
- - [pHash](http:// www.phash.org/ ): A hashing method using various features of a digital asset.
764
+ implemented in Python;
765
+ - [pHash](http:// www.phash.org/ ): A hashing method using various features of a digital asset;
767
766
- [dejavu](https:// github.com/ worldveil/ dejavu): An audio fingerprinting and recognition algorithm
768
- implemented in Python.
769
- - TODO : List more libraries
770
- - Find popular ones that do fingerprinting for all kinds of media types
767
+ implemented in Python;
768
+ - And many more
771
769
772
770
773
771
While a manifestation of a digital creation may initially only have a single fingerprint generated
774
772
by an arbitrary hashing function, more elaborate fingerprinting schemes could later be used to help
775
- automatically identify other occurrences of the creation on the internet. Paired with linked data,
776
- fingerprinting schemes could allow the storage and tracking of all information about the use of a
777
- work in an arbitrarily complex graph. Copies, remixes, mash- ups, and modified versions of the work
778
- could be identified automatically as paths in the graph. Traversing these paths would reveal the
779
- original instance of the work, possibly identifying the creator and providing opportunities for
780
- compensation.
773
+ automatically identify other occurrences of the creation on the internet. Paired with Linked Data,
774
+ fingerprinting schemes would allow an arbitrarily complex graph to store and track all the
775
+ information related to the use of a work: copies, remixes, mash- ups, and modified versions could all
776
+ be identified automatically as paths in the graph. A traversal up a path would reveal the original
777
+ instance of the work and possibly identify the creator as well as an opportunity for compensation.
781
778
782
- As rights information becomes more transparent and users can easily license the rights they want
783
- to obtain, participants in the system would be incentivized to create more elaborate fingerprinting
784
- systems to further increase transparency.
779
+ Based on this, as rights information becomes more transparent and rights easily licensable by users,
780
+ participants in the system would be incentivized to create more elaborate fingerprinting systems to
781
+ further increase transparency.
785
782
786
783
787
784
# ## The Interledger Protocol
788
785
789
786
- TODO :
790
787
- This section should briefly explain what Interledger and the Interledger Protocol is about and
791
788
how COALA IP could potentially use it.
792
- - Same formalities as in all the sections before apply.
793
789
794
790
795
791
# # COALA IP: Remodeling the LCC RRM with Linked Data
@@ -1809,48 +1805,53 @@ We end up with the following:
1809
1805

1810
1806
1811
1807
1812
- As changing any of the objects values of key would provoke a change in the object ' s IPLD hash, and
1813
- since changing data is not possible, we could also simply point the assertion to the object
1814
- itself. However, we' d probably lose valuable metadata and it would be difficult to find out
1815
- why an object was flagged by an asserter.
1808
+ As a recommendation, we add that using IPLD with `Assertion` s is ideal, as it enforces the
1809
+ immutability of an asserted object (as well as the assertion itself); with IPLD , objects cannot be
1810
+ silently changed after- the- fact as any changes will cause their IPLD hashes to also change.
1816
1811
1817
1812
1818
-
1819
- # ## The LCC RightsConflict `Entity`
1813
+ # ## The RRM `RightsConflict` Entity
1820
1814
1821
1815
TODO :
1822
- - See other introductory sections of LCC models. Use same structure to describe the model
1816
+
1817
+ - See other introductory sections of LCC entities. Use same structure to describe the entity
1823
1818
1824
1819
1825
1820
# ### Proposed Transformation
1826
1821
1827
1822
TODO :
1828
- - See other introductory sections of LCC models. Use same structure to do the transformation
1823
+
1824
+ - See other introductory sections of LCC entities. Use same structure to do the transformation
1825
+
1826
+
1827
+ # ## User Extensions
1828
+
1829
+ TODO :
1830
+
1831
+ - Explain how users could extend the given entities with their own properties
1829
1832
1830
1833
1831
1834
# # Future
1832
1835
1833
- This document outlined general guidelines on using the LCC Framework to define an RDF ontology for
1834
- managing digital rights on top of immutable data stores. As the goal is to implement an open
1835
- standard for rights management, there are a number of events that are to follow; they are outlined
1836
- here in sequential order:
1836
+ This document has outlined general technologies and guidelines on using the LCC Framework as the
1837
+ basis of an RDF ontology for managing digital rights with immutable data stores. As the goal is to
1838
+ implement an open standard for rights management, a number of efforts are to follow:
1837
1839
1838
- - Define a working RDF schema based on this specification
1839
- - Include or build open source communities around it
1840
- - Using the RDF schema, implement this specification
1841
- - Identify a standards commite to send this to
1842
- - Take the RDF schema, take the proposed transformations here and put them in a format of a standard
1843
- proposal
1840
+ - Define a production- ready RDF - compatible schema based on the proposed transformations (see
1841
+ [`data- structure/ ` ](data- structure/ ))
1842
+ - Complete a reference implementation using the RDF - compatible schema (see
1843
+ [implementations](IMPLEMENTATIONS .md))
1844
+ - Include or build open source communities around COALA IP
1845
+ - Identify a standards committee to work with
1846
+ - Reformat the proposed transformations and their resulting schemata to that of a standard proposal
1844
1847
1845
1848
1846
- Thanks for reading!
1849
+ Thank you for reading!
1847
1850
1848
1851
# Contributors
1849
1852
1850
1853
Contributors to this document, in alphabetical order:
1851
1854
1852
1855
- Tim Daubenschuetz: tim.daubenschuetz@ gmail.com, tim@ ascribe.io
1853
1856
- Greg McMullen: greg@ ipdb.foundation, gmcmullen@ gmail.com
1854
- - Brett Sun: brett@ bigchaindb.com
1855
-
1856
-
1857
+ - Brett Sun: qisheng.brett.sun@ gmail.com, brett@ bigchaindb.com
0 commit comments